Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp106423pxf; Wed, 31 Mar 2021 18:15:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIvt7AGx37oFP+qHzuXG98kS6gOLanPVkqrXk9GtQ5OGdltW22LMFYI3Q/1s3UxWVTcua9 X-Received: by 2002:a17:907:1b06:: with SMTP id mp6mr6747973ejc.292.1617239705702; Wed, 31 Mar 2021 18:15:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617239705; cv=none; d=google.com; s=arc-20160816; b=Le79pez0KeoyvfLjGZuIj+yjy0sfIRLIHvh0eq8gdOjnLsPIo+6FxGeDpy7ZlfLbAH J7c5sz4Qi6XzLNfGoNJeyOiF5F6a7N0qZ6RWiqcjrckzXjDnqCzoIZBoiKRRzF7WIHKa EU5eouJOCLl/4+UfjayP0qig5aJ6TdWyBhozDtiEBgH6iPjFBQ97SKOLTsFIq93HN5Ay 6RGhfiEkUMMCSAzpV8AA67Kl2sKWpqPIBR4tTizZL9Eu7gc0EG96bp5mnj6OCyjWzBBf rXknAAS8HL+OFGXjrgSfBMGJPlRoNCF91/c7u24VFLJYFeYtJLVj1+3QN3D2vpkFjn4J 2CDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=HhXZSdtRdZONG6W//ZnC0o+E0uXZyzIdW05SEDejhRI=; b=F5872HRVIiMq5KikdBdFetc2S1sLcPf+fuj2k9YwFScxNFPr7SbT64ZqvSYt0nHLO0 yZH47gJ61i2rpJNop2xB2Uy3MNDq8OtD2yiVvek4OFKNxcOBdt4jweABKqTbab9Jtwp5 WAbCe+sehzkkZhl5UMPpPjcXctvHCnzzqybzGG9N80FPSDvtE8kcsLck8EyHooYujX78 jAOYDDcxdeqFaBMBdP/xLHdIjSRV2R1U1mSDnrcIh5TEGWyRWXoLUJWZyjCvan2/i92H Cv5mgrYGh4QlRPwvBqdQ10Pc6JfVmtkd1CvxuGfin782zP+r/40FpXBSveRqQF3yn2vL Dayw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v22si3090017eja.212.2021.03.31.18.14.27; Wed, 31 Mar 2021 18:15:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232492AbhDABIz (ORCPT + 99 others); Wed, 31 Mar 2021 21:08:55 -0400 Received: from mail-il1-f199.google.com ([209.85.166.199]:55579 "EHLO mail-il1-f199.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230073AbhDABIR (ORCPT ); Wed, 31 Mar 2021 21:08:17 -0400 Received: by mail-il1-f199.google.com with SMTP id x15so2757031ilg.22 for ; Wed, 31 Mar 2021 18:08:17 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=HhXZSdtRdZONG6W//ZnC0o+E0uXZyzIdW05SEDejhRI=; b=kmFD2eWoeui6mzzfpyEEvyQHoPeKrXrpAje3+sLDxRHwVYRtCuTuhv2qJodpupRlcz SNj2XC5MVB7KFufLYueHiHY/iIHWYkQ6Ay6aorvIhegvtpw9yV9GmWDPtm/wAwmdpGrz Wt8ADBsN5euDHjmLsUnRQj3b+OUOsDcx4TF1ahACPrnWpC0v9dcVb8wDgL6WjPD/JsaF 9zUxkX4OgEFNHqCypb6GJRCnUPbq5D8E5CkWH8XLr+RfaKeTlAXTsMOKFmE+Vilu19mt VU2rhVdDGF33o4wWYCaM5jfRhX7kErebiDrAeCiSRLXRhbBqVtd4lnSFdZ2qeGfjaTWk mB8A== X-Gm-Message-State: AOAM5328BBTROSHPJ5iYVPYRLccZqpLt1zNmZlgj3IXUoPw5vXuVA8dB Rn0WVE2CewqYErXVGy3SXGpz1C7zfv7toHyyHS8e1V+Qtdex MIME-Version: 1.0 X-Received: by 2002:a92:c90c:: with SMTP id t12mr79501ilp.248.1617239296423; Wed, 31 Mar 2021 18:08:16 -0700 (PDT) Date: Wed, 31 Mar 2021 18:08:16 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000c7bbd305bededd29@google.com> Subject: [syzbot] memory leak in bpf (2) From: syzbot To: andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, davem@davemloft.net, hawk@kernel.org, john.fastabend@gmail.com, kafai@fb.com, kpsingh@kernel.org, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, songliubraving@fb.com, syzkaller-bugs@googlegroups.com, yhs@fb.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: 0f4498ce Merge tag 'for-5.12/dm-fixes-2' of git://git.kern.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1250e126d00000 kernel config: https://syzkaller.appspot.com/x/.config?x=49f2683f4e7a4347 dashboard link: https://syzkaller.appspot.com/bug?extid=5d895828587f49e7fe9b syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10a17016d00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10a32016d00000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+5d895828587f49e7fe9b@syzkaller.appspotmail.com Warning: Permanently added '10.128.0.74' (ECDSA) to the list of known hosts. executing program executing program BUG: memory leak unreferenced object 0xffff8881133295c0 (size 64): comm "syz-executor529", pid 8395, jiffies 4294943939 (age 8.130s) hex dump (first 32 bytes): 40 48 3c 04 00 ea ff ff 00 48 3c 04 00 ea ff ff @H<......H<..... c0 e7 3c 04 00 ea ff ff 80 e7 3c 04 00 ea ff ff ..<.......<..... backtrace: [] kmalloc_node include/linux/slab.h:577 [inline] [] __bpf_map_area_alloc+0xfc/0x120 kernel/bpf/syscall.c:300 [] bpf_ringbuf_area_alloc kernel/bpf/ringbuf.c:90 [inline] [] bpf_ringbuf_alloc kernel/bpf/ringbuf.c:131 [inline] [] ringbuf_map_alloc kernel/bpf/ringbuf.c:170 [inline] [] ringbuf_map_alloc+0x134/0x350 kernel/bpf/ringbuf.c:146 [] find_and_alloc_map kernel/bpf/syscall.c:122 [inline] [] map_create kernel/bpf/syscall.c:828 [inline] [] __do_sys_bpf+0x7c3/0x2fe0 kernel/bpf/syscall.c:4375 [] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [] entry_SYSCALL_64_after_hwframe+0x44/0xae --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches