Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp3319344rdb; Sun, 10 Dec 2023 00:13:34 -0800 (PST) X-Google-Smtp-Source: AGHT+IEUab0HFJK1KGCKnVgiyPfskL8luLNtpdb8oRNrb5L/YTsv3qLLAmmo3yHzTgUeHXtg39UW X-Received: by 2002:a17:902:ab5a:b0:1d0:6ffd:6114 with SMTP id ij26-20020a170902ab5a00b001d06ffd6114mr2949990plb.54.1702196014429; Sun, 10 Dec 2023 00:13:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702196014; cv=none; d=google.com; s=arc-20160816; b=pVc9pB/o8IY6LTEkPoKl+Qhl/KpUNaU9KHNMw8SKwqhR+3JXN/2k98sCm5PSfE8wW5 jjOImZat53ONp+1VOQ/nN1sb19h8vDr3XI9aMZVrBqMnhvZvs0m0zpWKDaXuMotRLq1L qWC9K+xmOhA/0OWAMynTDyo8cu1AsEO/bmUHBCBTUixariVhK2Lj3j5EcQmW+CYRLkYe dcI9+DOJE1PyAh+gZKSCrgN/Qq5P5Wji6bhykMPDUwGLacDL4nT4sMu+mxLVquDaCmcd 7wowaH5bkEPfos524PZJJbjaK51hDi/yXPVVeW9GSXd2eDac6M8ZbX6YYcTWGW32PFJT d2gQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:in-reply-to:date :mime-version; bh=DDcqDSo0luJBPZRr5X8W/lW27xG0MXkNcXRt+xChv+s=; fh=ASkzh1hihoqljkDw3HfUYnTGfH8gTlTbXU5VCwnW0rg=; b=KxB/rZVrq6R6EuJJYgwUQ9iqoCdKtNA2JFRTdkmX8hL0mpnO/I5Tidd/MQVtyOpVFu fHwnEDFuxt4ADxIbxRGuNt4DyQxrTHr0k3MVQgglwdTCgyCfq84ByRdPa+OpAovN2PA6 m8kwf6vJtmlWtn7OCadCGGo+sl5aVlMtc/F57U92s76VSAzB8te4avYn7YfLSqPWIivf 7+ptNk3zmzyemkGwzAXNUxQtKcpA7q3rxRWpqUKVYMxNj6E1q1n+z8Dx7IfnWPG6l44Z enRhDU677tjSJ6y/bWk33WMYhoTSgBY+Zk7fT7gkxoKOAASiAew/qFy+Nr+npBrOC+tA Q2iw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id c10-20020a170902d48a00b001d07126d233si4413759plg.564.2023.12.10.00.13.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 10 Dec 2023 00:13:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 6205D8069D92; Sun, 10 Dec 2023 00:13:31 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231749AbjLJINB (ORCPT + 99 others); Sun, 10 Dec 2023 03:13:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32890 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229482AbjLJIM6 (ORCPT ); Sun, 10 Dec 2023 03:12:58 -0500 Received: from mail-ot1-f71.google.com (mail-ot1-f71.google.com [209.85.210.71]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A4A69C5 for ; Sun, 10 Dec 2023 00:13:04 -0800 (PST) Received: by mail-ot1-f71.google.com with SMTP id 46e09a7af769-6d9decbc5d7so4058967a34.2 for ; Sun, 10 Dec 2023 00:13:04 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702195984; x=1702800784; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=DDcqDSo0luJBPZRr5X8W/lW27xG0MXkNcXRt+xChv+s=; b=M+y4NJBvh+tiMNjPnEhQbMqBBUWzT1aFGdyuzIAqVnH1ZxXp+1BUAjx9y630WFcNl4 XLiZZYT1KXasLBzojOPaVxJxggzXjpiOdHxvZI2knol/fZ/rJ7AKxS43CUrI3xnqvX1W GZnmT8VnAfhKqJCnWYtPNJUYobKpJx2hNTLvR4srY4+vC5xzmCodOPDQIYgkUgeIFarq 5H6TUlW3bpbZ4UvCzJhDlawAZo9ZxKRlu/wfO0mXEd6c+QXjDCp2CZ7jQa1KDzKdpkiX O8LZtqHWrSuaZSlFA3NnuLSRup1QLX/Rphsfrvi4MrHs5bPZHt3A+lKSoGldyB/Rdx0q Fz/Q== X-Gm-Message-State: AOJu0Yy+9eXSrYk+wUcdJ2PZIYo7EHscaYt70qKlVgGI7QDGtaqYrIOA 7U8sjPJpypPpz3XL91NaWib3073PyazZkev2QZb3xlMbrCDS MIME-Version: 1.0 X-Received: by 2002:a05:6830:4428:b0:6d9:da80:7f38 with SMTP id q40-20020a056830442800b006d9da807f38mr2350017otv.5.1702195984061; Sun, 10 Dec 2023 00:13:04 -0800 (PST) Date: Sun, 10 Dec 2023 00:13:04 -0800 In-Reply-To: X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000f7dc33060c2362be@google.com> Subject: Re: [syzbot] [arm-msm?] [net?] memory leak in radix_tree_insert (2) From: syzbot To: eadavis@qq.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=1.1 required=5.0 tests=FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_SORBS_WEB, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Sun, 10 Dec 2023 00:13:31 -0800 (PST) X-Spam-Level: * Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: memory leak in radix_tree_insert 2023/12/10 08:04:23 executed programs: 3 BUG: memory leak unreferenced object 0xffff88810b920000 (size 576): comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s) hex dump (first 32 bytes): 3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 30 79 97 0c 81 88 ff ff 18 00 92 0b 81 88 ff ff 0y.............. backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:636 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:724 [] qrtr_tx_wait net/qrtr/af_qrtr.c:277 [inline] [] qrtr_node_enqueue+0x5d0/0x6a0 net/qrtr/af_qrtr.c:356 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:899 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:1000 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810b920248 (size 576): comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s) hex dump (first 32 bytes): 36 0f 01 00 00 00 00 00 00 00 92 0b 81 88 ff ff 6............... 30 79 97 0c 81 88 ff ff 60 02 92 0b 81 88 ff ff 0y......`....... backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:636 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:724 [] qrtr_tx_wait net/qrtr/af_qrtr.c:277 [inline] [] qrtr_node_enqueue+0x5d0/0x6a0 net/qrtr/af_qrtr.c:356 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:899 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:1000 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810b920490 (size 576): comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s) hex dump (first 32 bytes): 30 3f 01 00 00 00 00 00 48 02 92 0b 81 88 ff ff 0?......H....... 30 79 97 0c 81 88 ff ff a8 04 92 0b 81 88 ff ff 0y.............. backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:636 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:724 [] qrtr_tx_wait net/qrtr/af_qrtr.c:277 [inline] [] qrtr_node_enqueue+0x5d0/0x6a0 net/qrtr/af_qrtr.c:356 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:899 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:1000 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810b9206d8 (size 576): comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s) hex dump (first 32 bytes): 2a 3f 00 00 00 00 00 00 90 04 92 0b 81 88 ff ff *?.............. 30 79 97 0c 81 88 ff ff f0 06 92 0b 81 88 ff ff 0y.............. backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] slab_alloc mm/slub.c:3486 [inline] [] __kmem_cache_alloc_lru mm/slub.c:3493 [inline] [] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 lib/radix-tree.c:276 [] __radix_tree_create lib/radix-tree.c:636 [inline] [] radix_tree_insert+0x14f/0x360 lib/radix-tree.c:724 [] qrtr_tx_wait net/qrtr/af_qrtr.c:277 [inline] [] qrtr_node_enqueue+0x5d0/0x6a0 net/qrtr/af_qrtr.c:356 [] qrtr_bcast_enqueue+0x66/0xd0 net/qrtr/af_qrtr.c:899 [] qrtr_sendmsg+0x232/0x450 net/qrtr/af_qrtr.c:1000 [] sock_sendmsg_nosec net/socket.c:730 [inline] [] __sock_sendmsg+0x52/0xa0 net/socket.c:745 [] sock_write_iter+0xfb/0x180 net/socket.c:1158 [] call_write_iter include/linux/fs.h:2020 [inline] [] new_sync_write fs/read_write.c:491 [inline] [] vfs_write+0x327/0x590 fs/read_write.c:584 [] ksys_write+0x13b/0x170 fs/read_write.c:637 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b Tested on: commit: 33cc938e Linux 6.7-rc4 git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git console output: https://syzkaller.appspot.com/x/log.txt?x=120e98b2e80000 kernel config: https://syzkaller.appspot.com/x/.config?x=37d1b8bb20150e6 dashboard link: https://syzkaller.appspot.com/bug?extid=006987d1be3586e13555 compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 patch: https://syzkaller.appspot.com/x/patch.diff?x=13605feee80000