From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D0ADC433FE for ; Thu, 17 Nov 2022 14:30:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240071AbiKQO35 (ORCPT ); Thu, 17 Nov 2022 09:29:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56796 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240003AbiKQO3i (ORCPT ); Thu, 17 Nov 2022 09:29:38 -0500 Received: from mail-il1-f200.google.com (mail-il1-f200.google.com [209.85.166.200]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C41832A940 for ; Thu, 17 Nov 2022 06:29:36 -0800 (PST) Received: by mail-il1-f200.google.com with SMTP id s4-20020a056e02216400b003021b648144so1276279ilv.19 for ; Thu, 17 Nov 2022 06:29:36 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=o9eKZjGozyGRTLpYtU3VmFYQ+RcvWdJzMHKEziJZGuw=; b=w5Zr96p5dcKaMpt6PRpguJZrTPTbmAPWRGWYBJde0e08X/QmvtpCvT4x+2+i60Hlwe m+rSBkv3+Be1MHCeSoYaR1PmWbc+klPUhqpKrrp7xc765WOFvggLpLR9Ao6WAfbGZ11J RGK6RVC7WWa1vTCus+eNptL7xHk5StlbdY/FekxA1MWscVx76rB9X+3OvYX5AAE8O4ki UUWkhcq/FQLbKOigaB8takyx44rD0Lyb6O7GJsGP9eef9G0Zm9Al/zzn5VcD2Wn770UP o/iHLAZ61yJkDCDbLrR12zLryobvh9dzh/O00MBx0NHgNfUSHhI0Ls/d9kHmc5OYnDML fy9A== X-Gm-Message-State: ANoB5pne8crUVDvsxx0jjOyAXPddKepLzaaVYwt7q2ypHW12jMa3S28w up53nOBatuOQtWkzXGJCgUs+WIxJpSYbS4We8PLlOkfJNXus X-Google-Smtp-Source: AA0mqf6iYdfVCX4SeYTc6bs4YgH7WIZD7tDSk52d2gfooJRxhdrwFhE/sItX3FKP9+wem2ie3ijJ7jdUTrbD7ROm+Gifu1hAUOEp MIME-Version: 1.0 X-Received: by 2002:a92:3605:0:b0:302:a011:ae1 with SMTP id d5-20020a923605000000b00302a0110ae1mr634468ila.170.1668695375935; Thu, 17 Nov 2022 06:29:35 -0800 (PST) Date: Thu, 17 Nov 2022 06:29:35 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000001f056d05edab6b1e@google.com> Subject: [syzbot] memory leak in virtual_ncidev_write From: syzbot To: bongsu.jeon@samsung.com, krzysztof.kozlowski@linaro.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: cc675d22e422 Merge tag 'for-linus-6.1-rc6-tag' of git://gi.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1152f8d9880000 kernel config: https://syzkaller.appspot.com/x/.config?x=435fb8cdd395f932 dashboard link: https://syzkaller.appspot.com/bug?extid=cdb9a427d1bc08815104 compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14bea8d9880000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10015c4e880000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/4f389db5cedc/disk-cc675d22.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/c3ef1df08018/vmlinux-cc675d22.xz kernel image: https://storage.googleapis.com/syzbot-assets/e11bee4d6893/bzImage-cc675d22.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+cdb9a427d1bc08815104@syzkaller.appspotmail.com executing program BUG: memory leak unreferenced object 0xffff88810e144e00 (size 240): comm "syz-executor284", pid 3701, jiffies 4294952403 (age 12.620s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1f9/0x270 net/core/skbuff.c:497 [] alloc_skb include/linux/skbuff.h:1267 [inline] [] virtual_ncidev_write+0x24/0xe0 drivers/nfc/virtual_ncidev.c:116 [] do_loop_readv_writev fs/read_write.c:759 [inline] [] do_loop_readv_writev fs/read_write.c:743 [inline] [] do_iter_write+0x253/0x300 fs/read_write.c:863 [] vfs_writev+0xdd/0x240 fs/read_write.c:934 [] do_writev+0xa6/0x1c0 fs/read_write.c:977 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810cec1a00 (size 512): comm "syz-executor284", pid 3701, jiffies 4294952403 (age 12.620s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __do_kmalloc_node mm/slab_common.c:954 [inline] [] __kmalloc_node_track_caller+0x47/0x120 mm/slab_common.c:975 [] kmalloc_reserve net/core/skbuff.c:437 [inline] [] __alloc_skb+0xdd/0x270 net/core/skbuff.c:509 [] alloc_skb include/linux/skbuff.h:1267 [inline] [] virtual_ncidev_write+0x24/0xe0 drivers/nfc/virtual_ncidev.c:116 [] do_loop_readv_writev fs/read_write.c:759 [inline] [] do_loop_readv_writev fs/read_write.c:743 [inline] [] do_iter_write+0x253/0x300 fs/read_write.c:863 [] vfs_writev+0xdd/0x240 fs/read_write.c:934 [] do_writev+0xa6/0x1c0 fs/read_write.c:977 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches