Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp3889052rwb; Fri, 30 Sep 2022 09:38:54 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5FrZCM4q5Zu2B7zGz7Zrx9v4hot1h9iK1DVSrNtcPGJ0F2pgNDTo6EtZYp/YdExNw6yq+D X-Received: by 2002:a05:6a00:1c98:b0:540:d461:f9d8 with SMTP id y24-20020a056a001c9800b00540d461f9d8mr9945715pfw.29.1664555933995; Fri, 30 Sep 2022 09:38:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664555933; cv=none; d=google.com; s=arc-20160816; b=CyFr+NCYQLYxAc/iDMD+25wy+zK0syw7pKI+0o8MvwcNhGepTQirmmRjrq6MmaZP+M Bx3odMQ01hz9UwvEL+p9WTy3UFDfoHV/Asu6QX2/QWOwP8E3tqvG0tlNrTXUnSG2DjnG ZksrG82NAAD5VAipliFtAaSmopo0xohPs7OdShGptWQQyzR53qOkCAW7Ir+LcMoCrJfP XEQDZl7vzCrTIkQAmOROSRqvCweKf1VOWz3pK573WT2oVxy1wyZYHTA3A5npdwBh7dpL /X15mCwoZmlJgLb40T/9ZGrCzkQLN37S7J5UMXNrHVLW062unZPrrdiY0EC8akdHCKAw bpgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-signature; bh=co0dMmEoGmARvBRIH+x8b0r6owgzijM7+V2oU2F9A5g=; b=Qq0rUiMh/uxKvkIbzmL81dG0DJGwnp6Tz0veARoHCS6P8I08cQ7UYWjKWe5A5D2g4N sROXOSJfLuQCW1a9TX/dIluKNUhDFiFry0LAbu0scLzFACh0DkpEWfzuGWw8ts4TQlKG kw5uQmrf3GWVUxOdThs2l7685XUjqUkQ1PZt6ps2oa3R5NPl7sRrDkN1z/VsKh9kI+s/ PvZoQ/LPZd47eF4W08u9HTxv67YDHTe5i3vb/Yvp7wXOl7DR1nqKBKWE+l5ZwEgrkgvm 6kGrylPd/oVVmQJvRRXC9pLrniuEYfVqrmlKNKz1hCFc6nopOlcNQj98wOt1pREW7alc aStw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paragon-software.com header.s=mail header.b=N7T0AdNt; dkim=pass header.i=@paragon-software.com header.s=mail header.b=jPbWnV0d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=paragon-software.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i124-20020a628782000000b00535dfe411cfsi2549559pfe.189.2022.09.30.09.38.42; Fri, 30 Sep 2022 09:38:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@paragon-software.com header.s=mail header.b=N7T0AdNt; dkim=pass header.i=@paragon-software.com header.s=mail header.b=jPbWnV0d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=paragon-software.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231740AbiI3Pv4 (ORCPT + 99 others); Fri, 30 Sep 2022 11:51:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43800 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231320AbiI3Pvu (ORCPT ); Fri, 30 Sep 2022 11:51:50 -0400 Received: from relayaws-01.paragon-software.com (relayaws-01.paragon-software.com [35.157.23.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0AF0C10462F for ; Fri, 30 Sep 2022 08:51:26 -0700 (PDT) Received: from relayfre-01.paragon-software.com (unknown [172.30.72.12]) by relayaws-01.paragon-software.com (Postfix) with ESMTPS id C66A21D0C; Fri, 30 Sep 2022 15:49:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paragon-software.com; s=mail; t=1664552949; bh=co0dMmEoGmARvBRIH+x8b0r6owgzijM7+V2oU2F9A5g=; h=Date:Subject:To:CC:References:From:In-Reply-To; b=N7T0AdNtfVWvxuSkyTrLWo6pcs5QIg6ztWIiUuQRx/u26EWZhGX37dJz74425UYLk mEp1PliufVaThcXsiS2PyHTuToXdtR1aD0hHT/NAgZRjlr9M6NfZOqxalRl95q+weX iCojCSensY1OrQEUxGneTPrjCABIuQMMKug2uQXU= Received: from dlg2.mail.paragon-software.com (vdlg-exch-02.paragon-software.com [172.30.1.105]) by relayfre-01.paragon-software.com (Postfix) with ESMTPS id D64D51E81; Fri, 30 Sep 2022 15:51:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paragon-software.com; s=mail; t=1664553084; bh=co0dMmEoGmARvBRIH+x8b0r6owgzijM7+V2oU2F9A5g=; h=Date:Subject:To:CC:References:From:In-Reply-To; b=jPbWnV0dg8J1idpqbeZtO2Kh0Ok1qw7Ql+TXjS2smAXYd862H4qzydX1ady6/4b25 7jmf5//4xpA3Y9MSMCoTU8HYHtX7yV5F2RRh8dZLttx+LO95UXtZBpFv15Zwc9bSs5 f4wJ+KmKCWtMAM21LZoqlLOWD6UjvNxgo3xG1aoI= Received: from [172.30.8.65] (172.30.8.65) by vdlg-exch-02.paragon-software.com (172.30.1.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Fri, 30 Sep 2022 18:51:24 +0300 Message-ID: Date: Fri, 30 Sep 2022 18:51:23 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH] fs/ntfs3: Fix memory leak on ntfs_fill_super() error path Content-Language: en-US To: Shigeru Yoshida CC: , , References: <20220823103205.1380235-1-syoshida@redhat.com> From: Konstantin Komarov In-Reply-To: <20220823103205.1380235-1-syoshida@redhat.com> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [172.30.8.65] X-ClientProxiedBy: vobn-exch-01.paragon-software.com (172.30.72.13) To vdlg-exch-02.paragon-software.com (172.30.1.105) X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/23/22 13:32, Shigeru Yoshida wrote: > syzbot reported kmemleak as below: > > BUG: memory leak > unreferenced object 0xffff8880122f1540 (size 32): > comm "a.out", pid 6664, jiffies 4294939771 (age 25.500s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 ed ff ed ff 00 00 00 00 ................ > backtrace: > [] ntfs_init_fs_context+0x22/0x1c0 > [] alloc_fs_context+0x217/0x430 > [] path_mount+0x704/0x1080 > [] __x64_sys_mount+0x18c/0x1d0 > [] do_syscall_64+0x34/0xb0 > [] entry_SYSCALL_64_after_hwframe+0x63/0xcd > > This patch fixes this issue by freeing mount options on error path of > ntfs_fill_super(). > > Reported-by: syzbot+9d67170b20e8f94351c8@syzkaller.appspotmail.com > Signed-off-by: Shigeru Yoshida > --- > fs/ntfs3/super.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/fs/ntfs3/super.c b/fs/ntfs3/super.c > index 47012c9bf505..c0e45f170701 100644 > --- a/fs/ntfs3/super.c > +++ b/fs/ntfs3/super.c > @@ -1281,6 +1281,7 @@ static int ntfs_fill_super(struct super_block *sb, struct fs_context *fc) > * Free resources here. > * ntfs_fs_free will be called with fc->s_fs_info = NULL > */ > + put_mount_options(sbi->options); > put_ntfs(sbi); > sb->s_fs_info = NULL; > Thanks for patch, applied!