From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id AE7E5C00A5A for ; Wed, 18 Jan 2023 03:41:45 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229553AbjARDlk (ORCPT ); Tue, 17 Jan 2023 22:41:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57658 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229457AbjARDlk (ORCPT ); Tue, 17 Jan 2023 22:41:40 -0500 Received: from mail-il1-f198.google.com (mail-il1-f198.google.com [209.85.166.198]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EFAD853558 for ; Tue, 17 Jan 2023 19:41:38 -0800 (PST) Received: by mail-il1-f198.google.com with SMTP id h4-20020a056e021b8400b0030d901a84d9so23186514ili.6 for ; Tue, 17 Jan 2023 19:41:38 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=74X7kAcEj4fU0m5Re0lmRYJTEgxMAcwvfPdyS/kczFQ=; b=ra/1XewXELsxk6NXJ/F9p2s+9WfwjlkoaFWHfVq9BRJ4jSwyoLO2czOsjs646tRGqa OmCEFILDxAn4/DTNEcc1xTHiSpQJyxet0kJze9J9f0cn6Hh9eY1I6WWVTUEHdDFvKhKv Pum1FS4j8ORmkkRuug1mgfZKWnImSFgcmIVKUD862dRsUFSzbp91mzTH2yZCsl9zqI2d M2E43wBA8DLZkR/FdJwxZSh3WWyHr8v5hzCA6KPi7FnXrGdkbzbr6znSjLn3xsjkdDGs Wpnaq0ZCjjhstU1Ztzhis/NzMtt077kbMZ8i53EHeSsa+DYQQTOCg6q2MbVXEoIDpvEU h7Tw== X-Gm-Message-State: AFqh2kpfVB24pP6GrFKt1NinXKbl7mLyR+DiNJ0EsDkseXaEN2xDWtSw GWArYAXAcGg5uRe8gy+Tc36dftghPJR/oKXLkIerK1nBJ+wR X-Google-Smtp-Source: AMrXdXucyuTnzhjQ57Y1trDIyz3uY02HOBd5CqFkkNCb76J+vaqIkQzHmgHPmZ1lhguKRGmPq256CFday39JBnw2liZq1QeNjQXj MIME-Version: 1.0 X-Received: by 2002:a02:c001:0:b0:39d:72ab:a7c5 with SMTP id y1-20020a02c001000000b0039d72aba7c5mr529641jai.247.1674013298341; Tue, 17 Jan 2023 19:41:38 -0800 (PST) Date: Tue, 17 Jan 2023 19:41:38 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000ff3e7a05f28197c4@google.com> Subject: [syzbot] memory leak in j1939_session_new From: syzbot To: davem@davemloft.net, edumazet@google.com, kernel@pengutronix.de, kuba@kernel.org, linux-can@vger.kernel.org, linux-kernel@vger.kernel.org, linux@rempel-privat.de, mkl@pengutronix.de, netdev@vger.kernel.org, pabeni@redhat.com, robin@protonic.nl, socketcan@hartkopp.net, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-can@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: d9fc1511728c Merge tag 'net-6.2-rc4' of git://git.kernel.o.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=10ef774a480000 kernel config: https://syzkaller.appspot.com/x/.config?x=277a06a151173742 dashboard link: https://syzkaller.appspot.com/bug?extid=e11e4ccbf72be52c556b compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11390e7e480000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/c69b02bb465e/disk-d9fc1511.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/7cbf6be156ee/vmlinux-d9fc1511.xz kernel image: https://storage.googleapis.com/syzbot-assets/2d087daee200/bzImage-d9fc1511.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+e11e4ccbf72be52c556b@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff88810b04c600 (size 512): comm "syz-executor.3", pid 5457, jiffies 4294949672 (age 11.860s) hex dump (first 32 bytes): 00 80 16 17 81 88 ff ff 08 c6 04 0b 81 88 ff ff ................ 08 c6 04 0b 81 88 ff ff 18 c6 04 0b 81 88 ff ff ................ backtrace: [] kmalloc_trace+0x20/0x90 mm/slab_common.c:1062 [] kmalloc include/linux/slab.h:580 [inline] [] kzalloc include/linux/slab.h:720 [inline] [] j1939_session_new+0x5b/0x160 net/can/j1939/transport.c:1491 [] j1939_tp_send+0x150/0x350 net/can/j1939/transport.c:2001 [] j1939_sk_send_loop net/can/j1939/socket.c:1133 [inline] [] j1939_sk_sendmsg+0x4a4/0x810 net/can/j1939/socket.c:1256 [] sock_sendmsg_nosec net/socket.c:714 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:734 [] sock_no_sendpage+0x8f/0xc0 net/core/sock.c:3241 [] kernel_sendpage net/socket.c:3555 [inline] [] kernel_sendpage+0xcd/0x2b0 net/socket.c:3549 [] sock_sendpage+0x40/0x50 net/socket.c:1054 [] pipe_to_sendpage+0xa2/0x110 fs/splice.c:361 [] splice_from_pipe_feed fs/splice.c:415 [inline] [] __splice_from_pipe+0x1ed/0x330 fs/splice.c:559 [] splice_from_pipe fs/splice.c:594 [inline] [] generic_splice_sendpage+0x6f/0xa0 fs/splice.c:743 [] do_splice_from fs/splice.c:764 [inline] [] direct_splice_actor+0x4b/0x70 fs/splice.c:931 [] splice_direct_to_actor+0x149/0x350 fs/splice.c:886 [] do_splice_direct+0xe8/0x150 fs/splice.c:974 [] do_sendfile+0x57f/0x7e0 fs/read_write.c:1255 [] __do_sys_sendfile64 fs/read_write.c:1323 [inline] [] __se_sys_sendfile64 fs/read_write.c:1309 [inline] [] __x64_sys_sendfile64+0xe2/0x100 fs/read_write.c:1309 BUG: memory leak unreferenced object 0xffff8881198de300 (size 240): comm "syz-executor.3", pid 5457, jiffies 4294949672 (age 11.860s) hex dump (first 32 bytes): 00 e8 8d 19 81 88 ff ff 68 c6 04 0b 81 88 ff ff ........h....... 00 80 d3 13 81 88 ff ff 00 d4 f0 18 81 88 ff ff ................ backtrace: [] __alloc_skb+0x202/0x270 net/core/skbuff.c:552 [] alloc_skb include/linux/skbuff.h:1270 [inline] [] alloc_skb_with_frags+0x6a/0x340 net/core/skbuff.c:6195 [] sock_alloc_send_pskb+0x39f/0x3d0 net/core/sock.c:2741 [] sock_alloc_send_skb include/net/sock.h:1888 [inline] [] j1939_sk_alloc_skb net/can/j1939/socket.c:864 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1121 [inline] [] j1939_sk_sendmsg+0x2d2/0x810 net/can/j1939/socket.c:1256 [] sock_sendmsg_nosec net/socket.c:714 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:734 [] sock_no_sendpage+0x8f/0xc0 net/core/sock.c:3241 [] kernel_sendpage net/socket.c:3555 [inline] [] kernel_sendpage+0xcd/0x2b0 net/socket.c:3549 [] sock_sendpage+0x40/0x50 net/socket.c:1054 [] pipe_to_sendpage+0xa2/0x110 fs/splice.c:361 [] splice_from_pipe_feed fs/splice.c:415 [inline] [] __splice_from_pipe+0x1ed/0x330 fs/splice.c:559 [] splice_from_pipe fs/splice.c:594 [inline] [] generic_splice_sendpage+0x6f/0xa0 fs/splice.c:743 [] do_splice_from fs/splice.c:764 [inline] [] direct_splice_actor+0x4b/0x70 fs/splice.c:931 [] splice_direct_to_actor+0x149/0x350 fs/splice.c:886 [] do_splice_direct+0xe8/0x150 fs/splice.c:974 [] do_sendfile+0x57f/0x7e0 fs/read_write.c:1255 [] __do_sys_sendfile64 fs/read_write.c:1323 [inline] [] __se_sys_sendfile64 fs/read_write.c:1309 [inline] [] __x64_sys_sendfile64+0xe2/0x100 fs/read_write.c:1309 BUG: memory leak unreferenced object 0xffff8881198de800 (size 240): comm "syz-executor.3", pid 5457, jiffies 4294949672 (age 11.860s) hex dump (first 32 bytes): 68 c6 04 0b 81 88 ff ff 00 e3 8d 19 81 88 ff ff h............... 00 80 d3 13 81 88 ff ff 00 d4 f0 18 81 88 ff ff ................ backtrace: [] __alloc_skb+0x202/0x270 net/core/skbuff.c:552 [] alloc_skb include/linux/skbuff.h:1270 [inline] [] alloc_skb_with_frags+0x6a/0x340 net/core/skbuff.c:6195 [] sock_alloc_send_pskb+0x39f/0x3d0 net/core/sock.c:2741 [] sock_alloc_send_skb include/net/sock.h:1888 [inline] [] j1939_sk_alloc_skb net/can/j1939/socket.c:864 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1121 [inline] [] j1939_sk_sendmsg+0x2d2/0x810 net/can/j1939/socket.c:1256 [] sock_sendmsg_nosec net/socket.c:714 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:734 [] sock_no_sendpage+0x8f/0xc0 net/core/sock.c:3241 [] kernel_sendpage net/socket.c:3555 [inline] [] kernel_sendpage+0xcd/0x2b0 net/socket.c:3549 [] sock_sendpage+0x40/0x50 net/socket.c:1054 [] pipe_to_sendpage+0xa2/0x110 fs/splice.c:361 [] splice_from_pipe_feed fs/splice.c:415 [inline] [] __splice_from_pipe+0x1ed/0x330 fs/splice.c:559 [] splice_from_pipe fs/splice.c:594 [inline] [] generic_splice_sendpage+0x6f/0xa0 fs/splice.c:743 [] do_splice_from fs/splice.c:764 [inline] [] direct_splice_actor+0x4b/0x70 fs/splice.c:931 [] splice_direct_to_actor+0x149/0x350 fs/splice.c:886 [] do_splice_direct+0xe8/0x150 fs/splice.c:974 [] do_sendfile+0x57f/0x7e0 fs/read_write.c:1255 [] __do_sys_sendfile64 fs/read_write.c:1323 [inline] [] __se_sys_sendfile64 fs/read_write.c:1309 [inline] [] __x64_sys_sendfile64+0xe2/0x100 fs/read_write.c:1309 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches