Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp3858919rwl; Mon, 10 Apr 2023 02:07:42 -0700 (PDT) X-Google-Smtp-Source: AKy350YGnOOWitMbOQYac0kYlQQWaVS9SG0GEN1gkVpibi4b6gXbHy3oHFY0zUahY4ox+vNHCLp0 X-Received: by 2002:a17:902:cecb:b0:19e:dc0e:1269 with SMTP id d11-20020a170902cecb00b0019edc0e1269mr15266680plg.7.1681117661761; Mon, 10 Apr 2023 02:07:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681117661; cv=none; d=google.com; s=arc-20160816; b=QhUup/bQjpfA5elbH0zusbB3S4DAlhWh4QMJKOBLoWkEc9Ir9m7ANKL1Q4mA+ijeL7 EcaYM0qugw9RTYQtfLK2WocOMtAuvMskwVO/WQw8jKD+0iN7ET3yJ+O5RR8/5AhuOigc SF3B/IdHjZvd8WcArUwtf6hx6P/QLcsS5TvqhRW9dPexc59tEMrXYmcUTB7N14dlzJQK mfFWRRGPj1tkkXxEt1WIWczRcr3TzpfqGjsFxrQcMSJX97bhXALdIl4rcYJlylZ+I5Zt llYY9zOL30Clc5Hb8+aRuOl0Yd/zO+0TzJvd2oX5o03ZnYire7BmkMX5opx65n6bVB6c ZqAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:subject:user-agent:mime-version:date:message-id; bh=GZfCo7OFilh4KDYKDfAAQMu0xzwwTqhNtLHxSSAhHRE=; b=tT9b/2hicWGpK6KjLs9WvySMjWn7YMSVrM8/oFX0gt/1GHFdpAcL4XFw41zW6LhEQq h8H7s9yBAndvuyJFeUHPurt75ivOvJMHn2QoVyGlZkiPzpwszqEnq9oZrqWnVfP8Rj/4 mulB6Fjwj1KHxvA4yheBv4l5CKqbP/+jH/2z6uMnjA8vzZeXbcIoX4frXhBy76X0FhCT 7A5JfCtjnvQoL+Cvv1JsZX3kQ0/estMiKml+AtDCD1J6mlUXu22x7pYnSK3CGIzLsH6T 9XwKjYef9vneMF0oOW4HZHp5HkrBpfZT+VecXwmADKNILkEM1UEDlCldzT66SBm33yO2 VtQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t10-20020a170902b20a00b001a2a9bfdfb4si10572872plr.297.2023.04.10.02.07.30; Mon, 10 Apr 2023 02:07:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229669AbjDJJDL (ORCPT + 99 others); Mon, 10 Apr 2023 05:03:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58052 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229630AbjDJJDK (ORCPT ); Mon, 10 Apr 2023 05:03:10 -0400 Received: from out30-118.freemail.mail.aliyun.com (out30-118.freemail.mail.aliyun.com [115.124.30.118]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2A12D30CB for ; Mon, 10 Apr 2023 02:03:06 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R701e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046051;MF=hsiangkao@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0VfkBM0n_1681117383; Received: from 30.97.49.25(mailfrom:hsiangkao@linux.alibaba.com fp:SMTPD_---0VfkBM0n_1681117383) by smtp.aliyun-inc.com; Mon, 10 Apr 2023 17:03:04 +0800 Message-ID: <90d29dc6-39b3-439c-904b-7a2207610d64@linux.alibaba.com> Date: Mon, 10 Apr 2023 17:03:03 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [syzbot] WARNING in rmqueue To: syzbot , linux-erofs@lists.ozlabs.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, xiang@kernel.org References: <000000000000ec75b005ee97fbaa@google.com> From: Gao Xiang In-Reply-To: <000000000000ec75b005ee97fbaa@google.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-11.2 required=5.0 tests=ENV_AND_HDR_SPF_MATCH, NICE_REPLY_A,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE, SPF_PASS,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/11/29 16:43, syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: b7b275e60bcd Linux 6.1-rc7 > git tree: upstream > console+strace: https://syzkaller.appspot.com/x/log.txt?x=16a70187880000 > kernel config: https://syzkaller.appspot.com/x/.config?x=2325e409a9a893e1 > dashboard link: https://syzkaller.appspot.com/bug?extid=aafb3f37cfeb6534c4ac > compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15dde8a1880000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15685e8d880000 > > Downloadable assets: > disk image: https://storage.googleapis.com/syzbot-assets/525233126d34/disk-b7b275e6.raw.xz > vmlinux: https://storage.googleapis.com/syzbot-assets/e8299bf41400/vmlinux-b7b275e6.xz > kernel image: https://storage.googleapis.com/syzbot-assets/eebf691dbf6f/bzImage-b7b275e6.xz > mounted in repro: https://storage.googleapis.com/syzbot-assets/d643567f551d/mount_0.gz > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+aafb3f37cfeb6534c4ac@syzkaller.appspotmail.com #syz test: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/ v6.3-rc6 > > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 48 at mm/page_alloc.c:3837 __count_numa_events include/linux/vmstat.h:249 [inline] > WARNING: CPU: 0 PID: 48 at mm/page_alloc.c:3837 zone_statistics mm/page_alloc.c:3692 [inline] > WARNING: CPU: 0 PID: 48 at mm/page_alloc.c:3837 rmqueue_buddy mm/page_alloc.c:3728 [inline] > WARNING: CPU: 0 PID: 48 at mm/page_alloc.c:3837 rmqueue+0x1d6b/0x1ed0 mm/page_alloc.c:3853 > Modules linked in: > CPU: 0 PID: 48 Comm: kworker/u5:0 Not tainted 6.1.0-rc7-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 > Workqueue: erofs_unzipd z_erofs_decompressqueue_work > RIP: 0010:rmqueue+0x1d6b/0x1ed0 mm/page_alloc.c:3837 > Code: 48 8b 02 65 48 ff 40 20 49 83 f6 05 42 80 3c 2b 00 74 08 4c 89 e7 e8 a4 44 0b 00 49 8b 04 24 65 4a ff 44 f0 10 e9 2a fe ff ff <0f> 0b e9 29 e3 ff ff 48 89 df be 08 00 00 00 e8 31 46 0b 00 f0 41 > RSP: 0018:ffffc90000b97260 EFLAGS: 00010202 > RAX: f301f204f1f1f1f1 RBX: ffff88813fffae00 RCX: 000000000000adc2 > RDX: 1ffff92000172e70 RSI: 1ffff92000172e70 RDI: ffff88813fffae00 > RBP: ffffc90000b97420 R08: 0000000000000901 R09: 0000000000000009 > R10: ffffed1027fff5b3 R11: 1ffff11027fff5b2 R12: ffff88813fffc310 > R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88813fffa700 > FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00007f7bec722f10 CR3: 000000004a430000 CR4: 00000000003506f0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > > get_page_from_freelist+0x4b6/0x7c0 mm/page_alloc.c:4288 > __alloc_pages+0x259/0x560 mm/page_alloc.c:5558 > vm_area_alloc_pages mm/vmalloc.c:2975 [inline] > __vmalloc_area_node mm/vmalloc.c:3043 [inline] > __vmalloc_node_range+0x8f4/0x1290 mm/vmalloc.c:3213 > kvmalloc_node+0x13e/0x180 mm/util.c:606 > kvmalloc include/linux/slab.h:706 [inline] > kvmalloc_array include/linux/slab.h:724 [inline] > kvcalloc include/linux/slab.h:729 [inline] > z_erofs_decompress_pcluster fs/erofs/zdata.c:1049 [inline] > z_erofs_decompress_queue+0x693/0x2c30 fs/erofs/zdata.c:1155 > z_erofs_decompressqueue_work+0x95/0xe0 fs/erofs/zdata.c:1167 > process_one_work+0x877/0xdb0 kernel/workqueue.c:2289 > worker_thread+0xb14/0x1330 kernel/workqueue.c:2436 > kthread+0x266/0x300 kernel/kthread.c:376 > ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 > > > > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > syzbot can test patches for this issue, for details see: > https://goo.gl/tpsmEJ#testing-patches