From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 97F19C47089 for ; Thu, 1 Dec 2022 14:50:42 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231308AbiLAOul (ORCPT ); Thu, 1 Dec 2022 09:50:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33706 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229728AbiLAOui (ORCPT ); Thu, 1 Dec 2022 09:50:38 -0500 Received: from mail-io1-f69.google.com (mail-io1-f69.google.com [209.85.166.69]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B97FCAC6D7 for ; Thu, 1 Dec 2022 06:50:36 -0800 (PST) Received: by mail-io1-f69.google.com with SMTP id bf14-20020a056602368e00b006ce86e80414so1746347iob.7 for ; Thu, 01 Dec 2022 06:50:36 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=7OqqbGGfV7CnIAjWLX7v/xkTtEv375dPjP0bZcvVyAc=; b=U+AIPsvyjvPkI4Rg0QzLmjLa5juiQhPaq1KCqBouI3F2oVV70a2dCvcX1+sGJDzZD1 qMuhuVip3fJVf1UbVVbNYbY6tpJhbGnX90qN6p5Hp70fE9Qn+Bc7YKFdKARGATmSaEPP C7FtWLfhfBWCQFLAeoFvNJ+VYdilqtIaoGvDXNa2BCFV8LVDAcRVluFLwE4HrXqp9bNF e8144TsfweJ6rX5Kj2xLqFPni2/th36Rg4aZmfne2m39Yx+O14JMO1Mqet/dj3lLTKHH Q7Ac5X92J7g2Swucof/CfET1P1aIgUeLSsn65biY9NMI22jJCPZxxZr2eYMHsiXge71T mRUw== X-Gm-Message-State: ANoB5pnB1+9uc/LnlvPk+6UwoHFDDsUT+p1g3XjUN7VLFxFPQ7F+YDTL vzGk9LrZmkwUymcgTFXyaEbnZYDd2wS4Sc3ltvDGDM/vT4Vm X-Google-Smtp-Source: AA0mqf6EWFfuPHoRflZazvz1RaxPt5YTGx/PmgBNF03Y2SbGPpXoI7i65XRqM0+FCaIGjuQT5DPp771jmIMxnsC5bXO+FYJSOLOh MIME-Version: 1.0 X-Received: by 2002:a05:6e02:1189:b0:302:fa94:c735 with SMTP id y9-20020a056e02118900b00302fa94c735mr14905106ili.57.1669906236117; Thu, 01 Dec 2022 06:50:36 -0800 (PST) Date: Thu, 01 Dec 2022 06:50:36 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000031adb05eec5581a@google.com> Subject: [syzbot] memory leak in napi_skb_cache_get From: syzbot To: ast@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, davem@davemloft.net, edumazet@google.com, hawk@kernel.org, jasowang@redhat.com, john.fastabend@gmail.com, kuba@kernel.org, linux-kernel@vger.kernel.org, mst@redhat.com, netdev@vger.kernel.org, pabeni@redhat.com, syzkaller-bugs@googlegroups.com, virtualization@lists.linux-foundation.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: 64c3dd0b98f5 Merge tag 'xfs-6.1-fixes-4' of git://git.kern.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1761a066880000 kernel config: https://syzkaller.appspot.com/x/.config?x=7da85296f1024c6a dashboard link: https://syzkaller.appspot.com/bug?extid=a1fab9d8e5da048ac8a1 compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13ac3e61880000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=17b2040a880000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/ebc55fa5a058/disk-64c3dd0b.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/312317fcea89/vmlinux-64c3dd0b.xz kernel image: https://storage.googleapis.com/syzbot-assets/b5a79a1512f2/bzImage-64c3dd0b.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+a1fab9d8e5da048ac8a1@syzkaller.appspotmail.com executing program executing program executing program executing program executing program BUG: memory leak unreferenced object 0xffff88810ef20400 (size 240): comm "softirq", pid 0, jiffies 4294950045 (age 43.240s) hex dump (first 32 bytes): e0 04 1d 0c 81 88 ff ff e0 04 1d 0c 81 88 ff ff ................ 00 c0 2b 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ..+............. backtrace: [] napi_skb_cache_get+0x6b/0x90 net/core/skbuff.c:258 [] __napi_build_skb+0x15/0x50 net/core/skbuff.c:387 [] __napi_alloc_skb+0x129/0x260 net/core/skbuff.c:691 [] napi_alloc_skb include/linux/skbuff.h:3212 [inline] [] page_to_skb+0x11f/0x770 drivers/net/virtio_net.c:499 [] receive_mergeable drivers/net/virtio_net.c:1122 [inline] [] receive_buf+0x6ae/0x2d70 drivers/net/virtio_net.c:1261 [] virtnet_receive drivers/net/virtio_net.c:1556 [inline] [] virtnet_poll+0x24e/0x6f0 drivers/net/virtio_net.c:1674 [] __napi_poll+0x3d/0x290 net/core/dev.c:6498 [] napi_poll net/core/dev.c:6565 [inline] [] net_rx_action+0x3ac/0x490 net/core/dev.c:6676 [] __do_softirq+0xeb/0x2ef kernel/softirq.c:571 [] invoke_softirq kernel/softirq.c:445 [inline] [] __irq_exit_rcu+0xc6/0x110 kernel/softirq.c:650 [] common_interrupt+0xb8/0xd0 arch/x86/kernel/irq.c:240 [] asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:640 [] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline] [] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline] [] acpi_safe_halt drivers/acpi/processor_idle.c:112 [inline] [] acpi_idle_do_entry+0xc9/0xe0 drivers/acpi/processor_idle.c:572 [] acpi_idle_enter+0x150/0x230 drivers/acpi/processor_idle.c:709 [] cpuidle_enter_state+0xc4/0x740 drivers/cpuidle/cpuidle.c:239 [] cpuidle_enter+0x29/0x40 drivers/cpuidle/cpuidle.c:356 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches