From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id CD4B8C38142 for ; Wed, 18 Jan 2023 03:41:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229575AbjARDlk (ORCPT ); Tue, 17 Jan 2023 22:41:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57660 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbjARDlk (ORCPT ); Tue, 17 Jan 2023 22:41:40 -0500 Received: from mail-io1-f71.google.com (mail-io1-f71.google.com [209.85.166.71]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EFBF953570 for ; Tue, 17 Jan 2023 19:41:38 -0800 (PST) Received: by mail-io1-f71.google.com with SMTP id h17-20020a5d9e11000000b007049a892316so6734148ioh.7 for ; Tue, 17 Jan 2023 19:41:38 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=74X7kAcEj4fU0m5Re0lmRYJTEgxMAcwvfPdyS/kczFQ=; b=Sbd9QYnLfqfuD6TgqK28zY5DShDx+c/RyzTExqEyGyy49U7/SJ9Qp9R/4QXUJbNpIL 112vsC/kwVN5gTxLIoDYax6d0qnaSfDib9BRn1rnkKq6WT/NpfKxOcZdUWQ7uVybbWYD Volp2nRYk3vJ0ORaqayy5zdJtPNGqOPzVEFCT/X2jT+gG8HRCH/vI5SVYVgKxUodzdim zcjIIfjlNZCSNiBxwKPsfg1pXLYSPBH7eEgLyRsceKZ9l2aZQ1X0I3vbbhEZsiAui6j7 e4omaBbEy4g3jkaiRrN2jYfY5rvqJz/5HMjnyjIQBcK02UfxsitvZYbw/SieKITlFApz uP0g== X-Gm-Message-State: AFqh2kqfYJiUbX2P/g7w4XJlDyaE9baEAI//oGxCQQMHPJmRMU+2+zOF EGb+g5BQkWQJAzCuuuSaXoMjQsIH65C5kpsmubZhdTJTk+ax X-Google-Smtp-Source: AMrXdXucyuTnzhjQ57Y1trDIyz3uY02HOBd5CqFkkNCb76J+vaqIkQzHmgHPmZ1lhguKRGmPq256CFday39JBnw2liZq1QeNjQXj MIME-Version: 1.0 X-Received: by 2002:a02:c001:0:b0:39d:72ab:a7c5 with SMTP id y1-20020a02c001000000b0039d72aba7c5mr529641jai.247.1674013298341; Tue, 17 Jan 2023 19:41:38 -0800 (PST) Date: Tue, 17 Jan 2023 19:41:38 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000ff3e7a05f28197c4@google.com> Subject: [syzbot] memory leak in j1939_session_new From: syzbot To: davem@davemloft.net, edumazet@google.com, kernel@pengutronix.de, kuba@kernel.org, linux-can@vger.kernel.org, linux-kernel@vger.kernel.org, linux@rempel-privat.de, mkl@pengutronix.de, netdev@vger.kernel.org, pabeni@redhat.com, robin@protonic.nl, socketcan@hartkopp.net, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: d9fc1511728c Merge tag 'net-6.2-rc4' of git://git.kernel.o.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=10ef774a480000 kernel config: https://syzkaller.appspot.com/x/.config?x=277a06a151173742 dashboard link: https://syzkaller.appspot.com/bug?extid=e11e4ccbf72be52c556b compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11390e7e480000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/c69b02bb465e/disk-d9fc1511.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/7cbf6be156ee/vmlinux-d9fc1511.xz kernel image: https://storage.googleapis.com/syzbot-assets/2d087daee200/bzImage-d9fc1511.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+e11e4ccbf72be52c556b@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff88810b04c600 (size 512): comm "syz-executor.3", pid 5457, jiffies 4294949672 (age 11.860s) hex dump (first 32 bytes): 00 80 16 17 81 88 ff ff 08 c6 04 0b 81 88 ff ff ................ 08 c6 04 0b 81 88 ff ff 18 c6 04 0b 81 88 ff ff ................ backtrace: [] kmalloc_trace+0x20/0x90 mm/slab_common.c:1062 [] kmalloc include/linux/slab.h:580 [inline] [] kzalloc include/linux/slab.h:720 [inline] [] j1939_session_new+0x5b/0x160 net/can/j1939/transport.c:1491 [] j1939_tp_send+0x150/0x350 net/can/j1939/transport.c:2001 [] j1939_sk_send_loop net/can/j1939/socket.c:1133 [inline] [] j1939_sk_sendmsg+0x4a4/0x810 net/can/j1939/socket.c:1256 [] sock_sendmsg_nosec net/socket.c:714 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:734 [] sock_no_sendpage+0x8f/0xc0 net/core/sock.c:3241 [] kernel_sendpage net/socket.c:3555 [inline] [] kernel_sendpage+0xcd/0x2b0 net/socket.c:3549 [] sock_sendpage+0x40/0x50 net/socket.c:1054 [] pipe_to_sendpage+0xa2/0x110 fs/splice.c:361 [] splice_from_pipe_feed fs/splice.c:415 [inline] [] __splice_from_pipe+0x1ed/0x330 fs/splice.c:559 [] splice_from_pipe fs/splice.c:594 [inline] [] generic_splice_sendpage+0x6f/0xa0 fs/splice.c:743 [] do_splice_from fs/splice.c:764 [inline] [] direct_splice_actor+0x4b/0x70 fs/splice.c:931 [] splice_direct_to_actor+0x149/0x350 fs/splice.c:886 [] do_splice_direct+0xe8/0x150 fs/splice.c:974 [] do_sendfile+0x57f/0x7e0 fs/read_write.c:1255 [] __do_sys_sendfile64 fs/read_write.c:1323 [inline] [] __se_sys_sendfile64 fs/read_write.c:1309 [inline] [] __x64_sys_sendfile64+0xe2/0x100 fs/read_write.c:1309 BUG: memory leak unreferenced object 0xffff8881198de300 (size 240): comm "syz-executor.3", pid 5457, jiffies 4294949672 (age 11.860s) hex dump (first 32 bytes): 00 e8 8d 19 81 88 ff ff 68 c6 04 0b 81 88 ff ff ........h....... 00 80 d3 13 81 88 ff ff 00 d4 f0 18 81 88 ff ff ................ backtrace: [] __alloc_skb+0x202/0x270 net/core/skbuff.c:552 [] alloc_skb include/linux/skbuff.h:1270 [inline] [] alloc_skb_with_frags+0x6a/0x340 net/core/skbuff.c:6195 [] sock_alloc_send_pskb+0x39f/0x3d0 net/core/sock.c:2741 [] sock_alloc_send_skb include/net/sock.h:1888 [inline] [] j1939_sk_alloc_skb net/can/j1939/socket.c:864 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1121 [inline] [] j1939_sk_sendmsg+0x2d2/0x810 net/can/j1939/socket.c:1256 [] sock_sendmsg_nosec net/socket.c:714 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:734 [] sock_no_sendpage+0x8f/0xc0 net/core/sock.c:3241 [] kernel_sendpage net/socket.c:3555 [inline] [] kernel_sendpage+0xcd/0x2b0 net/socket.c:3549 [] sock_sendpage+0x40/0x50 net/socket.c:1054 [] pipe_to_sendpage+0xa2/0x110 fs/splice.c:361 [] splice_from_pipe_feed fs/splice.c:415 [inline] [] __splice_from_pipe+0x1ed/0x330 fs/splice.c:559 [] splice_from_pipe fs/splice.c:594 [inline] [] generic_splice_sendpage+0x6f/0xa0 fs/splice.c:743 [] do_splice_from fs/splice.c:764 [inline] [] direct_splice_actor+0x4b/0x70 fs/splice.c:931 [] splice_direct_to_actor+0x149/0x350 fs/splice.c:886 [] do_splice_direct+0xe8/0x150 fs/splice.c:974 [] do_sendfile+0x57f/0x7e0 fs/read_write.c:1255 [] __do_sys_sendfile64 fs/read_write.c:1323 [inline] [] __se_sys_sendfile64 fs/read_write.c:1309 [inline] [] __x64_sys_sendfile64+0xe2/0x100 fs/read_write.c:1309 BUG: memory leak unreferenced object 0xffff8881198de800 (size 240): comm "syz-executor.3", pid 5457, jiffies 4294949672 (age 11.860s) hex dump (first 32 bytes): 68 c6 04 0b 81 88 ff ff 00 e3 8d 19 81 88 ff ff h............... 00 80 d3 13 81 88 ff ff 00 d4 f0 18 81 88 ff ff ................ backtrace: [] __alloc_skb+0x202/0x270 net/core/skbuff.c:552 [] alloc_skb include/linux/skbuff.h:1270 [inline] [] alloc_skb_with_frags+0x6a/0x340 net/core/skbuff.c:6195 [] sock_alloc_send_pskb+0x39f/0x3d0 net/core/sock.c:2741 [] sock_alloc_send_skb include/net/sock.h:1888 [inline] [] j1939_sk_alloc_skb net/can/j1939/socket.c:864 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1121 [inline] [] j1939_sk_sendmsg+0x2d2/0x810 net/can/j1939/socket.c:1256 [] sock_sendmsg_nosec net/socket.c:714 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:734 [] sock_no_sendpage+0x8f/0xc0 net/core/sock.c:3241 [] kernel_sendpage net/socket.c:3555 [inline] [] kernel_sendpage+0xcd/0x2b0 net/socket.c:3549 [] sock_sendpage+0x40/0x50 net/socket.c:1054 [] pipe_to_sendpage+0xa2/0x110 fs/splice.c:361 [] splice_from_pipe_feed fs/splice.c:415 [inline] [] __splice_from_pipe+0x1ed/0x330 fs/splice.c:559 [] splice_from_pipe fs/splice.c:594 [inline] [] generic_splice_sendpage+0x6f/0xa0 fs/splice.c:743 [] do_splice_from fs/splice.c:764 [inline] [] direct_splice_actor+0x4b/0x70 fs/splice.c:931 [] splice_direct_to_actor+0x149/0x350 fs/splice.c:886 [] do_splice_direct+0xe8/0x150 fs/splice.c:974 [] do_sendfile+0x57f/0x7e0 fs/read_write.c:1255 [] __do_sys_sendfile64 fs/read_write.c:1323 [inline] [] __se_sys_sendfile64 fs/read_write.c:1309 [inline] [] __x64_sys_sendfile64+0xe2/0x100 fs/read_write.c:1309 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches