Re: [PATCH v2] bpf: Fix memory leak in copy_process()

2021-03-16 Thread Daniel Borkmann
On 3/15/21 9:58 AM, qiang.zh...@windriver.com wrote: From: Zqiang nit: I presume it should be s/Zqiang/Qiang Zhang/ as real name for 'From' instead of abbreviation? The syzbot report a memleak follow: BUG: memory leak unreferenced object 0x888101b41d00 (size 120): comm "kworker/u4:0",

Re: [PATCH v2] bpf: Fix memory leak in copy_process()

2021-03-16 Thread Alexei Starovoitov
On Tue, Mar 16, 2021 at 4:29 AM Zhang, Qiang wrote: > > Hello Alexei Starovoitov Daniel Borkmann > Please review this patch. Please don't top post.

回复: [PATCH v2] bpf: Fix memory leak in copy_process()

2021-03-16 Thread Zhang, Qiang
+44908bb56d2bfe56b...@syzkaller.appspotmail.com; b...@vger.kernel.org; Zhang, Qiang 主题: [PATCH v2] bpf: Fix memory leak in copy_process() From: Zqiang The syzbot report a memleak follow: BUG: memory leak unreferenced object 0x888101b41d00 (size 120): comm "kworker/u4:0", pid 8, jiffies

[PATCH v2] bpf: Fix memory leak in copy_process()

2021-03-15 Thread qiang . zhang
From: Zqiang The syzbot report a memleak follow: BUG: memory leak unreferenced object 0x888101b41d00 (size 120): comm "kworker/u4:0", pid 8, jiffies 4294944270 (age 12.780s) backtrace: [] alloc_pid+0x66/0x560 [] copy_process+0x1465/0x25e0 [] kernel_clone+0xf3/0x670 [] kern

Re: [PATCH v2] bpf: Fix memory leak in copy_process()

2021-03-15 Thread Daniel Borkmann
On 3/15/21 9:18 AM, qiang.zh...@windriver.com wrote: From: Zqiang Hello Zqiang, please resend this patch with b...@vger.kernel.org in Cc, so it actually reaches the rest of BPF community for review, thanks! The syzbot report a memleak follow: BUG: memory leak unreferenced object 0x888101

[PATCH v2] bpf: Fix memory leak in copy_process()

2021-03-15 Thread qiang . zhang
From: Zqiang The syzbot report a memleak follow: BUG: memory leak unreferenced object 0x888101b41d00 (size 120): comm "kworker/u4:0", pid 8, jiffies 4294944270 (age 12.780s) backtrace: [] alloc_pid+0x66/0x560 [] copy_process+0x1465/0x25e0 [] kernel_clone+0xf3/0x670 [] kern