Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp241593pxf; Wed, 31 Mar 2021 02:06:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJziMhAHCTaNIkxcYGbTSI4Fm52Y4YQI9H2gch4YbHwuLws6t35gZoi755+6n+y9s3X782do X-Received: by 2002:a17:907:d1f:: with SMTP id gn31mr2415028ejc.536.1617181574620; Wed, 31 Mar 2021 02:06:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617181574; cv=none; d=google.com; s=arc-20160816; b=IfwiTbhZv7RwQCF+FzANTF83+Nv+dy8AJz3lyVS0GkiWN0mWOGGmm2yI5FNSBwaAQV et6BNbeGo+oJOySUqU4L5mm10YrVU2U3zlkEmybli9T8+QsSCCJLjbe2ptvVW1TeIhNb kXPZzBbUyh/nIb4gmRH8aFDairOUVt9IUbCnoFsLTabv8sQmJs2pjzPYiaL0AouhfLq0 qhfuLfGOG+Jiyxpi3qKwZ5XQ7mWrHBDDaMy5x7TSQsj5xOS5v1kEGdD9hfNa6W8wb3k3 N6omTG24BbbDk8OQ6JOEUC3mkljdlcApMCk3wHrF1eP+959r/Xvjsr8l7ruP2g3xNHRg aEkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=oFnyCqVp+EXgH+zoavszk7CCQt6J1VVJYc4gCNFPlfU=; b=c0VSnGWCmvOcYMcZVdOghK52wNTzZgReE3pZkwjDwrYQONollrkoJtylZgQqRQAAvB jVdUjtWRZ1Zy0ZxgDhZEjrlEKPEqtezsALS/pRuap/T97YxbrDcO1O/bEppT/o2aseBv n+E4SlERZN4SrsjKeJkzpeyAXUI2Jq2gPu2xFnJw66+wzyTjtQ5qHyOhkcRIry4jWXf6 68uI5WlMgdvvyMRRba7NNV2PfEAFdVeYAjUaOWCj48yMD4TehNgyBkhtrZq29SSMzY2t K7eASYdvxK3C6Hh6Z4Aowh9yfTaxOvuszzJ0d9nS1JNclnxhY2Tq8a90fPhf26UhsF0D MgaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=DG1ikSGq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 17si1416262edv.580.2021.03.31.02.05.42; Wed, 31 Mar 2021 02:06:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=DG1ikSGq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230385AbhCaJEn (ORCPT + 99 others); Wed, 31 Mar 2021 05:04:43 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:29852 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234509AbhCaJEa (ORCPT ); Wed, 31 Mar 2021 05:04:30 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1617181470; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=oFnyCqVp+EXgH+zoavszk7CCQt6J1VVJYc4gCNFPlfU=; b=DG1ikSGqfZ0YIavlW/cXGhvFR9Yjp2TB3HsInJ3CxJ3/YMsiBXmcUZTgfrDblRiUGgF5jd sCMGb9RbW7mXK9uNi5gawpKabSusAGiqLxXut/rJGMo5Rm5ZP7dkn8wmMkzBZpnX1XOmqP zgAVAILa75X1VYnke/OBM4NYBRO951k= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-588-SWWCB-r3Mt-FwBxVV24kfQ-1; Wed, 31 Mar 2021 05:04:21 -0400 X-MC-Unique: SWWCB-r3Mt-FwBxVV24kfQ-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id A3B9F1009E25; Wed, 31 Mar 2021 09:04:20 +0000 (UTC) Received: from localhost (ovpn-115-85.ams2.redhat.com [10.36.115.85]) by smtp.corp.redhat.com (Postfix) with ESMTP id C49A619C44; Wed, 31 Mar 2021 09:04:19 +0000 (UTC) Date: Wed, 31 Mar 2021 10:04:18 +0100 From: Stefan Hajnoczi To: sgarzare@redhat.com Cc: davem@davemloft.net, kuba@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, sgarzare@redhat.com, syzkaller-bugs@googlegroups.com, virtualization@lists.linux-foundation.org, syzbot Subject: Re: memory leak in virtio_transport_send_pkt_info Message-ID: References: <00000000000069a2e905bad5d02e@google.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="v4rJ/Oj+3HKafot9" Content-Disposition: inline In-Reply-To: <00000000000069a2e905bad5d02e@google.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --v4rJ/Oj+3HKafot9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Feb 08, 2021 at 08:39:30AM -0800, syzbot wrote: > Hello, >=20 > syzbot found the following issue on: >=20 > HEAD commit: 9f29bd8b Merge tag 'fs_for_v5.11-rc5' of git://git.kernel= =2E.