From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,PDS_SHORTFWD_URISHRT_QP,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 659E2C433DB for ; Wed, 31 Mar 2021 09:04:41 +0000 (UTC) Received: from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id F1370619D8 for ; Wed, 31 Mar 2021 09:04:40 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org F1370619D8 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=virtualization-bounces@lists.linux-foundation.org Received: from localhost (localhost [127.0.0.1]) by smtp4.osuosl.org (Postfix) with ESMTP id 9AB7640635; Wed, 31 Mar 2021 09:04:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp4.osuosl.org ([127.0.0.1]) by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8ThSjUYCxiKU; Wed, 31 Mar 2021 09:04:38 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by smtp4.osuosl.org (Postfix) with ESMTP id 6F43040633; Wed, 31 Mar 2021 09:04:37 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 293BFC000B; Wed, 31 Mar 2021 09:04:37 +0000 (UTC) Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 5B80CC000A for ; Wed, 31 Mar 2021 09:04:35 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 3413B607B2 for ; Wed, 31 Mar 2021 09:04:35 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Authentication-Results: smtp3.osuosl.org (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6foKy0Uqkdao for ; Wed, 31 Mar 2021 09:04:32 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) by smtp3.osuosl.org (Postfix) with ESMTPS id A836C60730 for ; Wed, 31 Mar 2021 09:04:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1617181471; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=oFnyCqVp+EXgH+zoavszk7CCQt6J1VVJYc4gCNFPlfU=; b=ZfO6RX6m2W7MqZ5fagdRSZ+5Q14OaedNDH+6/U8GXrQSdBBjVXN8PdLv/i5k5mRGZAVSjY ymXTFv3G6PXFmZzkgkB0T6DK7l0RzS8o8tUDDw2StONgOhEiyjAKao4yHlytT6G428hcFE RqDsVQGTchmAt6KS/icpXQDNqY/itsg= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-588-SWWCB-r3Mt-FwBxVV24kfQ-1; Wed, 31 Mar 2021 05:04:21 -0400 X-MC-Unique: SWWCB-r3Mt-FwBxVV24kfQ-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id A3B9F1009E25; Wed, 31 Mar 2021 09:04:20 +0000 (UTC) Received: from localhost (ovpn-115-85.ams2.redhat.com [10.36.115.85]) by smtp.corp.redhat.com (Postfix) with ESMTP id C49A619C44; Wed, 31 Mar 2021 09:04:19 +0000 (UTC) Date: Wed, 31 Mar 2021 10:04:18 +0100 From: Stefan Hajnoczi To: sgarzare@redhat.com Subject: Re: memory leak in virtio_transport_send_pkt_info Message-ID: References: <00000000000069a2e905bad5d02e@google.com> MIME-Version: 1.0 In-Reply-To: <00000000000069a2e905bad5d02e@google.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Cc: syzbot , kvm@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, kuba@kernel.org, davem@davemloft.net X-BeenThere: virtualization@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Linux virtualization List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============0868661937708590347==" Errors-To: virtualization-bounces@lists.linux-foundation.org Sender: "Virtualization" --===============0868661937708590347== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="v4rJ/Oj+3HKafot9" Content-Disposition: inline --v4rJ/Oj+3HKafot9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Feb 08, 2021 at 08:39:30AM -0800, syzbot wrote: > Hello, >=20 > syzbot found the following issue on: >=20 > HEAD commit: 9f29bd8b Merge tag 'fs_for_v5.11-rc5' of git://git.kernel= =2E.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=3D11e435af500000 > kernel config: https://syzkaller.appspot.com/x/.config?x=3D162a0109d6ff7= 31f > dashboard link: https://syzkaller.appspot.com/bug?extid=3D24452624fc4c571= eedd9 > compiler: gcc (GCC) 10.1.0-syz 20200507 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=3D135dd494d00= 000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=3D128787e7500000 >=20 > IMPORTANT: if you fix the issue, please add the following tag to the comm= it: > Reported-by: syzbot+24452624fc4c571eedd9@syzkaller.appspotmail.com Hi Stefano, Looks like tx packets are still queued when the syzkaller leak check runs. I don't see a fix for this in linux.git. Have you already looked at this? Stefan >=20 > executing program > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > executing program > executing program >=20 >=20 > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. >=20 > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > syzbot can test patches for this issue, for details see: > https://goo.gl/tpsmEJ#testing-patches >=20 --v4rJ/Oj+3HKafot9 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEhpWov9P5fNqsNXdanKSrs4Grc8gFAmBkOxIACgkQnKSrs4Gr c8guhQgAhNpKGNEIXYkCtDAP1kz36lsQoFPcGbWSsckfpzZCp0c4DRYsRYrcp50L jqz0wGVbUOkfFGBfhijgKUMYWX63OlCdVFNb42V7dAASc1JdtyvyIGyyZX+sot/m FwnD3xYxVqD6CdMbZeF3lc17t0Hb7mwg0Re2/difMhHjqeglpX5gxadXc9XX4Jo2 UvkgvU4zySWIdf4nKab0DEj4RLSypvXz1M25GUDZ+9tykPD/j/M/6TKkl2HJAwUs RYswkNFAZF9JFWN2OTvyEDfPoO/f0+I/PuA9tLzdKiMVIm8lpzY9yR6kaeak2QG6 9eknVoURPmrcVkOaiBv0ooMWGr0q8A== =Dm6J -----END PGP SIGNATURE----- --v4rJ/Oj+3HKafot9-- --===============0868661937708590347== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Virtualization mailing list Virtualization@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/virtualization --===============0868661937708590347==--