From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.7 required=3.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BEB88C55ABD for ; Fri, 13 Nov 2020 17:17:37 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 775A120A8B for ; Fri, 13 Nov 2020 17:17:37 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726396AbgKMRRW (ORCPT ); Fri, 13 Nov 2020 12:17:22 -0500 Received: from mail-il1-f198.google.com ([209.85.166.198]:53310 "EHLO mail-il1-f198.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726357AbgKMRRU (ORCPT ); Fri, 13 Nov 2020 12:17:20 -0500 Received: by mail-il1-f198.google.com with SMTP id c9so6995127ilu.20 for ; Fri, 13 Nov 2020 09:17:32 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=AoVMm0F0BfO3BX7DOFKEUiRvpD+PX2QeLVOvFi7bkcM=; b=quWUCEcB6rvn3ZvR8e5DmPSjHmA+82fbR4PxJCOb2uLbpH61LorgEzdIeZBljsM9Tg kQWGZ/uIOGkyIXKzPxEge2f2jPmnf/0RVZE4i8nR2WHH6/6M8+7jnLQTVK8QExGqLBh7 YDkaFjranWauLpjpXA2KmL0SEnIjmUdIhB8kIdbJJKW9qZ+l1IB6hI05Qdtd0+PjB6Dn TNrc0H6t7QVqYH6cwSGLvbk8C+RWPvPTcBlJfBBxLLAS25zB45bgxfqfKqdRpvlYNGOt DqUnKHs+vp2XJvDXAOxXOCagywnuAzYsbboFyovD8wP8baYJJSTh9V6OOH2u4GzJNYQ4 DcCA== X-Gm-Message-State: AOAM532cqLA2eaeaxZEDa8kV4GFirqDVcgB/5MqGnwXN7hQ28o7Yzy4K 0X18DZ0aQFwsc4m05/ShScPlE+h35ROCQ6qpM+UPlQJQ3PI1 X-Google-Smtp-Source: ABdhPJypk6Mtb4JhlkbUSWPQMaAGnlH+/9mixnEt5vFWHVLIpKop1ODS3gSu6+q8vsEchftOxQ2/+1UhED8lELPES0ZXN6qO9ZV5 MIME-Version: 1.0 X-Received: by 2002:a92:cf51:: with SMTP id c17mr641766ilr.113.1605287851739; Fri, 13 Nov 2020 09:17:31 -0800 (PST) Date: Fri, 13 Nov 2020 09:17:31 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000002a530d05b400349b@google.com> Subject: memory leak in generic_parse_monolithic From: syzbot To: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, viro@zeniv.linux.org.uk Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: af5043c8 Merge tag 'acpi-5.10-rc4' of git://git.kernel.org.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=13e8c906500000 kernel config: https://syzkaller.appspot.com/x/.config?x=a3f13716fa0212fd dashboard link: https://syzkaller.appspot.com/bug?extid=86dc6632faaca40133ab compiler: gcc (GCC) 10.1.0-syz 20200507 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=102a57dc500000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=129ca3d6500000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+86dc6632faaca40133ab@syzkaller.appspotmail.com Warning: Permanently added '10.128.0.84' (ECDSA) to the list of known hosts. executing program executing program BUG: memory leak unreferenced object 0xffff888111f15a80 (size 32): comm "syz-executor841", pid 8507, jiffies 4294942125 (age 14.070s) hex dump (first 32 bytes): 25 5e 5d 24 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 29 %^]$[+%](${:.k[) 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<000000005c6f565d>] kmemdup_nul+0x2d/0x70 mm/util.c:151 [<0000000054985c27>] vfs_parse_fs_string+0x6e/0xd0 fs/fs_context.c:155 [<0000000077ef66e4>] generic_parse_monolithic+0xe0/0x130 fs/fs_context.c:201 [<00000000d4d4a652>] do_new_mount fs/namespace.c:2871 [inline] [<00000000d4d4a652>] path_mount+0xbbb/0x1170 fs/namespace.c:3205 [<00000000f43f0071>] do_mount fs/namespace.c:3218 [inline] [<00000000f43f0071>] __do_sys_mount fs/namespace.c:3426 [inline] [<00000000f43f0071>] __se_sys_mount fs/namespace.c:3403 [inline] [<00000000f43f0071>] __x64_sys_mount+0x18e/0x1d0 fs/namespace.c:3403 [<00000000dc5fffd5>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000004e665669>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches