Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2068069rwi; Tue, 11 Oct 2022 04:32:12 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6vGAkEVObd4YP/3/NMAMyPeZL9tQomFpRtFkI9ekGA/rRLib2pgYUOSWDgLdeGfN/20fC6 X-Received: by 2002:aa7:cc8e:0:b0:457:23db:f0cc with SMTP id p14-20020aa7cc8e000000b0045723dbf0ccmr22449559edt.122.1665487932639; Tue, 11 Oct 2022 04:32:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665487932; cv=none; d=google.com; s=arc-20160816; b=RPPsIOJNWj/LPMrkcIXIgKpw+hJZ9QsLJd57mAr2cL88gE3kczLJ8lZk3ezCypob3F SuQaWAbc/yGvhNcyrZMbxc5W5r6mwqQ1KqYfJKzApKRfBNeTRpkliWmfPLmnkE+P0SA3 TF8503rhb0a8R/2/+almAtX2FMN1vvagUkHwPHR0wE8LCl9osn3feBQNEqriMFfYPi2D ZRbvodHsd19q5nj/bBdPA0w2HFrESUCuqeoAMQtZvDb5bg4BUbEvPK8q2DMVoci66lQW 5NsLhtMZC6FRzhXFrAogRiicpZXciy2/Mer49LZIb9k3Xlxr5saJ/DOuvy9FKvw3q2zC BOhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:in-reply-to:date :mime-version; bh=8OBupGJfUlsBck0WLDpt6ifV+vV4bqTkfborNc+/nxg=; b=epSGadY1+1Yt36Z61RAvVJzS95XyTnoK1YBQ97jVm+zAJT7TKagMacpY8/XXZwsOh5 ENQTSK82qBS6FFj+P3mhctfngQgdN+C6Z6NMclsnjQ+B5viz2q5lK2rtnD2ETRfABPKI 4aqn02KaITx3zilndfZvGcVMS1rNtOOxWSEDzfDj+yIpzbj5ual41i5n9V3O4n/LMqMN ySOHDCMPRKVNytdEM5I6iLQYYUSNiG+qr9Ntzz4Lm6HkpeeSVBYyTWRJivujqh2ENYJU wpBEWSH+m4EipQqvwFvk4kq6UqPFP5zJ1/25Z2ytXWtxSifHMy6gfCfWJ91yx+L1znGE m36A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i8-20020a05640242c800b00450fda68304si15255820edc.349.2022.10.11.04.31.44; Tue, 11 Oct 2022 04:32:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229724AbiJKLAj (ORCPT + 99 others); Tue, 11 Oct 2022 07:00:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43654 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229495AbiJKLAf (ORCPT ); Tue, 11 Oct 2022 07:00:35 -0400 Received: from mail-pf1-f199.google.com (mail-pf1-f199.google.com [209.85.210.199]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F27BC2CDD7 for ; Tue, 11 Oct 2022 04:00:33 -0700 (PDT) Received: by mail-pf1-f199.google.com with SMTP id 7-20020a056a00070700b0056264748f0fso7200489pfl.21 for ; Tue, 11 Oct 2022 04:00:33 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=8OBupGJfUlsBck0WLDpt6ifV+vV4bqTkfborNc+/nxg=; b=L7n1L8HR7ErQItp0o3Id7bGd6WOvPTMSi0ecujffrhn6Qos/7BIbtKtGmdM4SRuwKP cZW1Qmu8b++7AOT12O06TWbKbfqOwMxDjur2kiUq2HoA7Ur3k3k+EY8b1psdcvfPwmCf nRbBwS90p6Fw0uqCACcony5DLn0iQwmWSZH7lqkcar+4VmSRj+PX0sOK/R7zVWLT6a4I NPPgWJ997Cl5oOAqk86yy/nrLi0Los4NEPiFXoxbxDw2I4ASoqs4yR69d3v7naWDvSJz +1I1uEt4P5n8yhKcpWKEmTzHh4q2UD/tq2cGxlj2Z/N6+RPgUy7NCDaQbgfIA9x1PvEh 7Cdg== X-Gm-Message-State: ACrzQf2ZK0gUsUwn0kpH5D7r7dfk3nLIirrRgDzL5wjWtTJZOmA0PLx5 7zZZtEyblKgdtMD8E9hPxh0PWBhc83kQcg91bRA7kRk1uck5 MIME-Version: 1.0 X-Received: by 2002:a05:6602:26d4:b0:6a3:f88e:4852 with SMTP id g20-20020a05660226d400b006a3f88e4852mr10343152ioo.55.1665486023284; Tue, 11 Oct 2022 04:00:23 -0700 (PDT) Date: Tue, 11 Oct 2022 04:00:23 -0700 In-Reply-To: <4449089.LvFx2qVVIh@mypc> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000cbe1c005eac02e1a@google.com> Subject: Re: [syzbot] memory leak in __get_metapage From: syzbot To: akpm@linux-foundation.org, fmdefrancesco@gmail.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.6 required=5.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: memory leak in __get_metapage BUG: memory leak unreferenced object 0xffff888115b53800 (size 128): comm "syz-executor.0", pid 4198, jiffies 4294944352 (age 13.760s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 mm/mempool.c:392 [] alloc_metapage fs/jfs/jfs_metapage.c:176 [inline] [] __get_metapage+0x3ae/0xae0 fs/jfs/jfs_metapage.c:651 [] diNewExt+0x3f2/0x9d0 fs/jfs/jfs_imap.c:2265 [] diAllocExt fs/jfs/jfs_imap.c:1945 [inline] [] diAllocAG+0x9a4/0xd50 fs/jfs/jfs_imap.c:1662 [] diAlloc+0x31f/0x900 fs/jfs/jfs_imap.c:1583 [] ialloc+0x6a/0x3a0 fs/jfs/jfs_inode.c:56 [] jfs_mkdir+0xf7/0x480 fs/jfs/namei.c:225 [] vfs_mkdir+0x223/0x340 fs/namei.c:4035 [] do_mkdirat+0x1a5/0x1e0 fs/namei.c:4060 [] __do_sys_mkdir fs/namei.c:4080 [inline] [] __se_sys_mkdir fs/namei.c:4078 [inline] [] __x64_sys_mkdir+0x69/0x90 fs/namei.c:4078 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888115b53880 (size 128): comm "syz-executor.0", pid 4198, jiffies 4294944352 (age 13.760s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 mm/mempool.c:392 [] alloc_metapage fs/jfs/jfs_metapage.c:176 [inline] [] __get_metapage+0x3ae/0xae0 fs/jfs/jfs_metapage.c:651 [] diNewExt+0x3f2/0x9d0 fs/jfs/jfs_imap.c:2265 [] diAllocExt fs/jfs/jfs_imap.c:1945 [inline] [] diAllocAG+0x9a4/0xd50 fs/jfs/jfs_imap.c:1662 [] diAlloc+0x31f/0x900 fs/jfs/jfs_imap.c:1583 [] ialloc+0x6a/0x3a0 fs/jfs/jfs_inode.c:56 [] jfs_mkdir+0xf7/0x480 fs/jfs/namei.c:225 [] vfs_mkdir+0x223/0x340 fs/namei.c:4035 [] do_mkdirat+0x1a5/0x1e0 fs/namei.c:4060 [] __do_sys_mkdir fs/namei.c:4080 [inline] [] __se_sys_mkdir fs/namei.c:4078 [inline] [] __x64_sys_mkdir+0x69/0x90 fs/namei.c:4078 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888115b53900 (size 128): comm "syz-executor.0", pid 4198, jiffies 4294944352 (age 13.760s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 mm/mempool.c:392 [] alloc_metapage fs/jfs/jfs_metapage.c:176 [inline] [] __get_metapage+0x3ae/0xae0 fs/jfs/jfs_metapage.c:651 [] diNewExt+0x3f2/0x9d0 fs/jfs/jfs_imap.c:2265 [] diAllocExt fs/jfs/jfs_imap.c:1945 [inline] [] diAllocAG+0x9a4/0xd50 fs/jfs/jfs_imap.c:1662 [] diAlloc+0x31f/0x900 fs/jfs/jfs_imap.c:1583 [] ialloc+0x6a/0x3a0 fs/jfs/jfs_inode.c:56 [] jfs_mkdir+0xf7/0x480 fs/jfs/namei.c:225 [] vfs_mkdir+0x223/0x340 fs/namei.c:4035 [] do_mkdirat+0x1a5/0x1e0 fs/namei.c:4060 [] __do_sys_mkdir fs/namei.c:4080 [inline] [] __se_sys_mkdir fs/namei.c:4078 [inline] [] __x64_sys_mkdir+0x69/0x90 fs/namei.c:4078 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888116622700 (size 128): comm "syz-executor.0", pid 4739, jiffies 4294944954 (age 7.740s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 mm/mempool.c:392 [] alloc_metapage fs/jfs/jfs_metapage.c:176 [inline] [] __get_metapage+0x3ae/0xae0 fs/jfs/jfs_metapage.c:651 [] diNewExt+0x3f2/0x9d0 fs/jfs/jfs_imap.c:2265 [] diAllocExt fs/jfs/jfs_imap.c:1945 [inline] [] diAllocAG+0x9a4/0xd50 fs/jfs/jfs_imap.c:1662 [] diAlloc+0x31f/0x900 fs/jfs/jfs_imap.c:1583 [] ialloc+0x6a/0x3a0 fs/jfs/jfs_inode.c:56 [] jfs_mkdir+0xf7/0x480 fs/jfs/namei.c:225 [] vfs_mkdir+0x223/0x340 fs/namei.c:4035 [] do_mkdirat+0x1a5/0x1e0 fs/namei.c:4060 [] __do_sys_mkdir fs/namei.c:4080 [inline] [] __se_sys_mkdir fs/namei.c:4078 [inline] [] __x64_sys_mkdir+0x69/0x90 fs/namei.c:4078 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd Tested on: commit: 60bb8154 Merge tag 'xfs-6.1-for-linus' of git://git.ke.. git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git -- console output: https://syzkaller.appspot.com/x/log.txt?x=171a96dc880000 kernel config: https://syzkaller.appspot.com/x/.config?x=589d84e4754dd2fa dashboard link: https://syzkaller.appspot.com/bug?extid=389b82b29093b3e2640a compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 patch: https://syzkaller.appspot.com/x/patch.diff?x=1095fc78880000