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=3D11e435af500000 > kernel config: https://syzkaller.appspot.com/x/.config?x=3D162a0109d6ff7= 31f > dashboard link: https://syzkaller.appspot.com/bug?extid=3D24452624fc4c571= eedd9 > compiler: gcc (GCC) 10.1.0-syz 20200507 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=3D135dd494d00= 000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=3D128787e7500000 >=20 > IMPORTANT: if you fix the issue, please add the following tag to the comm= it: > Reported-by: syzbot+24452624fc4c571eedd9@syzkaller.appspotmail.com Hi Stefano, Looks like tx packets are still queued when the syzkaller leak check runs. I don't see a fix for this in linux.git. Have you already looked at this? Stefan >=20 > executing program > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 26.670s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.040s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.100s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.160s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.230s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d380 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d280 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d200 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > BUG: memory leak > unreferenced object 0xffff88811477d180 (size 96): > comm "syz-executor196", pid 8793, jiffies 4294968272 (age 29.290s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ > ba 34 8c fe 00 00 00 00 00 00 01 00 01 00 05 00 .4.............. > backtrace: > [<0000000051681be3>] kmalloc include/linux/slab.h:552 [inline] > [<0000000051681be3>] kzalloc include/linux/slab.h:682 [inline] > [<0000000051681be3>] virtio_transport_alloc_pkt+0x41/0x290 net/vmw_vs= ock/virtio_transport_common.c:51 > [<0000000036c2d6e6>] virtio_transport_send_pkt_info+0x105/0x1b0 net/v= mw_vsock/virtio_transport_common.c:209 > [<00000000dd27435f>] virtio_transport_stream_enqueue+0x58/0x80 net/vm= w_vsock/virtio_transport_common.c:674 > [<00000000d7e8274a>] vsock_stream_sendmsg+0x4f7/0x590 net/vmw_vsock/a= f_vsock.c:1800 > [<00000000d2b531e6>] sock_sendmsg_nosec net/socket.c:652 [inline] > [<00000000d2b531e6>] sock_sendmsg+0x56/0x80 net/socket.c:672 > [<00000000803a63df>] ____sys_sendmsg+0x17a/0x390 net/socket.c:2345 > [<000000009d42f642>] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2399 > [<000000000a37ed0e>] __sys_sendmmsg+0xed/0x290 net/socket.c:2489 > [<00000000324c1c73>] __do_sys_sendmmsg net/socket.c:2518 [inline] > [<00000000324c1c73>] __se_sys_sendmmsg net/socket.c:2515 [inline] > [<00000000324c1c73>] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2515 > [<000000004e7b2960>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:= 46 > [<000000002615f594>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >=20 > executing program > executing program >=20 >=20 > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. >=20 > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > syzbot can test patches for this issue, for details see: > https://goo.gl/tpsmEJ#testing-patches >=20 --v4rJ/Oj+3HKafot9 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEhpWov9P5fNqsNXdanKSrs4Grc8gFAmBkOxIACgkQnKSrs4Gr c8guhQgAhNpKGNEIXYkCtDAP1kz36lsQoFPcGbWSsckfpzZCp0c4DRYsRYrcp50L jqz0wGVbUOkfFGBfhijgKUMYWX63OlCdVFNb42V7dAASc1JdtyvyIGyyZX+sot/m FwnD3xYxVqD6CdMbZeF3lc17t0Hb7mwg0Re2/difMhHjqeglpX5gxadXc9XX4Jo2 UvkgvU4zySWIdf4nKab0DEj4RLSypvXz1M25GUDZ+9tykPD/j/M/6TKkl2HJAwUs RYswkNFAZF9JFWN2OTvyEDfPoO/f0+I/PuA9tLzdKiMVIm8lpzY9yR6kaeak2QG6 9eknVoURPmrcVkOaiBv0ooMWGr0q8A== =Dm6J -----END PGP SIGNATURE----- --v4rJ/Oj+3HKafot9--