[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CACT4Y+aryQ+jaMBSk1Wvu_h-y7_6HisWz5Q==REcZfTg8-=-4w@mail.gmail.com>
Date: Fri, 10 Jul 2020 08:44:12 +0200
From: Dmitry Vyukov <dvyukov@...gle.com>
To: cH3332 XR <ch3332xr@...il.com>
Cc: netdev <netdev@...r.kernel.org>,
syzkaller <syzkaller@...glegroups.com>
Subject: Re: memory leak in ip_mc_add_src ( Not tainted 5.8.0-rc3+)
On Fri, Jul 10, 2020 at 8:32 AM cH3332 XR <ch3332xr@...il.com> wrote:
>
>
> Hi,
> SYZKALLER found the following Memory leak
FWIW also reported by syzbot a year ago:
https://syzkaller.appspot.com/bug?id=c2e9e4f014f416e492dd46a41c068af268169d8e
> -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> BUG: memory leak
> unreferenced object 0xffff955412ff9e00 (size 32):
> comm "syz-executor.3", pid 4726, jiffies 4294777846 (age 3098.168s)
> hex dump (first 32 bytes):
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> 06 00 00 00 00 00 00 00 ac 1e 00 04 00 00 00 00 ................
> backtrace:
> [<000000002976d53e>] ip_mc_add_src+0x35f/0x3e0
> [<00000000f22fc984>] ip_mc_source+0x2db/0x4e0
> [<00000000a814b668>] do_ip_setsockopt.isra.14+0x541/0x11c0
> [<0000000071f25adf>] ip_setsockopt+0x33/0xa0
> [<00000000a49ec12e>] udp_setsockopt+0x40/0x90
> [<000000002cc8a42f>] __sys_setsockopt+0x99/0x120
> [<00000000167d1a29>] __x64_sys_setsockopt+0x22/0x30
> [<00000000971d38a0>] do_syscall_64+0x3e/0x70
> [<00000000b19407da>] entry_SYSCALL_64_after_hwframe+0x44/0xa9
>
> BUG: memory leak
> unreferenced object 0xffff955412ff9280 (size 32):
> comm "syz-executor.3", pid 4726, jiffies 4294777846 (age 3098.168s)
> hex dump (first 32 bytes):
> 20 0d 77 0c 54 95 ff ff 00 00 00 00 00 00 00 00 .w.T...........
> 07 00 00 00 00 00 00 00 ac 1e 00 04 00 01 00 00 ................
> backtrace:
> [<000000002976d53e>] ip_mc_add_src+0x35f/0x3e0
> [<00000000f22fc984>] ip_mc_source+0x2db/0x4e0
> [<00000000a814b668>] do_ip_setsockopt.isra.14+0x541/0x11c0
> [<0000000071f25adf>] ip_setsockopt+0x33/0xa0
> [<00000000a49ec12e>] udp_setsockopt+0x40/0x90
> [<000000002cc8a42f>] __sys_setsockopt+0x99/0x120
> [<00000000167d1a29>] __x64_sys_setsockopt+0x22/0x30
> [<00000000971d38a0>] do_syscall_64+0x3e/0x70
> [<00000000b19407da>] entry_SYSCALL_64_after_hwframe+0x44/0xa9
>
> BUG: memory leak
> unreferenced object 0xffff95540c770d20 (size 32):
> comm "syz-executor.3", pid 27224, jiffies 4297068116 (age 807.903s)
> hex dump (first 32 bytes):
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> 01 00 00 00 00 00 00 00 ac 1e 01 04 00 01 00 00 ................
> backtrace:
> [<00000000a201d800>] ip_mc_add_src+0x1b2/0x3e0
> [<00000000f22fc984>] ip_mc_source+0x2db/0x4e0
> [<00000000a814b668>] do_ip_setsockopt.isra.14+0x541/0x11c0
> [<0000000071f25adf>] ip_setsockopt+0x33/0xa0
> [<00000000a49ec12e>] udp_setsockopt+0x40/0x90
> [<000000002cc8a42f>] __sys_setsockopt+0x99/0x120
> [<00000000167d1a29>] __x64_sys_setsockopt+0x22/0x30
> [<00000000971d38a0>] do_syscall_64+0x3e/0x70
> [<00000000b19407da>] entry_SYSCALL_64_after_hwframe+0x44/0xa9
>
> BUG: leak checking failed
>
> ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> Execute Syzkaller programs
> https://github.com/google/syzkaller/blob/master/docs/executing_syzkaller_programs.md
>
>
> --
> You received this message because you are subscribed to the Google Groups "syzkaller" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller+unsubscribe@...glegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller/CAJ5WPnGbWOqn7%3DWzYn4Kh-C9uCkBv%3DgTAmv%2Bb%2BofigVwoiUVbw%40mail.gmail.com.
Powered by blists - more mailing lists