From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 99A91C43334 for ; Mon, 11 Jul 2022 20:38:14 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E0D146B0106; Mon, 11 Jul 2022 16:38:13 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D94AE6B0107; Mon, 11 Jul 2022 16:38:13 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C35BC6B0108; Mon, 11 Jul 2022 16:38:13 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id AED8B6B0106 for ; Mon, 11 Jul 2022 16:38:13 -0400 (EDT) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 7E58B6094A for ; Mon, 11 Jul 2022 20:38:13 +0000 (UTC) X-FDA: 79675981266.11.182C69E Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf12.hostedemail.com (Postfix) with ESMTP id A07F940064 for ; Mon, 11 Jul 2022 20:38:12 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E8AF2B811B6; Mon, 11 Jul 2022 20:38:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5213CC34115; Mon, 11 Jul 2022 20:38:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1657571889; bh=cnUVDubaNzgk0NffKk3JKU3NhkVJCM3oATbypnRcSEk=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LuAl+cFs4Fg+MB+xruxD0UC2PnnjqqSu2UYAi7KWvWCW2rGnfoRP2Eb3P/XXi6o/z 38sJExI+8Ek1aKpm+jY2ND0rquSZgj9UgYGA8TZFc0F2gV/GYqorz78SDvl7Rt5tAg TPZLbLaHXo8bkFXo1MpM9/oCUoLfKzV0VN3yXwUg= Date: Mon, 11 Jul 2022 13:38:08 -0700 From: Andrew Morton To: syzbot Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, syzkaller-bugs@googlegroups.com, Zach O'Keefe , Yang Shi , Liam Howlett Subject: Re: [syzbot] memory leak in xas_create Message-Id: <20220711133808.d86400ce9960febcb0fd537b@linux-foundation.org> In-Reply-To: <000000000000eb2d6c05e35a0d73@google.com> References: <000000000000eb2d6c05e35a0d73@google.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1657571892; a=rsa-sha256; cv=none; b=gpncyrWpyXTPbvOjh5VQtqpwo9rJm1or0HHEmZnES7psT9m4conn45EvbblHt4HGNPUcgR pXCMHOpafcQImrd8L1UeTJ3r/e5PgklNlb7nQ8tD2kqgSzv36nIVijT28AzUPJK39TbIDF rTSrQ0XuMgqu97Gx1jf2wc2IqMYq60M= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1657571892; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=uNLhbiMh/lF+44VJFlt01N/vTu98RSZnubpB7I7BwSM=; b=B/7sV/pHBGztLjCnVkZtkQO8fVpjtt0qJXTGoULrW+hYEkJIbeNkybJfYtjQ0W8G8wprxT w1q32IDPjz8djfADTgulJF5UKK3p0pvgU2Lq5JLonwyRb+6EGiiTMV/QyA0iR+Q6i11h8v SJVpxrJC9RP0+pEhWEb0cn7tZLiWOKw= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=LuAl+cFs; dmarc=none; spf=pass (imf12.hostedemail.com: domain of akpm@linux-foundation.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=LuAl+cFs; dmarc=none; spf=pass (imf12.hostedemail.com: domain of akpm@linux-foundation.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org X-Rspamd-Server: rspam03 X-Stat-Signature: 1f847x1k8wdswnk8h1rbak13a7p4k95w X-Rspamd-Queue-Id: A07F940064 X-Rspam-User: X-HE-Tag: 1657571892-784233 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Sat, 09 Jul 2022 00:13:23 -0700 syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: c1084b6c5620 Merge tag 'soc-fixes-5.19-2' of git://git.ker.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=14967ccc080000 > kernel config: https://syzkaller.appspot.com/x/.config?x=916233b7694a38ff > dashboard link: https://syzkaller.appspot.com/bug?extid=a785d07959bc94837d51 > compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=122ae834080000 > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+a785d07959bc94837d51@syzkaller.appspotmail.com > > 2022/07/05 05:22:17 executed programs: 828 > 2022/07/05 05:22:23 executed programs: 846 > 2022/07/05 05:22:30 executed programs: 866 > 2022/07/05 05:22:37 executed programs: 875 > BUG: memory leak Thanks. Presumably due to khugepaged changes. Can we expect a bisection search? > unreferenced object 0xffff888113662480 (size 576): > comm "khugepaged", pid 32, jiffies 4295002751 (age 22.940s) > hex dump (first 32 bytes): > 06 15 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 58 08 46 1d 81 88 ff ff 98 24 66 13 81 88 ff ff X.F......$f..... > backtrace: > [] xas_alloc+0xf6/0x120 lib/xarray.c:377 > [] xas_create+0x395/0x820 lib/xarray.c:679 > [] xas_create_range+0xa0/0x1c0 lib/xarray.c:719 > [] collapse_file+0x283/0x2870 mm/khugepaged.c:1670 > [] khugepaged_scan_file mm/khugepaged.c:2072 [inline] > [] khugepaged_scan_mm_slot mm/khugepaged.c:2167 [inline] > [] khugepaged_do_scan mm/khugepaged.c:2251 [inline] > [] khugepaged+0x227c/0x43a0 mm/khugepaged.c:2296 > [] kthread+0x125/0x160 kernel/kthread.c:376 > [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 > > BUG: memory leak > unreferenced object 0xffff8881136e2900 (size 576): > comm "khugepaged", pid 32, jiffies 4295002751 (age 22.940s) > hex dump (first 32 bytes): > 00 07 00 00 00 00 00 00 80 24 66 13 81 88 ff ff .........