From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.7 required=3.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C51EDC433ED for ; Fri, 9 Apr 2021 05:43:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 94A8C61165 for ; Fri, 9 Apr 2021 05:43:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233349AbhDIFnh (ORCPT ); Fri, 9 Apr 2021 01:43:37 -0400 Received: from mail-io1-f69.google.com ([209.85.166.69]:53507 "EHLO mail-io1-f69.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233312AbhDIFnd (ORCPT ); Fri, 9 Apr 2021 01:43:33 -0400 Received: by mail-io1-f69.google.com with SMTP id r10so2962701iod.20 for ; Thu, 08 Apr 2021 22:43:19 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:in-reply-to:message-id:subject :from:to; bh=/ly/4Xm6+8ivV15n83ADfbzIBp0b85vMIRQe3MQRl7o=; b=ADpMtJdKXwDIMQk1SGBdtTv/59N8INkac7YJAXOCkMfruIOZMi6vhCNSjB9yImlUoj 0w3ow6jQOVj4a1TTjOFBG0Q01r3y8fLdY3E/tMfzzySamrbscuukHpjA9foqXJyyhMf3 9fH3liDum6mZAiJZcRKb8wSoyXhCBZoEaAZEYXrBeyOMSJuru7Hf2/KIrrkawftIlExe rzM+TrwBosigojo7krBuZVFt2eqfT/yhienTtGMWhVW1KLbIGRCJNwkrWZ+frYq/BJ2J VIXATqnUp+BKEXFpRjpl2oAwEjdZKzj9EA0vZxbX69WjpcZ+eBLgqz6SWn2a4OcvpkvU XZJg== X-Gm-Message-State: AOAM532TC8YgM80aQJZzVIi4kHeJM9T4ufOlJjLlcHzyRoqaKuougJFj szuKCJJF/8aj4X0atu2mBFgZYBJNgdKvarFol92eOhz51iL3 X-Google-Smtp-Source: ABdhPJywPyJtv7ooSj0CpwoceEcAzw9/ul9ZWOBL7sVOq2HE4n9irT1sbN79NB+q7VJH7zzMLSUaeL88rbZqr05QNTyU8feZPKPv MIME-Version: 1.0 X-Received: by 2002:a05:6638:3884:: with SMTP id b4mr12621744jav.18.1617946999193; Thu, 08 Apr 2021 22:43:19 -0700 (PDT) Date: Thu, 08 Apr 2021 22:43:19 -0700 In-Reply-To: <0000000000002c2f5b05b732ce65@google.com> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000027071505bf83a4f3@google.com> Subject: Re: [syzbot] memory leak in ext4_multi_mount_protect From: syzbot To: adilger.kernel@dilger.ca, juan.carlos@b2bworthyleads.com, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, tytso@mit.edu Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org syzbot has found a reproducer for the following issue on: HEAD commit: 4fa56ad0 Merge tag 'for-linus' of git://git.kernel.org/pub.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=12390a96d00000 kernel config: https://syzkaller.appspot.com/x/.config?x=b8dbd3c72fdc7777 dashboard link: https://syzkaller.appspot.com/bug?extid=d9e482e303930fa4f6ff syz repro: https://syzkaller.appspot.com/x/repro.syz?x=109aaa7ed00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=16e77d16d00000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+d9e482e303930fa4f6ff@syzkaller.appspotmail.com executing program BUG: memory leak unreferenced object 0xffff888111edd780 (size 32): comm "syz-executor633", pid 8448, jiffies 4294951405 (age 17.620s) hex dump (first 32 bytes): 10 64 d1 0f 81 88 ff ff 00 10 7e 12 81 88 ff ff .d........~..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:554 [inline] [] ext4_multi_mount_protect+0x4a6/0x5d0 fs/ext4/mmp.c:367 [] ext4_fill_super+0x56a4/0x5b20 fs/ext4/super.c:4769 [] mount_bdev+0x223/0x260 fs/super.c:1367 [] legacy_get_tree+0x2b/0x90 fs/fs_context.c:592 [] vfs_get_tree+0x28/0x100 fs/super.c:1497 [] do_new_mount fs/namespace.c:2903 [inline] [] path_mount+0xc3e/0x1120 fs/namespace.c:3233 [] do_mount fs/namespace.c:3246 [inline] [] __do_sys_mount fs/namespace.c:3454 [inline] [] __se_sys_mount fs/namespace.c:3431 [inline] [] __x64_sys_mount+0x18e/0x1d0 fs/namespace.c:3431 [] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [] entry_SYSCALL_64_after_hwframe+0x44/0xae