memory leak in start_sync_thread

20 views
Skip to first unread message

syzbot

unread,
May 28, 2019, 2:28:06 PM5/28/19
to core...@netfilter.org, da...@davemloft.net, f...@strlen.de, ho...@verge.net.au, j...@ssi.bg, kad...@blackhole.kfki.hu, linux-...@vger.kernel.org, lvs-...@vger.kernel.org, net...@vger.kernel.org, netfilt...@vger.kernel.org, pa...@netfilter.org, syzkall...@googlegroups.com, wen...@linux-vs.org
Hello,

syzbot found the following crash on:

HEAD commit: cd6c84d8 Linux 5.2-rc2
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=132bd44aa00000
kernel config: https://syzkaller.appspot.com/x/.config?x=64479170dcaf0e11
dashboard link: https://syzkaller.appspot.com/bug?extid=7e2e50c8adfccd2e5041
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=114b1354a00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14b7ad26a00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+7e2e50...@syzkaller.appspotmail.com

d started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0
BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 20.470s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 21.530s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 22.630s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 23.720s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 25.770s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 26.850s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881206bf700 (size 32):
comm "syz-executor761", pid 7268, jiffies 4294943441 (age 27.940s)
hex dump (first 32 bytes):
00 40 7c 09 81 88 ff ff 80 45 b8 21 81 88 ff ff .@|......E.!....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000057619e23>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<0000000057619e23>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<0000000057619e23>] slab_alloc mm/slab.c:3326 [inline]
[<0000000057619e23>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<0000000086ce5479>] kmalloc include/linux/slab.h:547 [inline]
[<0000000086ce5479>] start_sync_thread+0x5d2/0xe10
net/netfilter/ipvs/ip_vs_sync.c:1862
[<000000001a9229cc>] do_ip_vs_set_ctl+0x4c5/0x780
net/netfilter/ipvs/ip_vs_ctl.c:2402
[<00000000ece457c8>] nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
[<00000000ece457c8>] nf_setsockopt+0x4c/0x80
net/netfilter/nf_sockopt.c:115
[<00000000942f62d4>] ip_setsockopt net/ipv4/ip_sockglue.c:1258 [inline]
[<00000000942f62d4>] ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1238
[<00000000a56a8ffd>] udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2616
[<00000000fa895401>] sock_common_setsockopt+0x38/0x50
net/core/sock.c:3130
[<0000000095eef4cf>] __sys_setsockopt+0x98/0x120 net/socket.c:2078
[<000000009747cf88>] __do_sys_setsockopt net/socket.c:2089 [inline]
[<000000009747cf88>] __se_sys_setsockopt net/socket.c:2086 [inline]
[<000000009747cf88>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2086
[<00000000ded8ba80>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000893b4ac8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

executing program


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this bug, for details see:
https://goo.gl/tpsmEJ#testing-patches

Eric Biggers

unread,
Jun 10, 2019, 9:06:16 PM6/10/19
to syzbot, core...@netfilter.org, da...@davemloft.net, f...@strlen.de, ho...@verge.net.au, j...@ssi.bg, kad...@blackhole.kfki.hu, linux-...@vger.kernel.org, lvs-...@vger.kernel.org, net...@vger.kernel.org, netfilt...@vger.kernel.org, pa...@netfilter.org, syzkall...@googlegroups.com, wen...@linux-vs.org
The bug is that ownership of some memory is passed to a kthread started by
kthread_run(), but the kthread can be stopped before it actually executes the
threadfn. See the code in kernel/kthread.c:

ret = -EINTR;
if (!test_bit(KTHREAD_SHOULD_STOP, &self->flags)) {
cgroup_kthread_ready();
__kthread_parkme(self);
ret = threadfn(data);
}

So, apparently the thread parameters must always be owned by the owner of the
kthread, not by the kthread itself. It seems like this would be a common
mistake in kernel code; I'm surprised this doesn't come up more...

- Eric

Julian Anastasov

unread,
Jun 11, 2019, 3:53:08 PM6/11/19
to Eric Biggers, syzbot, core...@netfilter.org, da...@davemloft.net, f...@strlen.de, ho...@verge.net.au, kad...@blackhole.kfki.hu, linux-...@vger.kernel.org, lvs-...@vger.kernel.org, net...@vger.kernel.org, netfilt...@vger.kernel.org, pa...@netfilter.org, syzkall...@googlegroups.com, wen...@linux-vs.org

Hello,
Thanks! It explains the problem. It was not obvious from the
fact that only tinfo was reported as a leak, nothing for tinfo->sock.

Moving sock_release to owner complicates the locking but
I'll try to fix it in the following days...

Regards

--
Julian Anastasov <j...@ssi.bg>

Julian Anastasov

unread,
Jun 17, 2019, 4:35:51 PM6/17/19
to syzbot, syzkall...@googlegroups.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git e93c9c99a629c61837d5a7fc2120cd2b6c70dbdd
0001-ipvs-fix-tinfo-memory-leak-in-start_sync_thread.txt

syzbot

unread,
Jun 17, 2019, 5:00:54 PM6/17/19
to j...@ssi.bg, syzkall...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but build/boot failed:

(v01 Google GOOGDSDT 00000001 GOOG 00000001)
[ 0.027727][ T0] ACPI: FACS 0x00000000BFFFFEC0 000040
[ 0.028909][ T0] ACPI: FACS 0x00000000BFFFFEC0 000040
[ 0.029725][ T0] ACPI: SSDT 0x00000000BFFFF540 000980 (v01 Google
GOOGSSDT 00000001 GOOG 00000001)
[ 0.031086][ T0] ACPI: APIC 0x00000000BFFFF450 000076 (v01 Google
GOOGAPIC 00000001 GOOG 00000001)
[ 0.032344][ T0] ACPI: WAET 0x00000000BFFFF420 000028 (v01 Google
GOOGWAET 00000001 GOOG 00000001)
[ 0.033691][ T0] ACPI: SRAT 0x00000000BFFFF350 0000C8 (v01 Google
GOOGSRAT 00000001 GOOG 00000001)
[ 0.035595][ T0] SRAT: PXM 0 -> APIC 0x00 -> Node 0
[ 0.036699][ T0] SRAT: PXM 0 -> APIC 0x01 -> Node 0
[ 0.037553][ T0] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff]
[ 0.039143][ T0] ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff]
[ 0.040568][ T0] ACPI: SRAT: Node 0 PXM 0 [mem
0x100000000-0x21fffffff]
[ 0.042108][ T0] NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem
0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff]
[ 0.043725][ T0] NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem
0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff]
[ 0.045719][ T0] Faking node 0 at [mem
0x0000000000000000-0x000000012fffffff] (4864MB)
[ 0.047250][ T0] Faking node 1 at [mem
0x0000000130000000-0x000000021fffffff] (3840MB)
[ 0.049168][ T0] NODE_DATA(0) allocated [mem 0x12fffc000-0x12fffffff]
[ 0.051048][ T0] NODE_DATA(1) allocated [mem 0x21fff9000-0x21fffcfff]
[ 0.053756][ T0] Zone ranges:
[ 0.054331][ T0] DMA [mem
0x0000000000001000-0x0000000000ffffff]
[ 0.055466][ T0] DMA32 [mem
0x0000000001000000-0x00000000ffffffff]
[ 0.056612][ T0] Normal [mem
0x0000000100000000-0x000000021fffffff]
[ 0.057809][ T0] Movable zone start for each node
[ 0.058758][ T0] Early memory node ranges
[ 0.059682][ T0] node 0: [mem
0x0000000000001000-0x000000000009efff]
[ 0.061000][ T0] node 0: [mem
0x0000000000100000-0x00000000bfffcfff]
[ 0.062072][ T0] node 0: [mem
0x0000000100000000-0x000000012fffffff]
[ 0.063305][ T0] node 1: [mem
0x0000000130000000-0x000000021fffffff]
[ 0.065859][ T0] Zeroed struct page in unavailable ranges: 101 pages
[ 0.065863][ T0] Initmem setup node 0 [mem
0x0000000000001000-0x000000012fffffff]
[ 0.107578][ T0] Initmem setup node 1 [mem
0x0000000130000000-0x000000021fffffff]
[ 0.148045][ T0] ACPI: PM-Timer IO Port: 0xb008
[ 0.148847][ T0] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
[ 0.150412][ T0] IOAPIC[0]: apic_id 0, version 17, address
0xfec00000, GSI 0-23
[ 0.152215][ T0] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high
level)
[ 0.153958][ T0] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high
level)
[ 0.155630][ T0] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10
high level)
[ 0.156938][ T0] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11
high level)
[ 0.158091][ T0] Using ACPI (MADT) for SMP configuration information
[ 0.159281][ T0] smpboot: Allowing 2 CPUs, 0 hotplug CPUs
[ 0.160469][ T0] PM: Registered nosave memory: [mem
0x00000000-0x00000fff]
[ 0.161524][ T0] PM: Registered nosave memory: [mem
0x0009f000-0x0009ffff]
[ 0.162498][ T0] PM: Registered nosave memory: [mem
0x000a0000-0x000effff]
[ 0.163426][ T0] PM: Registered nosave memory: [mem
0x000f0000-0x000fffff]
[ 0.164358][ T0] PM: Registered nosave memory: [mem
0xbfffd000-0xbfffffff]
[ 0.165638][ T0] PM: Registered nosave memory: [mem
0xc0000000-0xfffbbfff]
[ 0.167046][ T0] PM: Registered nosave memory: [mem
0xfffbc000-0xffffffff]
[ 0.168561][ T0] [mem 0xc0000000-0xfffbbfff] available for PCI devices
[ 0.169857][ T0] Booting paravirtualized kernel on KVM
[ 0.170768][ T0] clocksource: refined-jiffies: mask: 0xffffffff
max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[ 0.172760][ T0] random: get_random_bytes called from
start_kernel+0x93/0x5af with crng_init=0
[ 0.174427][ T0] setup_percpu: NR_CPUS:64 nr_cpumask_bits:64
nr_cpu_ids:2 nr_node_ids:2
[ 0.176565][ T0] percpu: Embedded 45 pages/cpu s146696 r8192 d29432
u1048576
[ 0.178059][ T0] Built 2 zonelists, mobility grouping on. Total
pages: 1935238
[ 0.179318][ T0] Policy zone: Normal
[ 0.179931][ T0] Kernel command line: BOOT_IMAGE=/vmlinuz
root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n
oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 security=selinux
lsm=yama,safesetid,integrity,selinux,tomoyo ima_policy=tcb
workqueue.watchdog_thresh=140 kvm-intel.nested=1
nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000
nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000
nf-conntrack-sane.ports=20000 vivid.n_devs=16
vivid.multiplanar=1,2,1,2,1,2,1,2,1,2,1,2,1,2,1,2 netrom.nr_ndevs=16
rose.rose_ndevs=16 spec_store_bypass_disable=prctl numa=fake=2 nopcid
dummy_hcd.num=8 binder.debug_mask=0
[ 0.229117][ T0] Memory: 7615092K/7863916K available (36884K kernel
code, 2825K rwdata, 9636K rodata, 4460K init, 2608K bss, 248824K reserved,
0K cma-reserved)
[ 0.234435][ T0] rcu: Preemptible hierarchical RCU implementation.
[ 0.235744][ T0] rcu: RCU restricting CPUs from NR_CPUS=64 to
nr_cpu_ids=2.
[ 0.237054][ T0] Tasks RCU enabled.
[ 0.238038][ T0] rcu: RCU calculated value of scheduler-enlistment
delay is 10 jiffies.
[ 0.239672][ T0] rcu: Adjusting geometry for rcu_fanout_leaf=16,
nr_cpu_ids=2
[ 0.243728][ T0] NR_IRQS: 4352, nr_irqs: 440, preallocated irqs: 16
[ 0.246303][ T0] Console: colour VGA+ 80x25
[ 0.247098][ T0] printk: console [ttyS0] enabled
[ 0.247098][ T0] printk: console [ttyS0] enabled
[ 0.248865][ T0] printk: bootconsole [earlyser0] disabled
[ 0.248865][ T0] printk: bootconsole [earlyser0] disabled
[ 0.253043][ T0] mempolicy: Enabling automatic NUMA balancing.
Configure with numa_balancing= or the kernel.numa_balancing sysctl
[ 0.254949][ T0] ACPI: Core revision 20190215
[ 0.256120][ T0] APIC: Switch to symmetric I/O mode setup
[ 0.257564][ T0] x2apic enabled
[ 0.259754][ T0] Switched APIC routing to physical x2apic.
[ 0.264441][ T0] ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1
[ 0.265711][ T0] clocksource: tsc-early: mask: 0xffffffffffffffff
max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns
[ 0.267422][ T0] Calibrating delay loop (skipped) preset value..
4600.00 BogoMIPS (lpj=23000000)
[ 0.268894][ T0] pid_max: default: 32768 minimum: 301
[ 0.270805][ T0] LSM: Security Framework initializing
[ 0.271761][ T0] LSM: security= is ignored because it is superseded
by lsm=
[ 0.273002][ T0] Yama: becoming mindful.
[ 0.273970][ T0] SELinux: Initializing.
[ 0.274706][ T0] *** VALIDATE SELinux ***
[ 0.275389][ T0] TOMOYO Linux initialized
[ 0.281350][ T0] Dentry cache hash table entries: 1048576 (order: 11,
8388608 bytes)
[ 0.285013][ T0] Inode-cache hash table entries: 524288 (order: 10,
4194304 bytes)
[ 0.286527][ T0] Mount-cache hash table entries: 16384 (order: 5,
131072 bytes)
[ 0.287445][ T0] Mountpoint-cache hash table entries: 16384 (order:
5, 131072 bytes)
[ 0.289282][ T0] *** VALIDATE proc ***
[ 0.290295][ T0] *** VALIDATE cgroup1 ***
[ 0.291073][ T0] *** VALIDATE cgroup2 ***
[ 0.292284][ T0] mce: CPU supports 32 MCE banks
[ 0.293182][ T0] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024
[ 0.294209][ T0] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB
1024, 1GB 4
[ 0.295453][ T0] Spectre V2 : Spectre mitigation: kernel not compiled
with retpoline; no mitigation available!
[ 0.295455][ T0] Speculative Store Bypass: Vulnerable
[ 0.298499][ T0] Freeing SMP alternatives memory: 92K
[ 0.307402][ T1] smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz
(family: 0x6, model: 0x3f, stepping: 0x0)
[ 0.357442][ T1] Performance Events: unsupported p6 CPU model 63 no
PMU driver, software events only.
[ 0.377419][ T1] rcu: Hierarchical SRCU implementation.
[ 0.417422][ T1] smp: Bringing up secondary CPUs ...
[ 0.497892][ T1] x86: Booting SMP configuration:
[ 0.498859][ T1] .... node #0, CPUs: #1
[ 0.022450][ T0] kvm-clock: cpu 1, msr 4792041, secondary cpu clock
[ 0.500029][ T1] smp: Brought up 2 nodes, 2 CPUs
[ 0.500029][ T1] smpboot: Max logical packages: 1
[ 0.500178][ T1] smpboot: Total of 2 processors activated (9200.00
BogoMIPS)
[ 0.502224][ T1] devtmpfs: initialized
[ 0.508471][ T1] clocksource: jiffies: mask: 0xffffffff max_cycles:
0xffffffff, max_idle_ns: 19112604462750000 ns
[ 0.509296][ T1] futex hash table entries: 512 (order: 3, 32768 bytes)
[ 0.510467][ T1] xor: automatically using best checksumming
function avx
[ 0.510467][ T1] PM: RTC time: 20:47:14, date: 2019-06-17
[ 0.510592][ T1] NET: Registered protocol family 16
[ 0.512652][ T1] audit: initializing netlink subsys (disabled)
[ 0.517557][ T24] audit: type=2000 audit(1560804433.965:1):
state=initialized audit_enabled=0 res=1
[ 0.519062][ T1] cpuidle: using governor menu
[ 0.519063][ T1] ACPI: bus type PCI registered
[ 0.520209][ T1] dca service started, version 1.12.1
[ 0.521127][ T1] PCI: Using configuration type 1 for base access
[ 0.564272][ T1] WARNING: workqueue cpumask: online intersect >
possible intersect
[ 0.566676][ T1] HugeTLB registered 1.00 GiB page size, pre-allocated
0 pages
[ 0.567439][ T1] HugeTLB registered 2.00 MiB page size, pre-allocated
0 pages
[ 0.577486][ T1] cryptd: max_cpu_qlen set to 1000
[ 0.757418][ T1] raid6: avx2x4 gen() 18774 MB/s
[ 0.924818][ T1] raid6: avx2x4 xor() 10530 MB/s
[ 1.094770][ T1] raid6: avx2x2 gen() 13938 MB/s
[ 1.264762][ T1] raid6: avx2x2 xor() 8398 MB/s
[ 1.437430][ T1] raid6: avx2x1 gen() 9162 MB/s
[ 1.604823][ T1] raid6: avx2x1 xor() 4992 MB/s
[ 1.774766][ T1] raid6: sse2x4 gen() 10149 MB/s
[ 1.944762][ T1] raid6: sse2x4 xor() 5810 MB/s
[ 2.114781][ T1] raid6: sse2x2 gen() 7349 MB/s
[ 2.284774][ T1] raid6: sse2x2 xor() 4438 MB/s
[ 2.457432][ T1] raid6: sse2x1 gen() 4687 MB/s
[ 2.624771][ T1] raid6: sse2x1 xor() 2499 MB/s
[ 2.625813][ T1] raid6: using algorithm avx2x4 gen() 18774 MB/s
[ 2.626687][ T1] raid6: .... xor() 10530 MB/s, rmw enabled
[ 2.627413][ T1] raid6: using avx2x2 recovery algorithm
[ 2.628718][ T1] ACPI: Added _OSI(Module Device)
[ 2.629564][ T1] ACPI: Added _OSI(Processor Device)
[ 2.630495][ T1] ACPI: Added _OSI(3.0 _SCP Extensions)
[ 2.631348][ T1] ACPI: Added _OSI(Processor Aggregator Device)
[ 2.632509][ T1] ACPI: Added _OSI(Linux-Dell-Video)
[ 2.633296][ T1] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
[ 2.634254][ T1] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
[ 2.646256][ T1] ACPI: 2 ACPI AML tables successfully acquired and
loaded
[ 2.650614][ T1] ACPI: Interpreter enabled
[ 2.651409][ T1] ACPI: (supports S0 S3 S4 S5)
[ 2.652194][ T1] ACPI: Using IOAPIC for interrupt routing
[ 2.653217][ T1] PCI: Using host bridge windows from ACPI; if
necessary, use "pci=nocrs" and report a bug
[ 2.655543][ T1] ACPI: Enabled 16 GPEs in block 00 to 0F
[ 2.673437][ T1] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus
00-ff])
[ 2.674533][ T1] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM
Segments MSI]
[ 2.677504][ T1] acpi PNP0A03:00: fail to add MMCONFIG information,
can't access extended PCI configuration space under this bridge.
[ 2.678377][ T1] PCI host bridge to bus 0000:00
[ 2.679256][ T1] pci_bus 0000:00: root bus resource [io
0x0000-0x0cf7 window]
[ 2.680315][ T1] pci_bus 0000:00: root bus resource [io
0x0d00-0xffff window]
[ 2.681431][ T1] pci_bus 0000:00: root bus resource [mem
0x000a0000-0x000bffff window]
[ 2.682725][ T1] pci_bus 0000:00: root bus resource [mem
0xc0000000-0xfebfffff window]
[ 2.683879][ T1] pci_bus 0000:00: root bus resource [bus 00-ff]
[ 2.723779][ T1] pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed
by PIIX4 ACPI
[ 2.778436][ T1] ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11)
[ 2.781031][ T1] ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11)
[ 2.783612][ T1] ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11)
[ 2.786341][ T1] ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11)
[ 2.788985][ T1] ACPI: PCI Interrupt Link [LNKS] (IRQs *9)
[ 2.797629][ T1] vgaarb: loaded
[ 2.798603][ T1] SCSI subsystem initialized
[ 2.798807][ T1] ACPI: bus type USB registered
[ 2.798851][ T1] usbcore: registered new interface driver usbfs
[ 2.801015][ T1] usbcore: registered new interface driver hub
[ 2.807439][ T1] usbcore: registered new device driver usb
[ 2.807648][ T1] media: Linux media interface: v0.10
[ 2.808095][ T1] videodev: Linux video capture interface: v2.00
[ 2.808095][ T1] pps_core: LinuxPPS API ver. 1 registered
[ 2.808530][ T1] pps_core: Software ver. 5.3.6 - Copyright 2005-2007
Rodolfo Giometti <giom...@linux.it>
[ 2.810163][ T1] PTP clock support registered
[ 2.817798][ T1] EDAC MC: Ver: 3.0.0
[ 2.857609][ T1] Advanced Linux Sound Architecture Driver Initialized.
[ 2.858824][ T1] PCI: Using ACPI for IRQ routing
[ 2.858824][ T1] Bluetooth: Core ver 2.22
[ 2.859085][ T1] NET: Registered protocol family 31
[ 2.860135][ T1] Bluetooth: HCI device and connection manager
initialized
[ 2.861332][ T1] Bluetooth: HCI socket layer initialized
[ 2.862441][ T1] Bluetooth: L2CAP socket layer initialized
[ 2.863506][ T1] Bluetooth: SCO socket layer initialized
[ 2.867410][ T1] NET: Registered protocol family 8
[ 2.867499][ T1] NET: Registered protocol family 20
[ 2.867502][ T1] NetLabel: Initializing
[ 2.867502][ T1] NetLabel: domain hash size = 128
[ 2.867599][ T1] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
[ 2.868595][ T1] NetLabel: unlabeled traffic allowed by default
[ 2.870315][ T1] nfc: nfc_init: NFC Core ver 0.1
[ 2.871092][ T1] NET: Registered protocol family 39
[ 2.871879][ T1] clocksource: Switched to clocksource kvm-clock
[ 3.627779][ T1] VFS: Disk quotas dquot_6.6.0
[ 3.628726][ T1] VFS: Dquot-cache hash table entries: 512 (order 0,
4096 bytes)
[ 3.630519][ T1] FS-Cache: Loaded
[ 3.631209][ T1] *** VALIDATE hugetlbfs ***
[ 3.632372][ T1] CacheFiles: Loaded
[ 3.633125][ T1] TOMOYO: 2.6.0
[ 3.633665][ T1] Profile 0 (used by '<kernel>') is not defined.
[ 3.635407][ T1] Userland tools for TOMOYO 2.6 must be installed and
policy must be initialized.
[ 3.636683][ T1] Please see https://tomoyo.osdn.jp/2.6/ for more
information.
[ 3.637746][ T1] Kernel panic - not syncing: STOP!
[ 3.638573][ T1] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.1.0+ #1
[ 3.639595][ T1] Hardware name: Google Google Compute Engine/Google
Compute Engine, BIOS Google 01/01/2011
[ 3.641128][ T1] Call Trace:
[ 3.641733][ T1] dump_stack+0xaa/0xd6
[ 3.642728][ T1] panic+0x154/0x391
[ 3.643865][ T1] ? vprintk_func+0x61/0xfa
[ 3.644565][ T1] tomoyo_check_profile.cold+0x3d/0x88
[ 3.645387][ T1] tomoyo_load_builtin_policy+0x184/0x1aa
[ 3.646484][ T1] ? tomoyo_write_domain2+0xd0/0xd0
[ 3.647325][ T1] tomoyo_initerface_init+0x183/0x18e
[ 3.647734][ T1] ? tomoyo_mm_init+0xc7/0xc7
[ 3.647734][ T1] do_one_initcall+0x5c/0x29f
[ 3.647734][ T1] kernel_init_freeable+0x1af/0x26c
[ 3.647734][ T1] ? rest_init+0xcb/0xcb
[ 3.647734][ T1] kernel_init+0x10/0x155
[ 3.647734][ T1] ret_from_fork+0x1f/0x30
[ 3.647734][ T1] Rebooting in 86400 seconds..


Error text is too large and was truncated, full error text is at:
https://syzkaller.appspot.com/x/error.txt?x=1344b0c6a00000


Tested on:

commit: e93c9c99 Linux 5.1
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git
kernel config: https://syzkaller.appspot.com/x/.config?x=11a90f81a1f3e922
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
patch: https://syzkaller.appspot.com/x/patch.diff?x=15c911aea00000

syzbot

unread,
Jun 17, 2019, 5:24:01 PM6/17/19
to j...@ssi.bg, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer still triggered
crash:
memory leak in batadv_tvlv_handler_register

IPVS: stopping master sync thread 13995 ...
BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 443.420s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 443.420s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 443.400s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 444.440s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 444.440s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 444.420s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 445.450s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 445.450s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 445.430s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 446.460s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 446.460s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 446.440s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 447.490s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 447.490s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 447.470s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 449.470s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 449.470s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 449.450s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaaac0 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 450.510s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 5d 26 81 88 ff ff ..........]&....
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888117eaa840 (size 64):
comm "softirq", pid 0, jiffies 4294944396 (age 450.510s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 ac cd 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966

BUG: memory leak
unreferenced object 0xffff888120db1ec0 (size 64):
comm "softirq", pid 0, jiffies 4294944398 (age 450.490s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 e0 8c 0a 17 81 88 ff ff ................
00 00 00 00 00 00 00 00 00 9d 15 83 ff ff ff ff ................
backtrace:
[<000000006ad2d1a3>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<000000006ad2d1a3>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<000000006ad2d1a3>] slab_alloc mm/slab.c:3326 [inline]
[<000000006ad2d1a3>] kmem_cache_alloc_trace+0x13d/0x280 mm/slab.c:3553
[<00000000d847be74>] kmalloc include/linux/slab.h:547 [inline]
[<00000000d847be74>] kzalloc include/linux/slab.h:742 [inline]
[<00000000d847be74>] batadv_tvlv_handler_register+0xae/0x140
net/batman-adv/tvlv.c:529
[<00000000c42439c6>] batadv_tt_init+0x78/0x180
net/batman-adv/translation-table.c:4411
[<00000000fdc527d7>] batadv_mesh_init+0x196/0x230
net/batman-adv/main.c:208
[<000000004149084e>] batadv_softif_init_late+0x1ca/0x220
net/batman-adv/soft-interface.c:861
[<000000003f4524e6>] register_netdevice+0xbf/0x600 net/core/dev.c:8663
[<000000009a23a673>] __rtnl_newlink+0xaca/0xb30
net/core/rtnetlink.c:3199
[<000000003257cc5b>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3245
[<00000000705aabed>] rtnetlink_rcv_msg+0x178/0x4b0
net/core/rtnetlink.c:5214
[<00000000516fce65>] netlink_rcv_skb+0x61/0x170
net/netlink/af_netlink.c:2482
[<0000000087e2809e>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232
[<0000000096d43bb9>] netlink_unicast_kernel
net/netlink/af_netlink.c:1307 [inline]
[<0000000096d43bb9>] netlink_unicast+0x1ec/0x2d0
net/netlink/af_netlink.c:1333
[<00000000cf711a69>] netlink_sendmsg+0x26a/0x480
net/netlink/af_netlink.c:1922
[<0000000037b538e9>] sock_sendmsg_nosec net/socket.c:646 [inline]
[<0000000037b538e9>] sock_sendmsg+0x54/0x70 net/socket.c:665
[<00000000a1f90e98>] __sys_sendto+0x148/0x1f0 net/socket.c:1958
[<000000000bb7a3b4>] __do_sys_sendto net/socket.c:1970 [inline]
[<000000000bb7a3b4>] __se_sys_sendto net/socket.c:1966 [inline]
[<000000000bb7a3b4>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1966



Tested on:

commit: 4fddbf8a Merge branch 'tcp-fixes'
git tree: net
console output: https://syzkaller.appspot.com/x/log.txt?x=174dbb66a00000
kernel config: https://syzkaller.appspot.com/x/.config?x=3bd5897d1df43b97
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
patch: https://syzkaller.appspot.com/x/patch.diff?x=14ca8411a00000

Reply all
Reply to author
Forward
0 new messages