$f..... > 58 08 46 1d 81 88 ff ff 18 29 6e 13 81 88 ff ff X.F......)n..... > backtrace: > [] xas_alloc+0xf6/0x120 lib/xarray.c:377 > [] xas_create+0x395/0x820 lib/xarray.c:679 > [] xas_create_range+0xa0/0x1c0 lib/xarray.c:719 > [] collapse_file+0x283/0x2870 mm/khugepaged.c:1670 > [] khugepaged_scan_file mm/khugepaged.c:2072 [inline] > [] khugepaged_scan_mm_slot mm/khugepaged.c:2167 [inline] > [] khugepaged_do_scan mm/khugepaged.c:2251 [inline] > [] khugepaged+0x227c/0x43a0 mm/khugepaged.c:2296 > [] kthread+0x125/0x160 kernel/kthread.c:376 > [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 > > BUG: memory leak > unreferenced object 0xffff8881136e0480 (size 576): > comm "khugepaged", pid 32, jiffies 4295002751 (age 22.940s) > hex dump (first 32 bytes): > 00 06 00 00 00 00 00 00 80 24 66 13 81 88 ff ff .........$f..... > 58 08 46 1d 81 88 ff ff 98 04 6e 13 81 88 ff ff X.F.......n..... > backtrace: > [] xas_alloc+0xf6/0x120 lib/xarray.c:377 > [] xas_create+0x395/0x820 lib/xarray.c:679 > [] xas_create_range+0xa0/0x1c0 lib/xarray.c:719 > [] collapse_file+0x283/0x2870 mm/khugepaged.c:1670 > [] khugepaged_scan_file mm/khugepaged.c:2072 [inline] > [] khugepaged_scan_mm_slot mm/khugepaged.c:2167 [inline] > [] khugepaged_do_scan mm/khugepaged.c:2251 [inline] > [] khugepaged+0x227c/0x43a0 mm/khugepaged.c:2296 > [] kthread+0x125/0x160 kernel/kthread.c:376 > [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 > > BUG: memory leak > unreferenced object 0xffff8881136de900 (size 576): > comm "khugepaged", pid 32, jiffies 4295002751 (age 22.940s) > hex dump (first 32 bytes): > 00 05 00 00 00 00 00 00 80 24 66 13 81 88 ff ff .........$f..... > 58 08 46 1d 81 88 ff ff 18 e9 6d 13 81 88 ff ff X.F.......m..... > backtrace: > [] xas_alloc+0xf6/0x120 lib/xarray.c:377 > [] xas_create+0x395/0x820 lib/xarray.c:679 > [] xas_create_range+0xa0/0x1c0 lib/xarray.c:719 > [] collapse_file+0x283/0x2870 mm/khugepaged.c:1670 > [] khugepaged_scan_file mm/khugepaged.c:2072 [inline] > [] khugepaged_scan_mm_slot mm/khugepaged.c:2167 [inline] > [] khugepaged_do_scan mm/khugepaged.c:2251 [inline] > [] khugepaged+0x227c/0x43a0 mm/khugepaged.c:2296 > [] kthread+0x125/0x160 kernel/kthread.c:376 > [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 > > BUG: memory leak > unreferenced object 0xffff88811371b6c0 (size 576): > comm "khugepaged", pid 32, jiffies 4295002751 (age 22.940s) > hex dump (first 32 bytes): > 00 04 00 00 00 00 00 00 80 24 66 13 81 88 ff ff .........$f..... > 58 08 46 1d 81 88 ff ff d8 b6 71 13 81 88 ff ff X.F.......q..... > backtrace: > [] xas_alloc+0xf6/0x120 lib/xarray.c:377 > [] xas_create+0x395/0x820 lib/xarray.c:679 > [] xas_create_range+0xa0/0x1c0 lib/xarray.c:719 > [] collapse_file+0x283/0x2870 mm/khugepaged.c:1670 > [] khugepaged_scan_file mm/khugepaged.c:2072 [inline] > [] khugepaged_scan_mm_slot mm/khugepaged.c:2167 [inline] > [] khugepaged_do_scan mm/khugepaged.c:2251 [inline] > [] khugepaged+0x227c/0x43a0 mm/khugepaged.c:2296 > [] kthread+0x125/0x160 kernel/kthread.c:376 > [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 > > BUG: memory leak > unreferenced object 0xffff888113666d80 (size 576): > comm "khugepaged", pid 32, jiffies 4295002751 (age 22.940s) > hex dump (first 32 bytes): > 00 03 00 00 00 00 00 00 80 24 66 13 81 88 ff ff .........$f..... > 58 08 46 1d 81 88 ff ff 98 6d 66 13 81 88 ff ff X.F......mf..... > backtrace: > [] xas_alloc+0xf6/0x120 lib/xarray.c:377 > [] xas_create+0x395/0x820 lib/xarray.c:679 > [] xas_create_range+0xa0/0x1c0 lib/xarray.c:719 > [] collapse_file+0x283/0x2870 mm/khugepaged.c:1670 > [] khugepaged_scan_file mm/khugepaged.c:2072 [inline] > [] khugepaged_scan_mm_slot mm/khugepaged.c:2167 [inline] > [] khugepaged_do_scan mm/khugepaged.c:2251 [inline] > [] khugepaged+0x227c/0x43a0 mm/khugepaged.c:2296 > [] kthread+0x125/0x160 kernel/kthread.c:376 > [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 > > > > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > syzbot can test patches for this issue, for details see: > https://goo.gl/tpsmEJ#testing-patches