From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.4 required=3.0 tests=FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BE249C2BB1D for ; Fri, 17 Apr 2020 03:45:12 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id A4C67217D8 for ; Fri, 17 Apr 2020 03:45:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727786AbgDQDpL (ORCPT ); Thu, 16 Apr 2020 23:45:11 -0400 Received: from mail-io1-f71.google.com ([209.85.166.71]:35520 "EHLO mail-io1-f71.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726465AbgDQDpL (ORCPT ); Thu, 16 Apr 2020 23:45:11 -0400 Received: by mail-io1-f71.google.com with SMTP id s26so710619ioj.2 for ; Thu, 16 Apr 2020 20:45:10 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=hOnKfvz92d+3vQbiWu1IoCbVPw/u5sRXIPxJWHDs3S8=; b=t/X0T+BxLZxWpAFvOThw/F17+LNbnFNBtJuNV3WZBwa6g5FVnbgxj+7hud/ImrqkOQ WtxOdzl/abw1utPlX2sB7kJh0iV6lxGpnVv6uA7qb5p/sWUtcp2+CFANrvGEyIs6YuWq jkG4CdFClUZugi6sphXRGp6zEbs7QKjgZ2vIIHkOtW5t+0CpAw/fvEShxxmYFB+nza2R 0DR9ckTCz1FRRcFH0SQUJB923DcdTsk0OvGaMb7BHQQyUx/+USPRbF9J/lpZ7oI/hv+r MsaErfE0OcagjRC6ak0jQ0IGMmeHW9G0Baa2rSFCfDmgOy3uw1+S+M129Yq2PQoxppRG myoQ== X-Gm-Message-State: AGi0PuYjr72BSiqyvzal555yVgU4gKWH1EXbM2eaulPnLKIjKKZZWFp4 1QBozE0+pnoBYBi/QYG7yB8aTFIaQE2xvSu9zk3l14lnJQLs X-Google-Smtp-Source: APiQypJEkeg0NpTLEnkdy9odmuVK2S3aDkvJmnDn2mOUeSJm2gQyAUXL2O60uCFOaNh/H/lg3aNMDYWJS0FYxbq2cArScOe1DD55 MIME-Version: 1.0 X-Received: by 2002:a05:6602:13d4:: with SMTP id o20mr1236860iov.104.1587095110119; Thu, 16 Apr 2020 20:45:10 -0700 (PDT) Date: Thu, 16 Apr 2020 20:45:10 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000004373bc05a37460df@google.com> Subject: memory leak in sctp_stream_init_ext (2) From: syzbot To: davem@davemloft.net, kuba@kernel.org, linux-kernel@vger.kernel.org, linux-sctp@vger.kernel.org, marcelo.leitner@gmail.com, netdev@vger.kernel.org, nhorman@tuxdriver.com, syzkaller-bugs@googlegroups.com, vyasevich@gmail.com Content-Type: text/plain; charset="UTF-8" Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: 00086336 Merge tag 'efi-urgent-2020-04-15' of git://git.ke.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=12996107e00000 kernel config: https://syzkaller.appspot.com/x/.config?x=efff978b972fb2c dashboard link: https://syzkaller.appspot.com/bug?extid=96e916d6f6f7617bc9fc compiler: gcc (GCC) 9.0.0 20181231 (experimental) syz repro: https://syzkaller.appspot.com/x/repro.syz?x=137ddf3fe00000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+96e916d6f6f7617bc9fc@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff888103ba4580 (size 96): comm "syz-executor.1", pid 8335, jiffies 4294953411 (age 14.410s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b06f3e80>] kmalloc include/linux/slab.h:555 [inline] [<00000000b06f3e80>] kzalloc include/linux/slab.h:669 [inline] [<00000000b06f3e80>] sctp_stream_init_ext+0x28/0xe0 net/sctp/stream.c:162 [<00000000aff2ecba>] sctp_sendmsg_to_asoc+0x9af/0xab0 net/sctp/socket.c:1811 [<00000000d5d5eb76>] sctp_sendmsg+0x2a6/0xc60 net/sctp/socket.c:2031 [<0000000023cdbfa3>] inet_sendmsg+0x39/0x60 net/ipv4/af_inet.c:807 [<00000000885878ef>] sock_sendmsg_nosec net/socket.c:652 [inline] [<00000000885878ef>] sock_sendmsg+0x4c/0x60 net/socket.c:672 [<0000000009d727e5>] __sys_sendto+0x11d/0x1c0 net/socket.c:2000 [<0000000066974477>] __do_sys_sendto net/socket.c:2012 [inline] [<0000000066974477>] __se_sys_sendto net/socket.c:2008 [inline] [<0000000066974477>] __x64_sys_sendto+0x26/0x30 net/socket.c:2008 [<00000000ecc1fea9>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000605d798b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this bug, for details see: https://goo.gl/tpsmEJ#testing-patches