public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [syzbot] [hams?] memory leak in nr_add_node
@ 2026-01-15 20:04 syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-15 20:04 UTC (permalink / raw)
  To: davem, edumazet, horms, kuba, linux-hams, linux-kernel, netdev,
	pabeni, syzkaller-bugs

Hello,

syzbot found the following issue on:

HEAD commit:    ea1013c15392 Merge tag 'bpf-fixes' of git://git.kernel.org..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=147cb184580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=d60836e327fd6756
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=13c839b4580000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=127cb184580000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/5ee91238d53c/disk-ea1013c1.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/b8eb70b8203f/vmlinux-ea1013c1.xz
kernel image: https://storage.googleapis.com/syzbot-assets/3aed81c1b1c5/bzImage-ea1013c1.xz
mounted in repro: https://storage.googleapis.com/syzbot-assets/6e21e0104490/mount_0.gz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+3f2d46b6e62b8dd546d3@syzkaller.appspotmail.com

BUG: memory leak
unreferenced object 0xffff88811b404b80 (size 64):
  comm "syz.0.17", pid 6071, jiffies 4294944872
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc f88ea0ab):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x5bf/0x14b0 net/netrom/nr_route.c:146
    nr_rt_ioctl+0xc32/0x16e0 net/netrom/nr_route.c:651
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88811b404d00 (size 64):
  comm "syz.0.18", pid 6078, jiffies 4294944884
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 8f10725b):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x5bf/0x14b0 net/netrom/nr_route.c:146
    nr_rt_ioctl+0xc32/0x16e0 net/netrom/nr_route.c:651
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88811b404f80 (size 64):
  comm "syz.0.19", pid 6086, jiffies 4294944897
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 14b53e34):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x5bf/0x14b0 net/netrom/nr_route.c:146
    nr_rt_ioctl+0xc32/0x16e0 net/netrom/nr_route.c:651
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116021908.1208112-1-kartikey406@gmail.com>
@ 2026-01-16  3:02 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16  3:02 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot tried to test the proposed patch but the build/boot failed:

SYZFAIL: failed to recv rpc

SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)


Warning: Permanently added '10.128.0.92' (ED25519) to the list of known hosts.
2026/01/16 03:01:03 parsed 1 programs
[   43.274917][ T5817] cgroup: Unknown subsys name 'net'
[   43.453971][ T5817] cgroup: Unknown subsys name 'cpuset'
[   43.460625][ T5817] cgroup: Unknown subsys name 'rlimit'
Setting up swapspace version 1, size = 127995904 bytes
[   51.660653][ T5817] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   52.936056][ T5823] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   53.185904][   T50] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[   53.193118][   T50] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[   53.200458][   T50] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[   53.208221][   T50] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[   53.215870][   T50] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[   53.301342][ T5855] chnl_net:caif_netlink_parms(): no params data found
[   53.323226][ T5855] bridge0: port 1(bridge_slave_0) entered blocking state
[   53.332459][ T5855] bridge0: port 1(bridge_slave_0) entered disabled state
[   53.340240][ T5855] bridge_slave_0: entered allmulticast mode
[   53.347229][ T5855] bridge_slave_0: entered promiscuous mode
[   53.354632][ T5855] bridge0: port 2(bridge_slave_1) entered blocking state
[   53.362940][ T5855] bridge0: port 2(bridge_slave_1) entered disabled state
[   53.370681][ T5855] bridge_slave_1: entered allmulticast mode
[   53.377466][ T5855] bridge_slave_1: entered promiscuous mode
[   53.389405][ T5855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   53.400348][ T5855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   53.416700][ T5855] team0: Port device team_slave_0 added
[   53.423294][ T5855] team0: Port device team_slave_1 added
[   53.433309][ T5855] batman_adv: batadv0: Adding interface: batadv_slave_0
[   53.440612][ T5855] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   53.467851][ T5855] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   53.481327][ T5855] batman_adv: batadv0: Adding interface: batadv_slave_1
[   53.488635][ T5855] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   53.516002][ T5855] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   53.535524][ T5855] hsr_slave_0: entered promiscuous mode
[   53.541713][ T5855] hsr_slave_1: entered promiscuous mode
[   53.574372][ T5855] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   53.583517][ T5855] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   53.591751][ T5855] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   53.600646][ T5855] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   53.614549][ T5855] bridge0: port 2(bridge_slave_1) entered blocking state
[   53.622088][ T5855] bridge0: port 2(bridge_slave_1) entered forwarding state
[   53.630043][ T5855] bridge0: port 1(bridge_slave_0) entered blocking state
[   53.637781][ T5855] bridge0: port 1(bridge_slave_0) entered forwarding state
[   53.660522][ T5855] 8021q: adding VLAN 0 to HW filter on device bond0
[   53.670073][ T3650] bridge0: port 1(bridge_slave_0) entered disabled state
[   53.678501][ T3650] bridge0: port 2(bridge_slave_1) entered disabled state
[   53.688598][ T5855] 8021q: adding VLAN 0 to HW filter on device team0
[   53.697705][ T1326] bridge0: port 1(bridge_slave_0) entered blocking state
[   53.704973][ T1326] bridge0: port 1(bridge_slave_0) entered forwarding state
[   53.714642][ T1326] bridge0: port 2(bridge_slave_1) entered blocking state
[   53.721984][ T1326] bridge0: port 2(bridge_slave_1) entered forwarding state
[   53.763780][ T5855] 8021q: adding VLAN 0 to HW filter on device batadv0
[   53.780112][ T5855] veth0_vlan: entered promiscuous mode
[   53.787498][ T5855] veth1_vlan: entered promiscuous mode
[   53.799529][ T5855] veth0_macvtap: entered promiscuous mode
[   53.807519][ T5855] veth1_macvtap: entered promiscuous mode
[   53.818491][ T5855] batman_adv: batadv0: Interface activated: batadv_slave_0
[   53.829013][ T5855] batman_adv: batadv0: Interface activated: batadv_slave_1
[   53.839887][ T1326] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   53.850698][ T1326] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   53.861035][ T1326] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   53.871232][ T1326] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   53.906896][ T1326] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   53.966995][ T1326] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   53.995814][ T1326] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   54.034202][ T1326] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   54.159038][ T2114] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   54.167245][ T2114] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[   54.178245][ T2114] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   54.186557][ T2114] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
2026/01/16 03:01:16 executed programs: 0
[   56.923092][ T1326] bridge_slave_1: left allmulticast mode
[   56.928869][ T1326] bridge_slave_1: left promiscuous mode
[   56.934672][ T1326] bridge0: port 2(bridge_slave_1) entered disabled state
[   56.942646][ T1326] bridge_slave_0: left allmulticast mode
[   56.948885][ T1326] bridge_slave_0: left promiscuous mode
[   56.954803][ T1326] bridge0: port 1(bridge_slave_0) entered disabled state
[   57.005555][ T1326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[   57.016763][ T1326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[   57.026927][ T1326] bond0 (unregistering): Released all slaves
[   57.095657][ T1326] hsr_slave_0: left promiscuous mode
[   57.101342][ T1326] hsr_slave_1: left promiscuous mode
[   57.107620][ T1326] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[   57.115348][ T1326] batman_adv: batadv0: Removing interface: batadv_slave_0
[   57.123767][ T1326] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[   57.131458][ T1326] batman_adv: batadv0: Removing interface: batadv_slave_1
[   57.140538][ T1326] veth1_macvtap: left promiscuous mode
[   57.146257][ T1326] veth0_macvtap: left promiscuous mode
[   57.152195][ T1326] veth1_vlan: left promiscuous mode
[   57.157593][ T1326] veth0_vlan: left promiscuous mode
[   57.181303][ T1326] team0 (unregistering): Port device team_slave_1 removed
[   57.191493][ T1326] team0 (unregistering): Port device team_slave_0 removed
[   60.054828][ T5138] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[   60.062525][ T5138] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[   60.070581][ T5138] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[   60.078714][ T5138] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[   60.086705][ T5138] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[   60.122310][ T5991] chnl_net:caif_netlink_parms(): no params data found
[   60.142671][ T5991] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.151380][ T5991] bridge0: port 1(bridge_slave_0) entered disabled state
[   60.159631][ T5991] bridge_slave_0: entered allmulticast mode
[   60.166599][ T5991] bridge_slave_0: entered promiscuous mode
[   60.173566][ T5991] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.180823][ T5991] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.188212][ T5991] bridge_slave_1: entered allmulticast mode
[   60.194588][ T5991] bridge_slave_1: entered promiscuous mode
[   60.206157][ T5991] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   60.216527][ T5991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   60.230103][ T5991] team0: Port device team_slave_0 added
[   60.236725][ T5991] team0: Port device team_slave_1 added
[   60.246712][ T5991] batman_adv: batadv0: Adding interface: batadv_slave_0
[   60.254114][ T5991] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   60.281073][ T5991] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   60.292352][ T5991] batman_adv: batadv0: Adding interface: batadv_slave_1
[   60.299876][ T5991] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   60.326817][ T5991] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   60.344691][ T5991] hsr_slave_0: entered promiscuous mode
[   60.350528][ T5991] hsr_slave_1: entered promiscuous mode
[   60.547249][ T5991] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   60.556770][ T5991] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   60.565261][ T5991] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   60.574345][ T5991] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   60.595999][ T5991] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.603416][ T5991] bridge0: port 2(bridge_slave_1) entered forwarding state
[   60.610769][ T5991] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.617975][ T5991] bridge0: port 1(bridge_slave_0) entered forwarding state
[   60.640024][ T5991] 8021q: adding VLAN 0 to HW filter on device bond0
[   60.651654][ T1326] bridge0: port 1(bridge_slave_0) entered disabled state
[   60.661595][ T1326] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.672035][ T5991] 8021q: adding VLAN 0 to HW filter on device team0
[   60.681942][ T3533] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.689121][ T3533] bridge0: port 1(bridge_slave_0) entered forwarding state
[   60.700374][ T3533] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.707777][ T3533] bridge0: port 2(bridge_slave_1) entered forwarding state
[   60.765855][ T5991] 8021q: adding VLAN 0 to HW filter on device batadv0
[   60.785272][ T5991] veth0_vlan: entered promiscuous mode
[   60.794067][ T5991] veth1_vlan: entered promiscuous mode
[   60.813474][ T5991] veth0_macvtap: entered promiscuous mode
[   60.820492][ T5991] veth1_macvtap: entered promiscuous mode
[   60.830830][ T5991] batman_adv: batadv0: Interface activated: batadv_slave_0
[   60.844272][ T5991] batman_adv: batadv0: Interface activated: batadv_slave_1
[   60.859022][ T1326] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   60.868601][ T1326] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   60.882791][ T1326] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   60.895230][ T1326] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
[   60.917026][ T1326] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   60.930526][ T1326] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[   60.943597][ T3533] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   60.951565][ T3533] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50


syzkaller build log:
go env (err=<nil>)
AR='ar'
CC='gcc'
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_ENABLED='1'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
CXX='g++'
GCCGO='gccgo'
GO111MODULE='auto'
GOAMD64='v1'
GOARCH='amd64'
GOAUTH='netrc'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOCACHEPROG=''
GODEBUG=''
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFIPS140='off'
GOFLAGS=''
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build224329181=/tmp/go-build -gno-record-gcc-switches'
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs-2/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTELEMETRY='local'
GOTELEMETRYDIR='/syzkaller/.config/go/telemetry'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.24.4'
GOWORK=''
PKG_CONFIG='pkg-config'

git status (err=<nil>)
HEAD detached at d6526ea3e
nothing to commit, working tree clean


tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115"  ./sys/syz-sysgen | grep -q false || go install -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115"  ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115"  -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
mkdir -p ./bin/linux_amd64
g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \
	-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include   -DGOOS_linux=1 -DGOARCH_amd64=1 \
	-DHOSTGOOS_linux=1 -DGIT_REVISION=\"d6526ea3e6ad9081c902859bbb80f9f840377cb4\"
/usr/bin/ld: /tmp/cczh2cP8.o: in function `Connection::Connect(char const*, char const*)':
executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking
./tools/check-syzos.sh 2>/dev/null



Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=16cae39a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116034008.1209650-1-kartikey406@gmail.com>
@ 2026-01-16  4:49 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16  4:49 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in nr_add_node

BUG: memory leak
unreferenced object 0xffff88811b69c2c0 (size 64):
  comm "syz.0.17", pid 6736, jiffies 4294946654
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc aa6a12dc):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x686/0x1540 net/netrom/nr_route.c:147
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:659
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88811bb55480 (size 64):
  comm "syz.0.18", pid 6750, jiffies 4294946665
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc ddf4c02c):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x686/0x1540 net/netrom/nr_route.c:147
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:659
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88811b69c5c0 (size 64):
  comm "syz.0.19", pid 6764, jiffies 4294946677
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 46518c43):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x686/0x1540 net/netrom/nr_route.c:147
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:659
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF


Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=11bd439a580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=156a339a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116074227.1221301-1-kartikey406@gmail.com>
@ 2026-01-16  8:03 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16  8:03 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot tried to test the proposed patch but the build/boot failed:

SYZFAIL: failed to recv rpc

SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)


Warning: Permanently added '10.128.0.254' (ED25519) to the list of known hosts.
2026/01/16 08:02:17 parsed 1 programs
[   41.087441][ T5820] cgroup: Unknown subsys name 'net'
[   41.206631][ T5820] cgroup: Unknown subsys name 'cpuset'
[   41.213349][ T5820] cgroup: Unknown subsys name 'rlimit'
Setting up swapspace version 1, size = 127995904 bytes
[   49.319220][ T5820] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   50.551457][ T5832] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   50.743054][ T5851] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[   50.750655][ T5851] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[   50.757962][ T5851] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[   50.765365][ T5851] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[   50.772807][ T5851] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[   50.866434][   T71] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   50.874785][   T71] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[   50.890522][ T3978] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   50.898625][ T3978] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[   51.236484][ T5900] chnl_net:caif_netlink_parms(): no params data found
[   51.258827][ T5900] bridge0: port 1(bridge_slave_0) entered blocking state
[   51.266070][ T5900] bridge0: port 1(bridge_slave_0) entered disabled state
[   51.273249][ T5900] bridge_slave_0: entered allmulticast mode
[   51.279886][ T5900] bridge_slave_0: entered promiscuous mode
[   51.288425][ T5900] bridge0: port 2(bridge_slave_1) entered blocking state
[   51.295600][ T5900] bridge0: port 2(bridge_slave_1) entered disabled state
[   51.302727][ T5900] bridge_slave_1: entered allmulticast mode
[   51.308934][ T5900] bridge_slave_1: entered promiscuous mode
[   51.319403][ T5900] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   51.329487][ T5900] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   51.343436][ T5900] team0: Port device team_slave_0 added
[   51.350119][ T5900] team0: Port device team_slave_1 added
[   51.364030][ T5900] batman_adv: batadv0: Adding interface: batadv_slave_0
[   51.371293][ T5900] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   51.398014][ T5900] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   51.409050][ T5900] batman_adv: batadv0: Adding interface: batadv_slave_1
[   51.416003][ T5900] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   51.443416][ T5900] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   51.460967][ T5900] hsr_slave_0: entered promiscuous mode
[   51.467467][ T5900] hsr_slave_1: entered promiscuous mode
[   51.495110][ T5900] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   51.503248][ T5900] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   51.511129][ T5900] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   51.518843][ T5900] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   51.530290][ T5900] bridge0: port 2(bridge_slave_1) entered blocking state
[   51.537440][ T5900] bridge0: port 2(bridge_slave_1) entered forwarding state
[   51.544696][ T5900] bridge0: port 1(bridge_slave_0) entered blocking state
[   51.551853][ T5900] bridge0: port 1(bridge_slave_0) entered forwarding state
[   51.568410][ T5900] 8021q: adding VLAN 0 to HW filter on device bond0
[   51.577765][ T4464] bridge0: port 1(bridge_slave_0) entered disabled state
[   51.585068][ T4464] bridge0: port 2(bridge_slave_1) entered disabled state
[   51.594301][ T5900] 8021q: adding VLAN 0 to HW filter on device team0
[   51.602757][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state
[   51.609832][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state
[   51.618795][ T4464] bridge0: port 2(bridge_slave_1) entered blocking state
[   51.626034][ T4464] bridge0: port 2(bridge_slave_1) entered forwarding state
[   51.666181][ T5900] 8021q: adding VLAN 0 to HW filter on device batadv0
[   51.681447][ T5900] veth0_vlan: entered promiscuous mode
[   51.688371][ T5900] veth1_vlan: entered promiscuous mode
[   51.699293][ T5900] veth0_macvtap: entered promiscuous mode
[   51.706838][ T5900] veth1_macvtap: entered promiscuous mode
[   51.715608][ T5900] batman_adv: batadv0: Interface activated: batadv_slave_0
[   51.724956][ T5900] batman_adv: batadv0: Interface activated: batadv_slave_1
