Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4006551ybp; Sun, 13 Oct 2019 19:50:11 -0700 (PDT) X-Received: by 2002:a50:935d:: with SMTP id n29mr25915677eda.167.1571021381542; Sun, 13 Oct 2019 19:49:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqxUsqj+X6T53a9JXSmsk3JdT7QzUK/30AzCDX1t6JU7bmIJQnXx+YxppiDdCupXmkLn3Fbj X-Received: by 2002:a50:935d:: with SMTP id n29mr25915617eda.167.1571021380901; Sun, 13 Oct 2019 19:49:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571021380; cv=none; d=google.com; s=arc-20160816; b=LY/p/nGR9XAGdnJZq9kvxbLlijO02TwZseRv3mOnmYao5S5HrkLRZLexuhRa/7mfRd 4xLLoHM6y/MtHwvKgYe4vvZvDieuGtL0zcFY3D1GWhIKI+YKDAI/VDrl9f8lxXsi/NiC gOkpIYw8+u+yssrpxq5T9rN7ZuFMib69isTeUXalM35hscrqqgRb8LVr588eQKbinoTC qEIPjBAgHQhIpN6RscGLIXj9u15aga5nZy1cQs+wlqn/02TmOTGqSLzCGqr+luVN47at i5ys60FRjb2DMDEurznHSnfz5gnpWZWFiQ34BmaOkQe/yG1ag1j+GrhR6ccnCZBuOEi2 B5sg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version; bh=orZnEAKo+tvTYtc/DSR/g4JEUJ0d6WZt/CdaVbskBII=; b=oVYVtBclAMO4Nv/rTPcUi2bKrVUtzRksNKedR+AG0ZBPTqQD7FV0hDueMNgMEJqi5S uy9WZvVsksrBF4IzJXys3DEWqo/PI3JXj1ZRiANwRh4E0+5mIexCR3V8AwRkBA3Q76P+ qPX8RDXjYHHuhf+dX3MERzmInW2XtrGQmoa1BOwtF8DxYtI3OVKQ8vtI/rHaW+DZlwXU H5yI17l4UH49/8CzLjrca3etXGeNoUf8mKLXgSLZfwi1C07uV2o8GezHm4l1+kW/aTXq 45HHuNl10S2SvT507+q1v3pEsRKyH86o+uko+Kl66A+JoJfF5umxicH62S5Jjx7fppaL S+Yw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e22si11332886eda.300.2019.10.13.19.49.17; Sun, 13 Oct 2019 19:49:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729824AbfJNCtK (ORCPT + 99 others); Sun, 13 Oct 2019 22:49:10 -0400 Received: from mail-io1-f72.google.com ([209.85.166.72]:39767 "EHLO mail-io1-f72.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729719AbfJNCtJ (ORCPT ); Sun, 13 Oct 2019 22:49:09 -0400 Received: by mail-io1-f72.google.com with SMTP id f9so24562284ioh.6 for ; Sun, 13 Oct 2019 19:49:09 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=orZnEAKo+tvTYtc/DSR/g4JEUJ0d6WZt/CdaVbskBII=; b=hwjPUXZFug75iKpRBA4LrcKclSAQUj++ZmQTwHb1rOGDWasZCYzivZsRsrjEky8UdL 9UrixlfFUF7vVevqxYDmHSeSIuMz1CDS+1Fe7f3j5+RTDNOu61uLy/3jlreH0dIASr51 jNAp5Ry7g4YRqc8W/xZ1xQOr8TpuYfNBRsIsituCQWwNtcFPNsguqsYdDJ0TJkvcKH0o Sv9dNwox5w8FzECCpQQr7xZtarL58EK3fUJ8emOKZzy5jAQU6ADsCYuRwnqihJs3BfR2 xGvFsDai8sL/bK0tLbMMXFb2kDk/Lo6mmqd6tEP6KsixXy69awuosbP5D0MmtNpm0VLj nzCA== X-Gm-Message-State: APjAAAXftAQTt13HJSEUBFrFP4JTdCUY7nKfzEckz5w8WBK7mN7skHaZ PQXYrjaaZa4yme/MIsJTc8m/wWxfr55lrIpkRYspucaFLm+c MIME-Version: 1.0 X-Received: by 2002:a02:e47:: with SMTP id 68mr23697749jae.126.1571021349030; Sun, 13 Oct 2019 19:49:09 -0700 (PDT) Date: Sun, 13 Oct 2019 19:49:09 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000007193390594d5e959@google.com> Subject: memory leak in sctp_get_port_local (3) From: syzbot To: davem@davemloft.net, linux-kernel@vger.kernel.org, linux-sctp@vger.kernel.org, marcelo.leitner@gmail.com, netdev@vger.kernel.org, nhorman@tuxdriver.com, syzkaller-bugs@googlegroups.com, vyasevich@gmail.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: da940012 Merge tag 'char-misc-5.4-rc3' of git://git.kernel.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=11c87fc7600000 kernel config: https://syzkaller.appspot.com/x/.config?x=e76c708f07645488 dashboard link: https://syzkaller.appspot.com/bug?extid=d44f7bbebdea49dbc84a compiler: gcc (GCC) 9.0.0 20181231 (experimental) syz repro: https://syzkaller.appspot.com/x/repro.syz?x=128d3f8b600000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=17ead04b600000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+d44f7bbebdea49dbc84a@syzkaller.appspotmail.com executing program executing program BUG: memory leak unreferenced object 0xffff888120b3d380 (size 64): comm "syz-executor517", pid 6949, jiffies 4294941316 (age 13.400s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. 88 16 ef 24 81 88 ff ff 00 00 00 00 00 00 00 00 ...$............ backtrace: [<000000006e6207b2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000006e6207b2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000006e6207b2>] slab_alloc mm/slab.c:3319 [inline] [<000000006e6207b2>] kmem_cache_alloc+0x13f/0x2c0 mm/slab.c:3483 [<00000000d0d058e2>] sctp_bucket_create net/sctp/socket.c:8523 [inline] [<00000000d0d058e2>] sctp_get_port_local+0x189/0x5a0 net/sctp/socket.c:8270 [<0000000082735c7f>] sctp_do_bind+0xcc/0x200 net/sctp/socket.c:402 [<0000000080c8d55e>] sctp_bindx_add+0x4b/0xd0 net/sctp/socket.c:497 [<00000000eb10f474>] sctp_setsockopt_bindx+0x156/0x1b0 net/sctp/socket.c:1022 [<000000004e959dd5>] sctp_setsockopt net/sctp/socket.c:4641 [inline] [<000000004e959dd5>] sctp_setsockopt+0xaea/0x2dc0 net/sctp/socket.c:4611 [<000000000e9e767a>] sock_common_setsockopt+0x38/0x50 net/core/sock.c:3147 [<00000000a549638a>] __sys_setsockopt+0x10f/0x220 net/socket.c:2084 [<000000003c15b96c>] __do_sys_setsockopt net/socket.c:2100 [inline] [<000000003c15b96c>] __se_sys_setsockopt net/socket.c:2097 [inline] [<000000003c15b96c>] __x64_sys_setsockopt+0x26/0x30 net/socket.c:2097 [<00000000ee3ea8a3>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000006bf005e9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this bug, for details see: https://goo.gl/tpsmEJ#testing-patches