memory leak in nr_loopback_queue

11 views
Skip to first unread message

syzbot

unread,
May 29, 2019, 4:18:06ā€ÆPM5/29/19
to da...@davemloft.net, linux...@vger.kernel.org, linux-...@vger.kernel.org, net...@vger.kernel.org, ra...@linux-mips.org, syzkall...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 9fb67d64 Merge tag 'pinctrl-v5.2-2' of git://git.kernel.or..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=15956d52a00000
kernel config: https://syzkaller.appspot.com/x/.config?x=64479170dcaf0e11
dashboard link: https://syzkaller.appspot.com/bug?extid=470d1a4a7b7a7c225881
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11bc96a2a00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+470d1a...@syzkaller.appspotmail.com

2019/05/29 16:46:11 executed programs: 584
2019/05/29 16:46:19 executed programs: 614
2019/05/29 16:46:26 executed programs: 624
2019/05/29 16:46:33 executed programs: 640
2019/05/29 16:46:41 executed programs: 654
BUG: memory leak
unreferenced object 0xffff888117e5ba00 (size 224):
comm "syz-executor.2", pid 10957, jiffies 4294999655 (age 10.170s)
hex dump (first 32 bytes):
d0 50 cc 17 81 88 ff ff d0 50 cc 17 81 88 ff ff .P.......P......
00 00 00 00 00 00 00 00 00 10 b2 08 81 88 ff ff ................
backtrace:
[<00000000af44a575>] kmemleak_alloc_recursive
include/linux/kmemleak.h:55 [inline]
[<00000000af44a575>] slab_post_alloc_hook mm/slab.h:439 [inline]
[<00000000af44a575>] slab_alloc_node mm/slab.c:3269 [inline]
[<00000000af44a575>] kmem_cache_alloc_node+0x153/0x2a0 mm/slab.c:3579
[<000000007d2ff911>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:198
[<00000000f697bd2b>] alloc_skb include/linux/skbuff.h:1058 [inline]
[<00000000f697bd2b>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:37
[<00000000eb3a969d>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:775
[<000000002dad2e7e>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:212
[<000000006d8f7662>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:208
[<0000000004553967>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:230
[<000000000382326a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:716
[<00000000a27cdfc2>] __sys_connect+0x11d/0x170 net/socket.c:1840
[<0000000074ede9c3>] __do_sys_connect net/socket.c:1851 [inline]
[<0000000074ede9c3>] __se_sys_connect net/socket.c:1848 [inline]
[<0000000074ede9c3>] __x64_sys_connect+0x1e/0x30 net/socket.c:1848
[<000000000940d4eb>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:301
[<00000000307bfe5c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9



---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this bug, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Aug 15, 2019, 5:53:05ā€ÆPM8/15/19
to da...@davemloft.net, linux...@vger.kernel.org, linux-...@vger.kernel.org, net...@vger.kernel.org, ra...@linux-mips.org, syzkall...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 41de5963 Merge tag 'Wimplicit-fallthrough-5.3-rc5' of git:..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=12408f1c600000
kernel config: https://syzkaller.appspot.com/x/.config?x=6c5e70dcab57c6af
dashboard link: https://syzkaller.appspot.com/bug?extid=470d1a4a7b7a7c225881
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=164de5ee600000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1114f222600000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+470d1a...@syzkaller.appspotmail.com

executing program
executing program
executing program
executing program
executing program
BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 50.960s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 50.960s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.030s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.030s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.100s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.100s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.160s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.160s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.240s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.240s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.300s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.300s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.370s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.370s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888116c16b00 (size 224):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.430s)
hex dump (first 32 bytes):
d0 38 61 0c 81 88 ff ff d0 38 61 0c 81 88 ff ff .8a......8a.....
00 00 00 00 00 00 00 00 00 98 95 0b 81 88 ff ff ................
backtrace:
[<00000000e2ee4d2c>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<00000000e2ee4d2c>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<00000000e2ee4d2c>] slab_alloc_node mm/slab.c:3262 [inline]
[<00000000e2ee4d2c>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574
[<0000000082f0e53e>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810de28200 (size 512):
comm "syz-executor241", pid 7513, jiffies 4295078074 (age 51.430s)
hex dump (first 32 bytes):
bb bb bb 00 00 00 60 bb bb bb 01 00 00 61 10 01 ......`......a..
9c 00 00 01 04 bb bb bb 00 00 00 60 bb bb bb 00 ...........`....
backtrace:
[<000000006183266a>] kmemleak_alloc_recursive
include/linux/kmemleak.h:43 [inline]
[<000000006183266a>] slab_post_alloc_hook mm/slab.h:522 [inline]
[<000000006183266a>] slab_alloc_node mm/slab.c:3262 [inline]
[<000000006183266a>] kmem_cache_alloc_node_trace+0x161/0x2f0
mm/slab.c:3592
[<00000000425795e2>] __do_kmalloc_node mm/slab.c:3614 [inline]
[<00000000425795e2>] __kmalloc_node_track_caller+0x38/0x50
mm/slab.c:3629
[<00000000e438b171>] __kmalloc_reserve.isra.0+0x40/0xb0
net/core/skbuff.c:141
[<000000005727e112>] __alloc_skb+0xa0/0x210 net/core/skbuff.c:209
[<00000000b73f5aed>] alloc_skb include/linux/skbuff.h:1055 [inline]
[<00000000b73f5aed>] nr_loopback_queue+0x26/0xc0
net/netrom/nr_loopback.c:34
[<00000000e8738211>] nr_route_frame+0x2d1/0x340
net/netrom/nr_route.c:772
[<00000000f3c3ea99>] nr_transmit_buffer+0x86/0xc0
net/netrom/nr_out.c:209
[<00000000aa3080e2>] nr_write_internal+0x133/0x2e0
net/netrom/nr_subr.c:205
[<00000000d4e53049>] nr_establish_data_link+0x2d/0x60
net/netrom/nr_out.c:227
[<000000008eb58c4a>] nr_connect+0x13b/0x490 net/netrom/af_netrom.c:713
[<00000000d6b40196>] __sys_connect+0x11d/0x170 net/socket.c:1828
[<0000000059057e91>] __do_sys_connect net/socket.c:1839 [inline]
[<0000000059057e91>] __se_sys_connect net/socket.c:1836 [inline]
[<0000000059057e91>] __x64_sys_connect+0x1e/0x30 net/socket.c:1836
[<0000000068560e8c>] do_syscall_64+0x76/0x1a0
arch/x86/entry/common.c:296
[<000000009035e9ed>] entry_SYSCALL_64_after_hwframe+0x44/0xa9


syzbot

unread,
Sep 4, 2022, 6:55:23ā€ÆPM9/4/22
to syzkall...@googlegroups.com
Auto-closing this bug as obsolete.
No recent activity, existing reproducers are no longer triggering the issue.
Reply all
Reply to author
Forward
0 new messages