[   51.733920][ T3190] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   51.743349][ T3190] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   51.752924][ T3190] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   51.762992][ T3190] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   51.808219][   T71] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   51.856276][   T71] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
2026/01/16 08:02:29 executed programs: 0
[   51.896248][   T71] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   51.946260][   T71] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   54.910747][   T71] bridge_slave_1: left allmulticast mode
[   54.917591][   T71] bridge_slave_1: left promiscuous mode
[   54.923218][   T71] bridge0: port 2(bridge_slave_1) entered disabled state
[   54.931147][   T71] bridge_slave_0: left allmulticast mode
[   54.937176][   T71] bridge_slave_0: left promiscuous mode
[   54.942989][   T71] bridge0: port 1(bridge_slave_0) entered disabled state
[   54.997555][   T71] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[   55.006647][   T71] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[   55.016135][   T71] bond0 (unregistering): Released all slaves
[   55.068870][   T71] hsr_slave_0: left promiscuous mode
[   55.079391][   T71] hsr_slave_1: left promiscuous mode
[   55.085080][   T71] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[   55.092634][   T71] batman_adv: batadv0: Removing interface: batadv_slave_0
[   55.100332][   T71] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[   55.108378][   T71] batman_adv: batadv0: Removing interface: batadv_slave_1
[   55.116737][   T71] veth1_macvtap: left promiscuous mode
[   55.122201][   T71] veth0_macvtap: left promiscuous mode
[   55.127711][   T71] veth1_vlan: left promiscuous mode
[   55.132908][   T71] veth0_vlan: left promiscuous mode
[   55.156128][   T71] team0 (unregistering): Port device team_slave_1 removed
[   55.164224][   T71] team0 (unregistering): Port device team_slave_0 removed
[   57.217110][ T5141] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[   57.224285][ T5141] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[   57.231521][ T5141] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[   57.239322][ T5141] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[   57.246587][ T5141] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[   57.281718][ T5997] chnl_net:caif_netlink_parms(): no params data found
[   57.299895][ T5997] bridge0: port 1(bridge_slave_0) entered blocking state
[   57.307481][ T5997] bridge0: port 1(bridge_slave_0) entered disabled state
[   57.314752][ T5997] bridge_slave_0: entered allmulticast mode
[   57.321146][ T5997] bridge_slave_0: entered promiscuous mode
[   57.327659][ T5997] bridge0: port 2(bridge_slave_1) entered blocking state
[   57.334726][ T5997] bridge0: port 2(bridge_slave_1) entered disabled state
[   57.342049][ T5997] bridge_slave_1: entered allmulticast mode
[   57.348478][ T5997] bridge_slave_1: entered promiscuous mode
[   57.360565][ T5997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   57.370600][ T5997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   57.384295][ T5997] team0: Port device team_slave_0 added
[   57.390657][ T5997] team0: Port device team_slave_1 added
[   57.400168][ T5997] batman_adv: batadv0: Adding interface: batadv_slave_0
[   57.407138][ T5997] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   57.433263][ T5997] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   57.444502][ T5997] batman_adv: batadv0: Adding interface: batadv_slave_1
[   57.451799][ T5997] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[   57.478423][ T5997] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   57.495431][ T5997] hsr_slave_0: entered promiscuous mode
[   57.501243][ T5997] hsr_slave_1: entered promiscuous mode
[   57.676135][ T5997] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   57.684062][ T5997] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   57.691985][ T5997] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   57.700149][ T5997] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   57.719190][ T5997] bridge0: port 2(bridge_slave_1) entered blocking state
[   57.726656][ T5997] bridge0: port 2(bridge_slave_1) entered forwarding state
[   57.733929][ T5997] bridge0: port 1(bridge_slave_0) entered blocking state
[   57.741367][ T5997] bridge0: port 1(bridge_slave_0) entered forwarding state
[   57.762688][ T5997] 8021q: adding VLAN 0 to HW filter on device bond0
[   57.773099][   T12] bridge0: port 1(bridge_slave_0) entered disabled state
[   57.781745][   T12] bridge0: port 2(bridge_slave_1) entered disabled state
[   57.793131][ T5997] 8021q: adding VLAN 0 to HW filter on device team0
[   57.801745][   T71] bridge0: port 1(bridge_slave_0) entered blocking state
[   57.808801][   T71] bridge0: port 1(bridge_slave_0) entered forwarding state
[   57.820075][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[   57.827262][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[   57.882027][ T5997] 8021q: adding VLAN 0 to HW filter on device batadv0
[   57.900757][ T5997] veth0_vlan: entered promiscuous mode
[   57.908547][ T5997] veth1_vlan: entered promiscuous mode
[   57.921577][ T5997] veth0_macvtap: entered promiscuous mode
[   57.929031][ T5997] veth1_macvtap: entered promiscuous mode
[   57.939405][ T5997] batman_adv: batadv0: Interface activated: batadv_slave_0
[   57.949374][ T5997] batman_adv: batadv0: Interface activated: batadv_slave_1
[   57.959371][   T71] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   57.972648][   T71] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   57.985870][   T71] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   57.994669][   T71] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   58.016091][   T71] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   58.024009][   T71] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
[   58.041330][   T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[   58.049530][   T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50


syzkaller build log:
go env (err=<nil>)
AR='ar'
CC='gcc'
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_ENABLED='1'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
CXX='g++'
GCCGO='gccgo'
GO111MODULE='auto'
GOAMD64='v1'
GOARCH='amd64'
GOAUTH='netrc'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOCACHEPROG=''
GODEBUG=''
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFIPS140='off'
GOFLAGS=''
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build1601059179=/tmp/go-build -gno-record-gcc-switches'
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs-2/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTELEMETRY='local'
GOTELEMETRYDIR='/syzkaller/.config/go/telemetry'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.24.4'
GOWORK=''
PKG_CONFIG='pkg-config'

git status (err=<nil>)
HEAD detached at d6526ea3e
nothing to commit, working tree clean


tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115"  ./sys/syz-sysgen | grep -q false || go install -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115"  ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115"  -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
mkdir -p ./bin/linux_amd64
g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \
	-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include   -DGOOS_linux=1 -DGOARCH_amd64=1 \
	-DHOSTGOOS_linux=1 -DGIT_REVISION=\"d6526ea3e6ad9081c902859bbb80f9f840377cb4\"
/usr/bin/ld: /tmp/ccwG8xGk.o: in function `Connection::Connect(char const*, char const*)':
executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking
./tools/check-syzos.sh 2>/dev/null



Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=12c3e39a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116082820.1222181-1-kartikey406@gmail.com>
@ 2026-01-16  8:52 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16  8:52 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in nr_add_node

BUG: memory leak
unreferenced object 0xffff888112b7cfc0 (size 64):
  comm "syz.0.17", pid 6718, jiffies 4294946821
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc e1636f1):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x6ab/0x1570 net/netrom/nr_route.c:149
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:665
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff888112acb200 (size 64):
  comm "syz.0.18", pid 6733, jiffies 4294946834
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 7988e401):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x6ab/0x1570 net/netrom/nr_route.c:149
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:665
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810a721fc0 (size 64):
  comm "syz.0.19", pid 6751, jiffies 4294946847
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc e22da86e):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x6ab/0x1570 net/netrom/nr_route.c:149
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:665
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF


Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=1079b444580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=14d0c39a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116085932.1223370-1-kartikey406@gmail.com>
@ 2026-01-16  9:15 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16  9:15 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in nr_add_node

BUG: memory leak
unreferenced object 0xffff88810f29d480 (size 64):
  comm "syz.0.17", pid 6744, jiffies 4294946671
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 98aff5c0):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:682
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810f29d680 (size 64):
  comm "syz.0.18", pid 6768, jiffies 4294946683
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc ef312730):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:682
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810f29d080 (size 64):
  comm "syz.0.19", pid 6770, jiffies 4294946695
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 74946b5f):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:682
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1254
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF


Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=1225b444580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=134be39a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116093944.1224799-1-kartikey406@gmail.com>
@ 2026-01-16 10:02 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16 10:02 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in nr_add_node

BUG: memory leak
unreferenced object 0xffff88811385dec0 (size 64):
  comm "syz.0.17", pid 6752, jiffies 4294948986
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 21d35625):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:682
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1257
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88811385d980 (size 64):
  comm "syz.0.18", pid 6754, jiffies 4294949002
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 564d84d5):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:682
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1257
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810a38c900 (size 64):
  comm "syz.0.19", pid 6756, jiffies 4294949018
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc cde8c8ba):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:682
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1257
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF


Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=10b55522580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=13b3339a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
       [not found] <20260116125146.1226609-1-kartikey406@gmail.com>
@ 2026-01-16 14:04 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-16 14:04 UTC (permalink / raw)
  To: kartikey406, linux-kernel, syzkaller-bugs

Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in nr_add_node

BUG: memory leak
unreferenced object 0xffff888110bb0040 (size 64):
  comm "syz.0.17", pid 6760, jiffies 4294948943
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc ccec3325):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:688
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1257
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff888110bb0200 (size 64):
  comm "syz.0.18", pid 6762, jiffies 4294948964
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc bb72e1d5):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:688
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1257
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810e304200 (size 64):
  comm "syz.0.19", pid 6764, jiffies 4294948984
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    cc cc cc cc cc cc 02 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 20d7adba):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    __kmalloc_cache_noprof+0x3b2/0x570 mm/slub.c:5771
    kmalloc_noprof include/linux/slab.h:957 [inline]
    nr_add_node+0x7f3/0x1600 net/netrom/nr_route.c:153
    nr_rt_ioctl+0xaec/0x1410 net/netrom/nr_route.c:688
    nr_ioctl+0x11f/0x1a0 net/netrom/af_netrom.c:1257
    sock_do_ioctl+0x84/0x1a0 net/socket.c:1254
    sock_ioctl+0x149/0x480 net/socket.c:1375
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:597 [inline]
    __se_sys_ioctl fs/ioctl.c:583 [inline]
    __x64_sys_ioctl+0xf4/0x140 fs/ioctl.c:583
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF


Tested on:

commit:         983d014a kernel: modules: Add SPDX license identifier ..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=17870852580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=87bc41cae23d2144
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=162e5a3a580000


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [syzbot] [hams?] memory leak in nr_add_node
  2026-01-17 14:26 Testing for netrom: fix " Prithvi Tambewagh
@ 2026-01-17 17:00 ` syzbot
  0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-01-17 17:00 UTC (permalink / raw)
  To: activprithvi, davem, edumazet, horms, kuba, linux-hams,
	linux-kernel, netdev, pabeni, syzkaller-bugs

Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-by: syzbot+3f2d46b6e62b8dd546d3@syzkaller.appspotmail.com
Tested-by: syzbot+3f2d46b6e62b8dd546d3@syzkaller.appspotmail.com

Tested on:

commit:         ea1013c1 Merge tag 'bpf-fixes' of git://git.kernel.org..
git tree:       git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=1740b522580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=d60836e327fd6756
dashboard link: https://syzkaller.appspot.com/bug?extid=3f2d46b6e62b8dd546d3
compiler:       gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch:          https://syzkaller.appspot.com/x/patch.diff?x=15da13fc580000

Note: testing is done by a robot and is best-effort only.

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2026-01-17 17:00 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <20260116082820.1222181-1-kartikey406@gmail.com>
2026-01-16  8:52 ` [syzbot] [hams?] memory leak in nr_add_node syzbot
2026-01-17 14:26 Testing for netrom: fix " Prithvi Tambewagh
2026-01-17 17:00 ` [syzbot] [hams?] " syzbot
     [not found] <20260116125146.1226609-1-kartikey406@gmail.com>
2026-01-16 14:04 ` syzbot
     [not found] <20260116093944.1224799-1-kartikey406@gmail.com>
2026-01-16 10:02 ` syzbot
     [not found] <20260116085932.1223370-1-kartikey406@gmail.com>
2026-01-16  9:15 ` syzbot
     [not found] <20260116074227.1221301-1-kartikey406@gmail.com>
2026-01-16  8:03 ` syzbot
     [not found] <20260116034008.1209650-1-kartikey406@gmail.com>
2026-01-16  4:49 ` syzbot
     [not found] <20260116021908.1208112-1-kartikey406@gmail.com>
2026-01-16  3:02 ` syzbot
  -- strict thread matches above, loose matches on Subject: below --
2026-01-15 20:04 syzbot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox