[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000000000000cf606405ab0da28a@google.com>
Date: Wed, 22 Jul 2020 13:32:17 -0700
From: syzbot <syzbot+8bb053b5d63595ab47db@...kaller.appspotmail.com>
To: davem@...emloft.net, kuba@...nel.org, linux-kernel@...r.kernel.org,
linux-sctp@...r.kernel.org, marcelo.leitner@...il.com,
netdev@...r.kernel.org, nhorman@...driver.com,
syzkaller-bugs@...glegroups.com, vyasevich@...il.com
Subject: memory leak in sctp_packet_transmit
Hello,
syzbot found the following issue on:
HEAD commit: 4fa640dc Merge tag 'vfio-v5.8-rc7' of git://github.com/awi..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=149e5e27100000
kernel config: https://syzkaller.appspot.com/x/.config?x=61340c48ef4aedfb
dashboard link: https://syzkaller.appspot.com/bug?extid=8bb053b5d63595ab47db
compiler: gcc (GCC) 10.1.0-syz 20200507
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=118d1793100000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14805758900000
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+8bb053b5d63595ab47db@...kaller.appspotmail.com
executing program
executing program
BUG: memory leak
unreferenced object 0xffff888118cb6f00 (size 224):
comm "syz-executor698", pid 6423, jiffies 4294945994 (age 12.350s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 a2 2a 81 88 ff ff 40 e0 d0 24 81 88 ff ff ...*....@.......
backtrace:
[<00000000dbd8d389>] __alloc_skb+0x5e/0x250 net/core/skbuff.c:198
[<000000002ecd4b45>] alloc_skb include/linux/skbuff.h:1083 [inline]
[<000000002ecd4b45>] sctp_packet_transmit+0xdc/0xb30 net/sctp/output.c:572
[<0000000005eef223>] sctp_outq_flush_transports net/sctp/outqueue.c:1147 [inline]
[<0000000005eef223>] sctp_outq_flush+0xf6/0xa30 net/sctp/outqueue.c:1195
[<000000007ad403b8>] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1770 [inline]
[<000000007ad403b8>] sctp_side_effects net/sctp/sm_sideeffect.c:1185 [inline]
[<000000007ad403b8>] sctp_do_sm+0x197b/0x1f00 net/sctp/sm_sideeffect.c:1156
[<00000000696e5800>] sctp_assoc_bh_rcv+0x167/0x250 net/sctp/associola.c:1044
[<00000000bad89a41>] sctp_inq_push+0x76/0xa0 net/sctp/inqueue.c:80
[<0000000066ea2304>] sctp_backlog_rcv+0x83/0x370 net/sctp/input.c:344
[<000000004f4c84bd>] sk_backlog_rcv include/net/sock.h:997 [inline]
[<000000004f4c84bd>] __release_sock+0xa5/0x110 net/core/sock.c:2550
[<000000001cfa318a>] release_sock+0x32/0xc0 net/core/sock.c:3066
[<00000000538f7502>] sctp_wait_for_connect+0x11d/0x1e0 net/sctp/socket.c:9302
[<00000000a983945d>] sctp_sendmsg_to_asoc+0xa95/0xab0 net/sctp/socket.c:1892
[<00000000136d87b5>] sctp_sendmsg+0x704/0xbd0 net/sctp/socket.c:2038
[<000000003d35bb02>] inet_sendmsg+0x39/0x60 net/ipv4/af_inet.c:814
[<00000000109a76b3>] sock_sendmsg_nosec net/socket.c:652 [inline]
[<00000000109a76b3>] sock_sendmsg+0x4c/0x60 net/socket.c:672
[<00000000c68f9835>] __sys_sendto+0x11d/0x1c0 net/socket.c:1995
[<00000000b6e006ac>] __do_sys_sendto net/socket.c:2007 [inline]
[<00000000b6e006ac>] __se_sys_sendto net/socket.c:2003 [inline]
[<00000000b6e006ac>] __x64_sys_sendto+0x26/0x30 net/socket.c:2003
BUG: memory leak
unreferenced object 0xffff888119797f00 (size 224):
comm "syz-executor698", pid 6424, jiffies 4294946510 (age 7.190s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 a2 2a 81 88 ff ff 40 e0 d0 24 81 88 ff ff ...*....@.......
backtrace:
[<00000000dbd8d389>] __alloc_skb+0x5e/0x250 net/core/skbuff.c:198
[<000000002ecd4b45>] alloc_skb include/linux/skbuff.h:1083 [inline]
[<000000002ecd4b45>] sctp_packet_transmit+0xdc/0xb30 net/sctp/output.c:572
[<0000000005eef223>] sctp_outq_flush_transports net/sctp/outqueue.c:1147 [inline]
[<0000000005eef223>] sctp_outq_flush+0xf6/0xa30 net/sctp/outqueue.c:1195
[<000000007ad403b8>] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1770 [inline]
[<000000007ad403b8>] sctp_side_effects net/sctp/sm_sideeffect.c:1185 [inline]
[<000000007ad403b8>] sctp_do_sm+0x197b/0x1f00 net/sctp/sm_sideeffect.c:1156
[<00000000696e5800>] sctp_assoc_bh_rcv+0x167/0x250 net/sctp/associola.c:1044
[<00000000bad89a41>] sctp_inq_push+0x76/0xa0 net/sctp/inqueue.c:80
[<0000000066ea2304>] sctp_backlog_rcv+0x83/0x370 net/sctp/input.c:344
[<000000004f4c84bd>] sk_backlog_rcv include/net/sock.h:997 [inline]
[<000000004f4c84bd>] __release_sock+0xa5/0x110 net/core/sock.c:2550
[<000000001cfa318a>] release_sock+0x32/0xc0 net/core/sock.c:3066
[<00000000538f7502>] sctp_wait_for_connect+0x11d/0x1e0 net/sctp/socket.c:9302
[<00000000a983945d>] sctp_sendmsg_to_asoc+0xa95/0xab0 net/sctp/socket.c:1892
[<00000000136d87b5>] sctp_sendmsg+0x704/0xbd0 net/sctp/socket.c:2038
[<000000003d35bb02>] inet_sendmsg+0x39/0x60 net/ipv4/af_inet.c:814
[<00000000109a76b3>] sock_sendmsg_nosec net/socket.c:652 [inline]
[<00000000109a76b3>] sock_sendmsg+0x4c/0x60 net/socket.c:672
[<00000000c68f9835>] __sys_sendto+0x11d/0x1c0 net/socket.c:1995
[<00000000b6e006ac>] __do_sys_sendto net/socket.c:2007 [inline]
[<00000000b6e006ac>] __se_sys_sendto net/socket.c:2003 [inline]
[<00000000b6e006ac>] __x64_sys_sendto+0x26/0x30 net/socket.c:2003
---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@...glegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches
Powered by blists - more mailing lists