Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp41550pxb; Tue, 17 Nov 2020 19:55:31 -0800 (PST) X-Google-Smtp-Source: ABdhPJzLerpV6NRi2SzULBSu8bV5zP8Jd6gHsugcyFLzRfHk16VlV9SSf4V8Zh1udjG9s5ha8x/K X-Received: by 2002:a17:906:ae88:: with SMTP id md8mr21570271ejb.323.1605671731037; Tue, 17 Nov 2020 19:55:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605671731; cv=none; d=google.com; s=arc-20160816; b=Fek5rL8OE2GtENxLqf5h6YgwXk30PhSs7edK5/LCV16ttfEFhgR0z9yKseNDsCb2F3 CkI8pdlUkrTQ5zkmG7f6gkSMFqjNoSu/sc3ukh3RnoY96YIGa1h0Qj4BNVu1bCwdGdZ0 1IoRBmI+faufWYNiHPpmBmUjwt0rOgV7cYtxlUILIPMN/huXL6+EyI07TzFsFJAPHVI5 PFfjcH15D6ZPzW3Lfz8z5Qp/SEgP+IZHeDcr3UsW4kvjugrx2gOp21VvlQ0dcfzXeOnB gfAnAl7Rnz+PGot58IR1fv5TDkfYfTOGZfmW+AivfJCCWO5FAfV5DdPqqQ1PpN+v12ST g1MA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=/DoS+YQS9VBlKN6+t7kOlnb/cNhUvvMuTsydpQN3w74=; b=JSmSbt3QKmhK5CCvTaOV8eZfEuaVYXS48q1mYgK/4U6M6hrNiYIlnLkgmVWGeSsg2n nuEFjxyEo2b/W+r1mkM+oRLIXXznKn3FX5vQfMoGOA9RJFBnF5wImVrM7e3NiS8qZvZf hm1SgWGN2z+KREJiqmkJ76xcq9OPGJNa0JbK/o6hf2SXFx3Brd1k3xnUyv5F1cHWpIXf drRjbUndUoZpbnbG1NWqnTNWLLKPhHhZj25ks7zJo5Yh+XpCTR4LzDlr900F1G87j71J FleGVkchYBJYq6HSzlQdGC8wA44cvCuhi6Ct/lpOakStdlUEi9C33BFbeJD/qdU8v9X8 PKJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id me4si10455152ejb.440.2020.11.17.19.55.08; Tue, 17 Nov 2020 19:55:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727780AbgKRDuU (ORCPT + 99 others); Tue, 17 Nov 2020 22:50:20 -0500 Received: from mail-io1-f70.google.com ([209.85.166.70]:35582 "EHLO mail-io1-f70.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727008AbgKRDuU (ORCPT ); Tue, 17 Nov 2020 22:50:20 -0500 Received: by mail-io1-f70.google.com with SMTP id u8so379114ior.2 for ; Tue, 17 Nov 2020 19:50:19 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=/DoS+YQS9VBlKN6+t7kOlnb/cNhUvvMuTsydpQN3w74=; b=reBKKMqe9OMuMYeIY4FeJ5KvGzHReB2JT2hxSYOv1sVdCt55evSelbLj7IEyCYk/sV mOteV9Pg9E4YCcwtnYwzL0pB3Zq5i7PBgjidqq7ikTitWOcJuOn603SMKyZPSKobOKH6 cVAooA3APBo5D7AiKwjy1XxyCgudORLR2knO++WULWljkC6MFq5nRaDnboBkr5F5M1G4 nEjF7WBKUU3uaoMyCCuwvfg+OiSF6S6SGTuVpvYSuzhyuM8pfL8lNrCym6nV+/eHAXZ0 kQplRUNSjp4AnRNV1E9S3ROn2FkaXv2XocRnmvjLsrk6bSH+O7aDIvt87R8hGl+J1DgP sBOg== X-Gm-Message-State: AOAM533IWqkgGVqPv+vtIc4+1uS0oAiY1KNJNudRA2Lqr4Ws9Sde0+NQ d+sywprzvzNAsHfkKBQzCK846ZtJ3LVcjqW2ZuQIRwJau3zm MIME-Version: 1.0 X-Received: by 2002:a02:70ce:: with SMTP id f197mr6796213jac.120.1605671419188; Tue, 17 Nov 2020 19:50:19 -0800 (PST) Date: Tue, 17 Nov 2020 19:50:19 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000911d3905b459824c@google.com> Subject: memory leak in bpf From: syzbot To: andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, kafai@fb.com, kpsingh@chromium.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, songliubraving@fb.com, syzkaller-bugs@googlegroups.com, yhs@fb.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: f01c30de Merge tag 'vfs-5.10-fixes-2' of git://git.kernel... git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=15b9b181500000 kernel config: https://syzkaller.appspot.com/x/.config?x=a3f13716fa0212fd dashboard link: https://syzkaller.appspot.com/bug?extid=f3694595248708227d35 compiler: gcc (GCC) 10.1.0-syz 20200507 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14b78b81500000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+f3694595248708227d35@syzkaller.appspotmail.com 2020/11/14 15:01:05 executed programs: 33 2020/11/14 15:01:11 executed programs: 35 2020/11/14 15:01:17 executed programs: 37 2020/11/14 15:01:22 executed programs: 39 BUG: memory leak unreferenced object 0xffff8881161c6440 (size 64): comm "syz-executor.0", pid 8961, jiffies 4295107077 (age 12.370s) hex dump (first 32 bytes): 80 62 58 04 00 ea ff ff c0 17 37 04 00 ea ff ff .bX.......7..... 80 6f 47 04 00 ea ff ff 40 64 58 04 00 ea ff ff .oG.....@dX..... backtrace: [<00000000189a27fd>] kmalloc_node include/linux/slab.h:575 [inline] [<00000000189a27fd>] bpf_ringbuf_area_alloc kernel/bpf/ringbuf.c:94 [inline] [<00000000189a27fd>] bpf_ringbuf_alloc kernel/bpf/ringbuf.c:135 [inline] [<00000000189a27fd>] ringbuf_map_alloc kernel/bpf/ringbuf.c:183 [inline] [<00000000189a27fd>] ringbuf_map_alloc+0x1be/0x410 kernel/bpf/ringbuf.c:150 [<000000009e5cec3e>] find_and_alloc_map kernel/bpf/syscall.c:122 [inline] [<000000009e5cec3e>] map_create kernel/bpf/syscall.c:825 [inline] [<000000009e5cec3e>] __do_sys_bpf+0x7d0/0x30a0 kernel/bpf/syscall.c:4381 [<00000000c513b5d1>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000033006ec5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches