Received: by 2002:a05:6358:700f:b0:131:369:b2a3 with SMTP id 15csp3517478rwo; Fri, 4 Aug 2023 06:13:35 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGUzBjQx4MBl1MIq4h/L8MXzx+DDXLPedDacxQ65J2Gw8IrRuDd07Nx7ouz/5Wl65otYw5z X-Received: by 2002:a17:906:2205:b0:99b:f3ef:f088 with SMTP id s5-20020a170906220500b0099bf3eff088mr1715497ejs.69.1691154815187; Fri, 04 Aug 2023 06:13:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691154815; cv=none; d=google.com; s=arc-20160816; b=F4NQwhEYPpXpvJG2OkYBdhhccmtS/NaUUaTGt4qZw1mZE3FuY+j/i+CywdS8SENnPG /kkXVOJtkPOhihV39vB3Id5OyDQoxytVpnnODvrLYMr8kc1wDzyYDIicnjocwfulcZ5b 1Mo1MmcEN5tk5M1uG+fBubsxX/6xEPX2bJ10BM/wzuXyrSXwaXRgOMeXBnh1VxFiyhjO 1/lDQl//0YDHgC9WCzSCZN2eKOos/i5ccZm4vWLH3mGNwtCRcWSO+wRYDfUU2p8D18kf MOSA21Fpk4+5K+HOL52+3thYID6/nbvZ6KOJe6FMpwazOnZTVpEPEg0yVoWxR/63cEW1 DMRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=JtmuyjHuArcSdACN8u2rzHxQJIUYA5JfdUiLnk9Bzqc=; fh=Zl7dGBFL18oMCG/2O5us6AMBNL9K1ot4Px561zgw7qY=; b=Gq0Lfb43AxB5dKDZQjeE7qeQLp19ZWQ+yEnwILEdt/8EdXybNJhbbE5fqlI6X0YZi2 Mxsz2MehujgzfbwKqPl+EnsUtFFvkBVX1BajTga+Z2lRNGN6AYtwGz3WTkYkw11esvBk mLeyAvb2WEDnTpyXyZJoCLIJfxhbPRGlTDkh9ej2bI4MkFTXlTbUH1i/2eXNmfD0bVaL mXuVB4e6NKkGm2CjxQHIhlapLV0D+CL0lyB0mNcWTEOuhJw2qzHuGEZZXN4ikuKaFaCX RRqbCJgrltvrN7tp0Fr/ioJOWaTw1PsFmDlRY4ewN086ESjj4J1N4TM/3hHrCRjRc7cw JWPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HcD49VFz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z13-20020a17090655cd00b0099bd6dd9362si1757060ejp.907.2023.08.04.06.13.08; Fri, 04 Aug 2023 06:13:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=HcD49VFz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229674AbjHDL7R (ORCPT + 99 others); Fri, 4 Aug 2023 07:59:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53364 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229638AbjHDL7P (ORCPT ); Fri, 4 Aug 2023 07:59:15 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B6F4B1; Fri, 4 Aug 2023 04:59:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 00D4A61F69; Fri, 4 Aug 2023 11:59:14 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F2E47C433C9; Fri, 4 Aug 2023 11:59:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1691150353; bh=TlxRuxshp1+YEtrdMg8rVE0v+c8+0ZCqcnwFTAXxjpw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HcD49VFzi/A6qiHCW/un5jA9r576MNjHpV0OwWK0UaQcwSCkmN5BEV3W29E4+xuHs +l/Eyr9uUBYwKinhoYq4H6p1kyCSIErdj/WWKRf9z+U5OKpm1FRpedp6ASfOJG7VYx 5CvyFiRFLLSgIh+lPwDwmCcRtu1Q9/WhqeKSGFCIQhB6h5ICdTpyAop9gZKjGeSoq6 DPNNRGHJkhAX+XTiUoS2s3qNPoSPOPa58XejfwlavvTDLLXlyLIpIkP2netue/HOof bFL71jXAPnkHWHpKVXXgXYfZX7zhxEB2FkEbeiZoQFSw2mJIV67JCJZCC9YxzNuZgD qmihkgzqDqyqw== From: Christian Brauner To: Ian Kent Cc: Christian Brauner , autofs mailing list , linux-fsdevel , Kernel Mailing List , Fedor Pchelkin , Takeshi Misawa , Alexey Khoroshilov , Matthew Wilcox , Andrey Vagin , Al Viro Subject: Re: [PATCH 1/2] autofs: fix memory leak of waitqueues in autofs_catatonic_mode Date: Fri, 4 Aug 2023 13:59:05 +0200 Message-Id: <20230804-testverfahren-bison-351d431d4491@brauner> X-Mailer: git-send-email 2.34.1 In-Reply-To: <169112719161.7590.6700123246297365841.stgit@donald.themaw.net> References: <169112719161.7590.6700123246297365841.stgit@donald.themaw.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" X-Developer-Signature: v=1; a=openpgp-sha256; l=2384; i=brauner@kernel.org; h=from:subject:message-id; bh=TlxRuxshp1+YEtrdMg8rVE0v+c8+0ZCqcnwFTAXxjpw=; b=owGbwMvMwCU28Zj0gdSKO4sYT6slMaScecGa53mD0SqYv1/Ubvvbb5c0DZWPR4Uo8y0zWqH+RPOV 4SzJjlIWBjEuBlkxRRaHdpNwueU8FZuNMjVg5rAygQxh4OIUgInUhjH8z1pqUfxFxHlTgt6ljy9LLn +flcTgaXx60/vpZet2TLhtr8/I8KrOPGdyQbdXb+XK7vMX2W50zbvf9eTiSy+eb6cuFs98xw8A X-Developer-Key: i=brauner@kernel.org; a=openpgp; fpr=4880B8C9BD0E5106FC070F4F7B3C391EFEA93624 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 04 Aug 2023 13:33:12 +0800, Ian Kent wrote: > Syzkaller reports a memory leak: > > BUG: memory leak > unreferenced object 0xffff88810b279e00 (size 96): > comm "syz-executor399", pid 3631, jiffies 4294964921 (age 23.870s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 08 9e 27 0b 81 88 ff ff ..........'..... > 08 9e 27 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ..'............. > backtrace: > [] kmalloc_trace+0x20/0x90 mm/slab_common.c:1046 > [] kmalloc include/linux/slab.h:576 [inline] > [] autofs_wait+0x3fa/0x9a0 fs/autofs/waitq.c:378 > [] autofs_do_expire_multi+0xa7/0x3e0 fs/autofs/expire.c:593 > [] autofs_expire_multi+0x53/0x80 fs/autofs/expire.c:619 > [] autofs_root_ioctl_unlocked+0x322/0x3b0 fs/autofs/root.c:897 > [] autofs_root_ioctl+0x25/0x30 fs/autofs/root.c:910 > [] vfs_ioctl fs/ioctl.c:51 [inline] > [] __do_sys_ioctl fs/ioctl.c:870 [inline] > [] __se_sys_ioctl fs/ioctl.c:856 [inline] > [] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:856 > [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] > [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > [] entry_SYSCALL_64_after_hwframe+0x63/0xcd > > [...] Applied to the vfs.autofs branch of the vfs/vfs.git tree. Patches in the vfs.autofs branch should appear in linux-next soon. Please report any outstanding bugs that were missed during review in a new review to the original patch series allowing us to drop it. It's encouraged to provide Acked-bys and Reviewed-bys even though the patch has now been applied. If possible patch trailers will be updated. Note that commit hashes shown below are subject to change due to rebase, trailer updates or similar. If in doubt, please check the listed branch. tree: https://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs.git branch: vfs.autofs [1/2] autofs: fix memory leak of waitqueues in autofs_catatonic_mode https://git.kernel.org/vfs/vfs/c/ccbe77f7e45d [2/2] autofs: use wake_up() instead of wake_up_interruptible(() https://git.kernel.org/vfs/vfs/c/17fce12e7c0a