public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: syzbot <syzbot+d66de4cbf532749df35f@syzkaller.appspotmail.com>
To: bragathemanick0908@gmail.com, linux-kernel@vger.kernel.org,
	syzkaller-bugs@googlegroups.com
Subject: Re: [syzbot] [btrfs?] memory leak in btrfs_ref_tree_mod
Date: Thu, 16 Nov 2023 02:22:05 -0800	[thread overview]
Message-ID: <0000000000003048a9060a42649f@google.com> (raw)
In-Reply-To: <ceaf0f0d-d943-4c1a-a531-5193ea64dd29@gmail.com>

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in add_tree_block

BUG: memory leak
unreferenced object 0xffff88812611f380 (size 64):
  comm "syz-executor.5", pid 7474, jiffies 4294960257 (age 171.960s)
  hex dump (first 32 bytes):
    03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815545e5>] kmalloc_trace+0x25/0x90 mm/slab_common.c:1076
    [<ffffffff82172d99>] kmalloc include/linux/slab.h:582 [inline]
    [<ffffffff82172d99>] add_tree_block+0x39/0x240 fs/btrfs/ref-verify.c:319
    [<ffffffff821743f9>] process_extent_item fs/btrfs/ref-verify.c:474 [inline]
    [<ffffffff821743f9>] process_leaf fs/btrfs/ref-verify.c:521 [inline]
    [<ffffffff821743f9>] walk_down_tree fs/btrfs/ref-verify.c:573 [inline]
    [<ffffffff821743f9>] btrfs_build_ref_tree+0x589/0x850 fs/btrfs/ref-verify.c:1008
    [<ffffffff8205ec90>] open_ctree+0x1890/0x2270 fs/btrfs/disk-io.c:3471
    [<ffffffff8202582f>] btrfs_fill_super fs/btrfs/super.c:1154 [inline]
    [<ffffffff8202582f>] btrfs_mount_root+0x5af/0x750 fs/btrfs/super.c:1519
    [<ffffffff816d3e39>] legacy_get_tree+0x29/0x80 fs/fs_context.c:611
    [<ffffffff8166b7ea>] vfs_get_tree+0x2a/0x110 fs/super.c:1519
    [<ffffffff816a776b>] fc_mount fs/namespace.c:1112 [inline]
    [<ffffffff816a776b>] vfs_kern_mount.part.0+0xcb/0x110 fs/namespace.c:1142
    [<ffffffff816a77ef>] vfs_kern_mount+0x3f/0x60 fs/namespace.c:1129
    [<ffffffff820298b2>] btrfs_mount+0x1e2/0x660 fs/btrfs/super.c:1579
    [<ffffffff816d3e39>] legacy_get_tree+0x29/0x80 fs/fs_context.c:611
    [<ffffffff8166b7ea>] vfs_get_tree+0x2a/0x110 fs/super.c:1519
    [<ffffffff816afcff>] do_new_mount fs/namespace.c:3335 [inline]
    [<ffffffff816afcff>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662
    [<ffffffff816b08f1>] do_mount fs/namespace.c:3675 [inline]
    [<ffffffff816b08f1>] __do_sys_mount fs/namespace.c:3884 [inline]
    [<ffffffff816b08f1>] __se_sys_mount fs/namespace.c:3861 [inline]
    [<ffffffff816b08f1>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861
    [<ffffffff84ad2bb8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [<ffffffff84ad2bb8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
    [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff88812611f500 (size 64):
  comm "syz-executor.5", pid 7474, jiffies 4294960257 (age 171.960s)
  hex dump (first 32 bytes):
    03 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815545e5>] kmalloc_trace+0x25/0x90 mm/slab_common.c:1076
    [<ffffffff82172755>] kmalloc include/linux/slab.h:582 [inline]
    [<ffffffff82172755>] kzalloc include/linux/slab.h:703 [inline]
    [<ffffffff82172755>] add_block_entry+0x35/0x320 fs/btrfs/ref-verify.c:270
    [<ffffffff82172df6>] add_tree_block+0x96/0x240 fs/btrfs/ref-verify.c:332
    [<ffffffff821743f9>] process_extent_item fs/btrfs/ref-verify.c:474 [inline]
    [<ffffffff821743f9>] process_leaf fs/btrfs/ref-verify.c:521 [inline]
    [<ffffffff821743f9>] walk_down_tree fs/btrfs/ref-verify.c:573 [inline]
    [<ffffffff821743f9>] btrfs_build_ref_tree+0x589/0x850 fs/btrfs/ref-verify.c:1008
    [<ffffffff8205ec90>] open_ctree+0x1890/0x2270 fs/btrfs/disk-io.c:3471
    [<ffffffff8202582f>] btrfs_fill_super fs/btrfs/super.c:1154 [inline]
    [<ffffffff8202582f>] btrfs_mount_root+0x5af/0x750 fs/btrfs/super.c:1519
    [<ffffffff816d3e39>] legacy_get_tree+0x29/0x80 fs/fs_context.c:611
    [<ffffffff8166b7ea>] vfs_get_tree+0x2a/0x110 fs/super.c:1519
    [<ffffffff816a776b>] fc_mount fs/namespace.c:1112 [inline]
    [<ffffffff816a776b>] vfs_kern_mount.part.0+0xcb/0x110 fs/namespace.c:1142
    [<ffffffff816a77ef>] vfs_kern_mount+0x3f/0x60 fs/namespace.c:1129
    [<ffffffff820298b2>] btrfs_mount+0x1e2/0x660 fs/btrfs/super.c:1579
    [<ffffffff816d3e39>] legacy_get_tree+0x29/0x80 fs/fs_context.c:611
    [<ffffffff8166b7ea>] vfs_get_tree+0x2a/0x110 fs/super.c:1519
    [<ffffffff816afcff>] do_new_mount fs/namespace.c:3335 [inline]
    [<ffffffff816afcff>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662
    [<ffffffff816b08f1>] do_mount fs/namespace.c:3675 [inline]
    [<ffffffff816b08f1>] __do_sys_mount fs/namespace.c:3884 [inline]
    [<ffffffff816b08f1>] __se_sys_mount fs/namespace.c:3861 [inline]
    [<ffffffff816b08f1>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861
    [<ffffffff84ad2bb8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [<ffffffff84ad2bb8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80

BUG: memory leak
unreferenced object 0xffff8881260d4300 (size 96):
  comm "syz-executor.5", pid 7474, jiffies 4294960257 (age 171.960s)
  hex dump (first 32 bytes):
    00 10 10 00 00 00 00 00 00 10 00 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00  ................
  backtrace:
    [<ffffffff815545e5>] kmalloc_trace+0x25/0x90 mm/slab_common.c:1076
    [<ffffffff8217276e>] kmalloc include/linux/slab.h:582 [inline]
    [<ffffffff8217276e>] kzalloc include/linux/slab.h:703 [inline]
    [<ffffffff8217276e>] add_block_entry+0x4e/0x320 fs/btrfs/ref-verify.c:271
    [<ffffffff82172df6>] add_tree_block+0x96/0x240 fs/btrfs/ref-verify.c:332
    [<ffffffff821743f9>] process_extent_item fs/btrfs/ref-verify.c:474 [inline]
    [<ffffffff821743f9>] process_leaf fs/btrfs/ref-verify.c:521 [inline]
    [<ffffffff821743f9>] walk_down_tree fs/btrfs/ref-verify.c:573 [inline]
    [<ffffffff821743f9>] btrfs_build_ref_tree+0x589/0x850 fs/btrfs/ref-verify.c:1008
    [<ffffffff8205ec90>] open_ctree+0x1890/0x2270 fs/btrfs/disk-io.c:3471
    [<ffffffff8202582f>] btrfs_fill_super fs/btrfs/super.c:1154 [inline]
    [<ffffffff8202582f>] btrfs_mount_root+0x5af/0x750 fs/btrfs/super.c:1519
    [<ffffffff816d3e39>] legacy_get_tree+0x29/0x80 fs/fs_context.c:611
    [<ffffffff8166b7ea>] vfs_get_tree+0x2a/0x110 fs/super.c:1519
    [<ffffffff816a776b>] fc_mount fs/namespace.c:1112 [inline]
    [<ffffffff816a776b>] vfs_kern_mount.part.0+0xcb/0x110 fs/namespace.c:1142
    [<ffffffff816a77ef>] vfs_kern_mount+0x3f/0x60 fs/namespace.c:1129
    [<ffffffff820298b2>] btrfs_mount+0x1e2/0x660 fs/btrfs/super.c:1579
    [<ffffffff816d3e39>] legacy_get_tree+0x29/0x80 fs/fs_context.c:611
    [<ffffffff8166b7ea>] vfs_get_tree+0x2a/0x110 fs/super.c:1519
    [<ffffffff816afcff>] do_new_mount fs/namespace.c:3335 [inline]
    [<ffffffff816afcff>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662
    [<ffffffff816b08f1>] do_mount fs/namespace.c:3675 [inline]
    [<ffffffff816b08f1>] __do_sys_mount fs/namespace.c:3884 [inline]
    [<ffffffff816b08f1>] __se_sys_mount fs/namespace.c:3861 [inline]
    [<ffffffff816b08f1>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861
    [<ffffffff84ad2bb8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [<ffffffff84ad2bb8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80



Tested on:

commit:         25aa0beb Merge tag 'net-6.5-rc6' of git://git.kernel.o..
git tree:       git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
console output: https://syzkaller.appspot.com/x/log.txt?x=11a0c5b7680000
kernel config:  https://syzkaller.appspot.com/x/.config?x=2bf8962e4f7984f4
dashboard link: https://syzkaller.appspot.com/bug?extid=d66de4cbf532749df35f
compiler:       gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=1799b938e80000


       reply	other threads:[~2023-11-16 10:22 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <ceaf0f0d-d943-4c1a-a531-5193ea64dd29@gmail.com>
2023-11-16 10:22 ` syzbot [this message]
     [not found] <739186bcb83d46101812b06d7e9abb80@foxhound.fi>
2023-11-13 12:28 ` [syzbot] [btrfs?] memory leak in btrfs_ref_tree_mod syzbot
     [not found] <7f87b3b9-6876-40d7-b159-94f2119851f9@gmail.com>
2023-11-12 11:52 ` syzbot
     [not found] <441aa0e4-b676-4d0a-a35e-c2f7a912f987@gmail.com>
2023-11-12 10:31 ` syzbot
     [not found] <143960be-a7d7-44fc-a69f-60e1d12eacdb@gmail.com>
2023-11-12  9:58 ` syzbot
     [not found] <077cd80b-022f-4401-a32a-33c452bd0179@gmail.com>
2023-11-12  9:23 ` syzbot
2023-08-15  9:15 syzbot
2023-11-12 13:08 ` Bragatheswaran Manickavel
2023-11-12 13:45   ` syzbot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0000000000003048a9060a42649f@google.com \
    --to=syzbot+d66de4cbf532749df35f@syzkaller.appspotmail.com \
    --cc=bragathemanick0908@gmail.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=syzkaller-bugs@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox