Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2810760pxp; Tue, 8 Mar 2022 02:13:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJwvJjGF25tBRFSSx4AZTgt3QiVtkaTRhB/DvnNyRFextOcdyjPhRfyykcmUtgKaNvATHw0r X-Received: by 2002:a17:902:dad2:b0:151:f895:9c31 with SMTP id q18-20020a170902dad200b00151f8959c31mr5210092plx.93.1646734432151; Tue, 08 Mar 2022 02:13:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646734432; cv=none; d=google.com; s=arc-20160816; b=uM7AdsQdF/14anZC07EuzRdKXXrEOKIPwFmVBQLUwkpnEsKVTm2V5a0Ixzhmiwg5v4 WwZL9wah1p8aPaa7ShOj441Nqto6h9/16VJ2Nh1m1jpWGXuam15QpKLHF3df3a9BbUWP ZQjtht26hFQ/EHMHhgAEih4tlRtg8dteiBQHDbfENY7p1ouEHflc/9QHjyAh2lwhs3OG 2GEVJVWbVQrXffLRbvEM1vyWs00akhfWiBRoHe7pQmb/TGfLhHcQejeGdp6lV2aiC/Ek G1PiFTtNh/wSz6hFnBgHu++W/giVovXLeFtE6R+/pYsJF0L2UxTUAK/CSTl4vNRrUwc9 63sA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=pNMI3y3s9jhYirCnaWwXqfgYbh+W/rvUiRXVWDomJAc=; b=ITTpUCq1k1rF1p+2IuK/rr6k0+ayedkfLzYI03ztBqDHxhhh7VdJYeNvxCejS1eBWc X5L7n2Eq94y5BkDAjkpRq5wvDd7z8ZvqBn2on9JUoMtJauFQAYMy2VbMeJXR3fuAOv/c nPgZfDjnk8W8auCGFNmqIr709EczUjZpa5i9KbhjVZTB0+Wq9T0aeU0dwNViFlouYjan pnbNatcwCduNOJFZAKXxrSgj4CNupVmQ/YCGW9Km/7X4pv6iA6necm2y17VsmAQqCAoi GVeEajino1noiITmD0oWOrJZVGXyrOA5KpcNAlmLCEpe32ru1bfyeDZ2aHfUjNDRkMiq 5LTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=A0qvTUNJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f11-20020a63f74b000000b00372e861b622si14185216pgk.764.2022.03.08.02.13.36; Tue, 08 Mar 2022 02:13:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=A0qvTUNJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243035AbiCHIc7 (ORCPT + 99 others); Tue, 8 Mar 2022 03:32:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59390 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231309AbiCHIcq (ORCPT ); Tue, 8 Mar 2022 03:32:46 -0500 Received: from mail-yb1-xb32.google.com (mail-yb1-xb32.google.com [IPv6:2607:f8b0:4864:20::b32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41B043F89E; Tue, 8 Mar 2022 00:31:50 -0800 (PST) Received: by mail-yb1-xb32.google.com with SMTP id h126so36281821ybc.1; Tue, 08 Mar 2022 00:31:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pNMI3y3s9jhYirCnaWwXqfgYbh+W/rvUiRXVWDomJAc=; b=A0qvTUNJMyP1kDVr7h7nnaTLvM39tVsM34nkwT0DFLu43bBsvVoD58gLs1xUebS06j GvnHbqZJ/3reNAzjp0s8zlkJODlrGcQuWiQTLF937X7EKYHAWmV0FC8csX/43k3k74bn 8HOLI9WnuZFPseRUqUhT8Xo8jmntAUx8I9M9Xd3msZzEfCZvGvpZ8Q5Q4DgaofCAOO8a ZKlzJRv89P22EosQmZz/1C3ePQ5vLMBW2O5Vqi0VfP1KqBcYyulmVE6i7pR9W6+V8me7 IvwjY+y9IxnuXfBpHG2m5IuuksM/G1SSaueqdndwfd3Sp+6E2JMjIpQAbnpUFEL1jVkJ 7mtQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pNMI3y3s9jhYirCnaWwXqfgYbh+W/rvUiRXVWDomJAc=; b=nGj/hkc46Sj3MYIzXZ8nrDwSn/qvMcuvj6NymhDvatFKSuE/l34EcLYGHTM+i2NXaY 5J/mmfIZACrxc34BdVrfU0ZH36z/ULlu9D8QzMbxZOFiM7ZLxh1g1th9X2sJmxVhoLAq EgJrS9G4xu68iOZucvUrSDs0aK/7F686CFhadQ2nDOla29aZquMIp94NL5CbWfq64sIo DeGbnES8AU2LrxURx4LcPSLP1rw9kM61OHv50xfdM7GYFQSHBjNNUatARvg2NhmYCkep ni/mhReXu6YWrPDsYrEBydEIm1n017DkI5jlLtZgqLYXZUYhpotPpBicCA9UY1jYaTpu PRXQ== X-Gm-Message-State: AOAM533eeMwNi42wv9FBKe/iC79gMWhS3HSN/UiE792cWewq4EgM6ovm 1uGok1gLzwqgwPZ3b5mVilgrWgCxv8Wcnh1dk7c= X-Received: by 2002:a25:cb85:0:b0:628:f0db:b2c4 with SMTP id b127-20020a25cb85000000b00628f0dbb2c4mr11019825ybg.531.1646728309336; Tue, 08 Mar 2022 00:31:49 -0800 (PST) MIME-Version: 1.0 References: <3192BC90-D082-472B-B310-6E09A14A77C6@hust.edu.cn> In-Reply-To: From: Ryusuke Konishi Date: Tue, 8 Mar 2022 17:31:36 +0900 Message-ID: Subject: Re: Fw:Re: [PATCH] fs: nilfs2: fix memory leak in nilfs sysfs create device group To: Dongliang Mu Cc: Pavel Skripkin , Andrew Morton , linux-nilfs , LKML , Nanyong Sun , =?UTF-8?B?5oWV5Yas5Lqu?= Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Dongliang, On Tue, Mar 8, 2022 at 11:22 AM Dongliang Mu wrote: > > On Sat, Jan 22, 2022 at 12:22 PM Ryusuke Konishi > wrote: > > > > Hi Dongliang, > > > > On Sat, Jan 22, 2022 at 9:31 AM Dongliang Mu wrote: > > > > (added Nanyong Sun to CC) > > > > Hi Dongliang, > > > > > > > > On Thu, Jan 20, 2022 at 11:07 PM Pavel Skripkin wrote: > > > > > > > > > > > > Hi Dongliang, > > > > > > > > On 1/20/22 16:44, Dongliang Mu wrote: > > > > > > > > The preivous commit 8fd0c1b0647a ("nilfs2: fix memory leak in > > > > nilfs_sysfs_delete_device_group") only handles the memory leak in the > > > > nilfs_sysfs_delete_device_group. However, the similar memory leak still > > > > occurs in the nilfs_sysfs_create_device_group. > > > > > > > > Fix it by adding kobject_del when > > > > kobject_init_and_add succeeds, but one of the following calls fails. > > > > > > > > Fixes: 8fd0c1b0647a ("nilfs2: fix memory leak in nilfs_sysfs_delete_device_group") > > > > > > > > > > > > Why Fixes tag points to my commit? This issue was introduced before my patch > > > > > > > > > > > > As Pavel pointed out, this patch is independent of his patch. > > > > The following one ? > > > > > > Hi Pavel, > > > > > > This is an incorrect fixes tag. I need to dig more about `git log -p > > > fs/nilfs2/sysfs.c`. > > > > > > I wonder if there are any automatic or semi-automatic ways to capture > > > this fixes tag. Or how do you guys identify the fixes tag? > > > > I guess `git blame fs/nilfs2/sysfs.c` may help you to confirm where the change > > came from. It shows information of commits for every line of the input file. > > If you are using github, 'blame button' is available. > > > > If an issue is reproducible, we use `git bisect` to identify the patch > > that caused the > > issue, however, even then, try to understand why and how it affected > > by looking at > > source code and the commit. > > > > > > > > > > > > > 5f5dec07aca7 ("nilfs2: fix memory leak in nilfs_sysfs_create_device_group") > > > > > > > > Signed-off-by: Dongliang Mu > > > > --- > > > > fs/nilfs2/sysfs.c | 5 ++++- > > > > 1 file changed, 4 insertions(+), 1 deletion(-) > > > > > > > > > > > > Can you describe what memory leak issue does this patch actually fix ? > > > > > > > > It looks like kobject_put() can call __kobject_del() unless circular > > > > references exist. > > > > > > > > kobject_put() -> kref_put() -> kobject_release() -> > > > > kobject_cleanup() -> __kobject_del() > > > > > > > > As explained in Documentation/core-api/kobject.rst, > > > > > > > > kobject_del() can be used to drop the reference to the parent object, if > > > > circular references are constructed. > > > > > > > > But, at least, the parent object is NULL in this case. > > > > I really want to understand what the real problem is. > > > > > > > > Thanks, > > > > Ryusuke Konishi > > > > > > I know where my problem is. From the disconnect function, I think the > > > kobject_del and kobject_put are both necessary without checking the > > > documentation of kobjects. > > > > > > Then I think the current error handling may miss kobject_del, and this > > > patch is generated. > > > > > > As a result, I think we can ignore this patch. Sorry for my false alarm. > > > > Okay, thank you for your reply. > > If you notice anything we missed on this difference, please let us know. > > Hi Ryusuke, > > My local syzkaller instance always complains about the following crash > report no matter how many times I clean up the generated crash > reports. > > BUG: memory leak > unreferenced object 0xffff88812e902be0 (size 32): > comm "syz-executor.2", pid 25972, jiffies 4295025942 (age 12.490s) > hex dump (first 32 bytes): > 6c 6f 6f 70 32 00 00 00 00 00 00 00 00 00 00 00 loop2........... > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [] kstrdup+0x36/0x70 mm/util.c:60 > [] kstrdup_const+0x53/0x80 mm/util.c:83 > [] kvasprintf_const+0xc2/0x110 lib/kasprintf.c:48 > [] kobject_set_name_vargs+0x3b/0xe0 lib/kobject.c:289 > [] kobject_add_varg lib/kobject.c:384 [inline] > [] kobject_init_and_add+0x6d/0xc0 lib/kobject.c:473 > [] nilfs_sysfs_create_device_group+0x9a/0x3d0 > fs/nilfs2/sysfs.c:991 > [] init_nilfs+0x420/0x580 fs/nilfs2/the_nilfs.c:637 > [] nilfs_fill_super fs/nilfs2/super.c:1046 [inline] > [] nilfs_mount+0x532/0x8c0 fs/nilfs2/super.c:1316 > [] legacy_get_tree+0x2b/0x90 fs/fs_context.c:610 > [] vfs_get_tree+0x28/0x100 fs/super.c:1497 > [] do_new_mount fs/namespace.c:3024 [inline] > [] path_mount+0xb92/0xfe0 fs/namespace.c:3354 > [] do_mount+0xa1/0xc0 fs/namespace.c:3367 > [] __do_sys_mount fs/namespace.c:3575 [inline] > [] __se_sys_mount fs/namespace.c:3552 [inline] > [] __x64_sys_mount+0xf4/0x160 fs/namespace.c:3552 > [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] > [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > [] entry_SYSCALL_64_after_hwframe+0x44/0xae > > Unfortunately, there is no reproducer attached to the crash report. > But I still think there should be another issue in the code. The bug is happening in the call to kobject_init_and_add() in nilfs_sysfs_create_device_group(). So, it looks like a separate issue from your original patch. Is this right ? Which version of kernel does this bug occur on ? (Are you testing against the latest mainline kernel or some stable version?) Thanks, Ryusuke Konishi