Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp3255863rdb; Sat, 9 Dec 2023 20:08:51 -0800 (PST) X-Google-Smtp-Source: AGHT+IGqOWvSG7FBhN0OvP3zPWizCQ56l1lBVl+YQGAcza+/m+1Lfp2/DqIU5jff7SLDJM3A6Llp X-Received: by 2002:a05:6a20:560c:b0:18f:97c:928a with SMTP id ir12-20020a056a20560c00b0018f097c928amr1087010pzc.111.1702181330710; Sat, 09 Dec 2023 20:08:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702181330; cv=none; d=google.com; s=arc-20160816; b=KVxL9kDno2pFBvmYh5H/arfovs/ZbHpUFyG+PuHlysKRvqHvFx48BkY/HckJaFUtee RYHy/GwtosHo1dd2PdwP41tyZsXJHLfOvA6/74/ZOPFRi3DoTAS2WLDh6lSZ6VZab5gz K+LTI+MwcOxDM4DhZnLeR3Uiqu5G+qPHS//kHi6hYjd5i6idmjyBUznumICgbbn9+/mS SlH07IgzovUeAtZ2P+c2kWo0heFegajquMw11aasNnZBDnGddH1N6n9yQ0Z1laF+dcx9 gIr59Lfuri7/3AyrKByKs8fxdWHymAVtehF/ZKtq0GNxtFaerWIQDP3FbmCAiNklC0ft 5l0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:in-reply-to:date :mime-version; bh=O1ucpX9GtPXf2qy8IMPdYCdmRnC06lUTmQWKejBpx6c=; fh=ASkzh1hihoqljkDw3HfUYnTGfH8gTlTbXU5VCwnW0rg=; b=DC3+QmOyrGLP5D78lWGnWpussQUGShnGB4ElqXz7WEhCgtngqdg7EkTAunN2D6EL/L GoWo1JDamVbd5X6uN55TOZHLpQg53Oe9YnmSgd86yh3HTo4JA0XtDP3GN8yTDf1RFOkO KVwDD2Tn9UzyxffsEMs7UUDWqjQtT5R1LSZf8FSVRJL9SHGWXQ4/mUU1JP2qNMGBnaas 546/oCK40x2YTPCJ0855jknnPM3grciLXzpR35/YfXGzdxXDd8LvMHoQuM4OZF5D3vy6 zlaqHEyI7Bl8Hmfk2JHegfyzAvLFIPBvz/rvy8zDjCnqUMBKbApNeMGnQkVJD8ZPsG9Q EwCA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id k10-20020a170902694a00b001bc162f3318si3890878plt.640.2023.12.09.20.08.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 09 Dec 2023 20:08:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 4463B80984B3; Sat, 9 Dec 2023 20:08:49 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231492AbjLJEIj (ORCPT + 99 others); Sat, 9 Dec 2023 23:08:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55882 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231693AbjLJEIQ (ORCPT ); Sat, 9 Dec 2023 23:08:16 -0500 Received: from mail-oa1-f72.google.com (mail-oa1-f72.google.com [209.85.160.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B4F38EB for ; Sat, 9 Dec 2023 20:08:07 -0800 (PST) Received: by mail-oa1-f72.google.com with SMTP id 586e51a60fabf-1faf4442fa5so5859063fac.1 for ; Sat, 09 Dec 2023 20:08:07 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702181287; x=1702786087; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=O1ucpX9GtPXf2qy8IMPdYCdmRnC06lUTmQWKejBpx6c=; b=PAT86h3nAjH/I72SwgsAdK8mTg9YhGFb5cCtkxD32oIhn4nIrZLuGDFxnFw5a423Lv EbXbS8YJY5gx1CMBX0wM1lbfjk/PWB1lXPJTHxM5hoJi0e5T+N14CLQ+hmt0Ock/U3vw Oy1QFrdEA2H15NlhIB/NghS4pERVzu5mgaV1vJDr4r7kk+0FkQ/fbITBaRqOnlDdk1cf VWtVtGHwoRqjz1STr5uEL+/IUFG5gavfNHRg6iZRaPSxdhN3taMaooTHKpvRWx7Etu4T C0kMT94CD08Jm/slNHDRDRYjtaGHGU6wodIOtJGu8VUwXgTI2PRngB78BOwvhVmcny6p kyAg== X-Gm-Message-State: AOJu0YwOMhv8+rdNeec8cXD0SUNi+wkmSk+0/iEemze+4SrM8LEKCVQj NOPWKnWihrgBg1Veyctz9vGx7uVjf22/EEY/+yXYdaGFKtSd MIME-Version: 1.0 X-Received: by 2002:a05:6870:e415:b0:1fb:f51:25bb with SMTP id n21-20020a056870e41500b001fb0f5125bbmr2665014oag.5.1702181287071; Sat, 09 Dec 2023 20:08:07 -0800 (PST) Date: Sat, 09 Dec 2023 20:08:07 -0800 In-Reply-To: X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000f59633060c1ff65d@google.com> Subject: Re: [syzbot] [arm-msm?] [net?] memory leak in radix_tree_insert (2) From: syzbot To: eadavis@qq.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=1.2 required=5.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,RCVD_IN_SORBS_WEB,RCVD_IN_VALIDITY_RPBL, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: * X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Sat, 09 Dec 2023 20:08:49 -0800 (PST) Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: memory leak in radix_tree_insert 2023/12/10 04:02:40 executed programs: 1 BUG: memory leak unreferenced object 0xffff88810e4ac248 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 30 3c 8d 1a 81 88 ff ff 60 c2 4a 0e 81 88 ff ff 0<......`.J..... backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:624 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:712 [] qrtr_tx_wait net/qrtr/af_qrtr.c:281 [inline] [] qrtr_node_enqueue+0x512/0x6d0 net/qrtr/af_qrtr.c:354 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:897 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:998 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810e4ac000 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 36 0f 01 00 00 00 00 00 48 c2 4a 0e 81 88 ff ff 6.......H.J..... 30 3c 8d 1a 81 88 ff ff 18 c0 4a 0e 81 88 ff ff 0<........J..... backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:624 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:712 [] qrtr_tx_wait net/qrtr/af_qrtr.c:281 [inline] [] qrtr_node_enqueue+0x512/0x6d0 net/qrtr/af_qrtr.c:354 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:897 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:998 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810e4adda8 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 30 3f 01 00 00 00 00 00 00 c0 4a 0e 81 88 ff ff 0?........J..... 30 3c 8d 1a 81 88 ff ff c0 dd 4a 0e 81 88 ff ff 0<........J..... backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:624 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:712 [] qrtr_tx_wait net/qrtr/af_qrtr.c:281 [inline] [] qrtr_node_enqueue+0x512/0x6d0 net/qrtr/af_qrtr.c:354 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:897 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:998 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810e4da000 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 2a 3f 00 00 00 00 00 00 a8 dd 4a 0e 81 88 ff ff *?........J..... 30 3c 8d 1a 81 88 ff ff 18 a0 4d 0e 81 88 ff ff 0<........M..... backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:624 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:712 [] qrtr_tx_wait net/qrtr/af_qrtr.c:281 [inline] [] qrtr_node_enqueue+0x512/0x6d0 net/qrtr/af_qrtr.c:354 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:897 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:998 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b Tested on: commit: 33cc938e Linux 6.7-rc4 git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git console output: https://syzkaller.appspot.com/x/log.txt?x=1485aebce80000 kernel config: https://syzkaller.appspot.com/x/.config?x=37d1b8bb20150e6 dashboard link: https://syzkaller.appspot.com/bug?extid=006987d1be3586e13555 compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 patch: https://syzkaller.appspot.com/x/patch.diff?x=10dfa02ae80000