Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3475489pxj; Mon, 24 May 2021 07:35:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxD3gyiGM8ZW0xW40SdeMC+TXXZTPRQVHVny9ZxOzDSiCdc5vBcMfFCcf2t8U8HmPx+Q0pJ X-Received: by 2002:a92:c74b:: with SMTP id y11mr18570179ilp.302.1621866911090; Mon, 24 May 2021 07:35:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621866911; cv=none; d=google.com; s=arc-20160816; b=tix5w3owBhUgX0VJ3Jzn7/6rEGWzBXaPKRETa1RKG1k9+bUd/5oKyBYoW29Tchkh0/ W65NX88rHt7hbw9xtf1QUEI1OA007WvB089rFPCpeydvbnHy/qR9hF1YVdOus0osnb3+ zEcDHDK5BKjyIg1SgsWAt2/9J7y9/1exOMBFE92BUThxd3WWS+/vQUcvbEBv7P1t/in+ 4aNwF7rGVWZIbbz4JObimKxL8njgonE6l6kuUdifjxmjw1h/Tog3t6lu5B89rhFFhcWA ZbXyJWH0td2WvXQ/z3aWSPjF8vt0DgDqPe5VzoTLREQNggA5fMXJAkKzwSv6YWML+iNk 7c3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=mzMzgGXGzf6LXhHO5i6yc8Y+EDUJAYcIfexi+vE47CU=; b=qykUCsBMcAAkZZyVAXuxjFlGJ4Qg+UsmNB9azWMNFV0vmB+feOJljV4Jp9HM5ExUS/ sRZA5T9avACQVGVjfdK/tAwxn6GXJDML4X3DbFVABr3VFZLFQgWijQdpQfp47hltg/xr WeokfVHYbHQzVQXxctSFAy861bG5wDigoBLK+odrDjtNlz4nBNbEecQD9r97IQ9Tdq6E YSUn2TFfMsl8LyiAAJ3jpBCE+7rOQf0z3v7o7shvF2bfY5akwB8vZom8khUDfX/ISh2K wCjnfT1xdHtNRhJruGOPKIfPwIVWa56vtVeJE98QWIo1pa2VHi8NYgYPgz4xna4b/Ksp artw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j13si4133922ilk.14.2021.05.24.07.34.56; Mon, 24 May 2021 07:35:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232993AbhEXOe4 (ORCPT + 99 others); Mon, 24 May 2021 10:34:56 -0400 Received: from mail-io1-f72.google.com ([209.85.166.72]:51858 "EHLO mail-io1-f72.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232906AbhEXOex (ORCPT ); Mon, 24 May 2021 10:34:53 -0400 Received: by mail-io1-f72.google.com with SMTP id h7-20020a5d9e070000b029041a1f6bccc8so27576872ioh.18 for ; Mon, 24 May 2021 07:33:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=mzMzgGXGzf6LXhHO5i6yc8Y+EDUJAYcIfexi+vE47CU=; b=FWr1laZa6S7NL4LV6aNj8n56eqNcSVZjWGudZPtW2K9zaFEmmQYlWwuGkmMiOOiAxs X9dJf6aGZmrZhge4Wz6KSh0obcXLqsEadj19RcEEdjm8bD0ncb30AWYz+sAml2uH/Wh7 NMgD8s+fMNmNR3ogHFVeRigOUYstisixcldGBaKkHtmTOFU9SivM6YMMTxxkdpV6SuVN RNRmOtBzdF+BqWXI4A/EJ2zYkFc92NCCktQ5wlsbRkGJlzNyLekSDSj4kGiGHZ1txljC lEDIzWt7CMDf0SSD1qN/UUVZuYAG2yObKPTaO7Hg2qVDHc0arHk55NhqK80VU0opOLt+ Ajfw== X-Gm-Message-State: AOAM5335mHS86kboCwtGbC71qceTOAKOLuTz+gvoRirUhOpTzk98TcY8 V7UhXvkrOWW2vjTF2sjmfkxGMHFhWUWiObUKjVSDkAI4ao9o MIME-Version: 1.0 X-Received: by 2002:a05:6e02:b47:: with SMTP id f7mr18755134ilu.261.1621866805007; Mon, 24 May 2021 07:33:25 -0700 (PDT) Date: Mon, 24 May 2021 07:33:24 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000c91e6f05c3144acc@google.com> Subject: [syzbot] memory leak in ip_vs_add_service From: syzbot To: coreteam@netfilter.org, davem@davemloft.net, fw@strlen.de, horms@verge.net.au, ja@ssi.bg, kadlec@netfilter.org, kuba@kernel.org, linux-kernel@vger.kernel.org, lvs-devel@vger.kernel.org, netdev@vger.kernel.org, netfilter-devel@vger.kernel.org, pablo@netfilter.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: c3d0e3fd Merge tag 'fs.idmapped.mount_setattr.v5.13-rc3' o.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=148d0bd7d00000 kernel config: https://syzkaller.appspot.com/x/.config?x=ae7b129a135ab06b dashboard link: https://syzkaller.appspot.com/bug?extid=e562383183e4b1766930 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15585a4bd00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13900753d00000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+e562383183e4b1766930@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff888115227800 (size 512): comm "syz-executor263", pid 8658, jiffies 4294951882 (age 12.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:556 [inline] [] kzalloc include/linux/slab.h:686 [inline] [] ip_vs_add_service+0x598/0x7c0 net/netfilter/ipvs/ip_vs_ctl.c:1343 [] do_ip_vs_set_ctl+0x810/0xa40 net/netfilter/ipvs/ip_vs_ctl.c:2570 [] nf_setsockopt+0x68/0xa0 net/netfilter/nf_sockopt.c:101 [] ip_setsockopt+0x259/0x1ff0 net/ipv4/ip_sockglue.c:1435 [] raw_setsockopt+0x18c/0x1b0 net/ipv4/raw.c:857 [] __sys_setsockopt+0x1b0/0x360 net/socket.c:2117 [] __do_sys_setsockopt net/socket.c:2128 [inline] [] __se_sys_setsockopt net/socket.c:2125 [inline] [] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2125 [] do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47 [] entry_SYSCALL_64_after_hwframe+0x44/0xae --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches