Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp1616598rdh; Fri, 24 Nov 2023 18:46:44 -0800 (PST) X-Google-Smtp-Source: AGHT+IGpZMYmSBql7+FLXVJ4VYStHizlQ0t/SugDGqd5vmrg9QlcfSFoG4imkiTsYp5rzzn7oHB2 X-Received: by 2002:a92:cb44:0:b0:35c:81b5:6d77 with SMTP id f4-20020a92cb44000000b0035c81b56d77mr1618624ilq.4.1700880403960; Fri, 24 Nov 2023 18:46:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700880403; cv=none; d=google.com; s=arc-20160816; b=pRbNJnihhrQdl7d+bdg/Cie+clcpSViitxbWkkaGujI/WroftWLaYPBtvuuB0JLqde cpso0Z17i1IrOUFtkqCob7C+Xt7rT7JnFYYKl2Y2e+r4JtbxLZb0pt1/VJS9MZdahieS SOVZZR0JenlBAEfYQt7Xb2brNi4/xKeeW4MVktk9D5lk65hZSbF9wCLY7l9Jfd7yD4Cx PaIsroBSpGKBv/4ELUg6otvT1sRLOZJPScsEQNW/Isnkx6LbCeVmYJT3OUR+S4A+jIit ebPmtFCPwPW8/N2fipCUrXfyWShXqy2db9E2SMLg5nJB01+ps2Dm0oMU5jUYpRRwJ2oa ziIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=0vhGKlbf8um049+SfnQY02FwXu7vtzZ58JJDrZbPu1A=; fh=/RrBBnE/W85QUK7AZD+7Bwz2Pk9o3t3ZW/g+1VQ5fsI=; b=mmmk6Ri4oymcJjUw+tmjgAevv6lYfSvFY1KykuNN0ic6oz/vm2ii9M9qpSZIEJ0xwL /xtvbF7nkr9tFhLqtN5RP2/hD7jOgDDdCnTDOgg9TEuIwioSc5a/it57m5EsBUH5kXcF QdLP8rr4r6KhT0puxsxh0Q7pBAJdu4jUcbyip/qoyyrLaPv3L34gD/USNLyn0n0UzyVh 2zKbS7TM13/iHD2tXfFVRQVGavavqmRb1ocPOUDEE8CZ7xnIm3fbltqN2fO/iCKWC+go bAKkZdPu4Plj37b1Ijf28WPJhVIea0N/SLEp1dNliBzi6NKjASNAFsR1bsnTObhZfYcR 02JA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id h22-20020a056a00219600b006b0cfed2c77si4809613pfi.135.2023.11.24.18.46.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Nov 2023 18:46:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 967AE80907B5; Fri, 24 Nov 2023 18:45:37 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229694AbjKYCpR (ORCPT + 99 others); Fri, 24 Nov 2023 21:45:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41036 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229462AbjKYCpQ (ORCPT ); Fri, 24 Nov 2023 21:45:16 -0500 Received: from mail-pl1-f208.google.com (mail-pl1-f208.google.com [209.85.214.208]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1484019A3 for ; Fri, 24 Nov 2023 18:45:22 -0800 (PST) Received: by mail-pl1-f208.google.com with SMTP id d9443c01a7336-1cfa28ab0f3so16508655ad.2 for ; Fri, 24 Nov 2023 18:45:22 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700880321; x=1701485121; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=0vhGKlbf8um049+SfnQY02FwXu7vtzZ58JJDrZbPu1A=; b=NbmKYXVf2cu+SUB9JFd7Di158xVjgUKzRkDeVHLmRYyuAZzXGI6jgyWAnqrKfuttt0 fLIYqQR+xGfmqoUVn76tkfqJ3dohoHJF4lV3KozVphMnHO4jtI1vb+bZ4YvNYqJlGrIr d6ix2c+kRKRjSDmL/MDJHRQjkxU3DmguN64CDBkAVgEmz2xG0KcwbuytKWwpRFzXIEVt 1iblMyeB8+RZfFTPuUC1W5RH/adfKeNxK0+BQTEkhv11U3LQ2mi7khMy8XatYRZjUrKG zJxtonBMRgDw9fTNLsaysDYUfm/cPV34GhO3f0Yy/qdW9yhCPhyobYPBa5lpCPxOqpk+ sGxQ== X-Gm-Message-State: AOJu0YwX0GVbjJllgMlwQ5YvilLBrScnTRxXkAzzCXNmivgnHgmNO4Lp 9Ekbv263H5mv+v/HQ5ba6FKDTghfB4chzWpshqsgNigUzzM9 MIME-Version: 1.0 X-Received: by 2002:a17:902:d2d2:b0:1cf:9a43:d323 with SMTP id n18-20020a170902d2d200b001cf9a43d323mr972682plc.11.1700880321624; Fri, 24 Nov 2023 18:45:21 -0800 (PST) Date: Fri, 24 Nov 2023 18:45:21 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000060446d060af10f08@google.com> Subject: [syzbot] [can?] memory leak in j1939_netdev_start From: syzbot To: davem@davemloft.net, edumazet@google.com, kernel@pengutronix.de, kuba@kernel.org, linux-can@vger.kernel.org, linux-kernel@vger.kernel.org, mkl@pengutronix.de, netdev@vger.kernel.org, o.rempel@pengutronix.de, pabeni@redhat.com, robin@protonic.nl, socketcan@hartkopp.net, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=2.0 required=5.0 tests=FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SORTED_RECIPS, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 24 Nov 2023 18:45:37 -0800 (PST) X-Spam-Level: ** Hello, syzbot found the following issue on: HEAD commit: 98b1cc82c4af Linux 6.7-rc2 git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1286e3d4e80000 kernel config: https://syzkaller.appspot.com/x/.config?x=f1b9d95ada516af dashboard link: https://syzkaller.appspot.com/bug?extid=1d37bef05da87b99c5a6 compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11c8f8cce80000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/6b6d520f592c/disk-98b1cc82.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/c2cb6183fd56/vmlinux-98b1cc82.xz kernel image: https://storage.googleapis.com/syzbot-assets/de520cfc8b93/bzImage-98b1cc82.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+1d37bef05da87b99c5a6@syzkaller.appspotmail.com BUG: memory leak unreferenced object 0xffff88811f324000 (size 8192): comm "syz-executor.7", pid 5245, jiffies 4294947603 (age 10.860s) hex dump (first 32 bytes): 00 40 32 1f 81 88 ff ff 00 40 32 1f 81 88 ff ff .@2......@2..... 00 00 00 00 00 00 00 00 00 80 0f 1b 81 88 ff ff ................ backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] __kmem_cache_alloc_node+0x2dd/0x3f0 mm/slub.c:3517 [] kmalloc_trace+0x25/0x90 mm/slab_common.c:1098 [] kmalloc include/linux/slab.h:600 [inline] [] kzalloc include/linux/slab.h:721 [inline] [] j1939_priv_create net/can/j1939/main.c:135 [inline] [] j1939_netdev_start+0x159/0x6f0 net/can/j1939/main.c:272 [] j1939_sk_bind+0x21e/0x550 net/can/j1939/socket.c:485 [] __sys_bind+0x11c/0x130 net/socket.c:1845 [] __do_sys_bind net/socket.c:1856 [inline] [] __se_sys_bind net/socket.c:1854 [inline] [] __x64_sys_bind+0x1c/0x20 net/socket.c:1854 [] do_syscall_x64 arch/x86/entry/common.c:51 [inline] [] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88811f0bf300 (size 240): comm "softirq", pid 0, jiffies 4294947604 (age 10.850s) hex dump (first 32 bytes): 68 74 bb 1d 81 88 ff ff 68 74 bb 1d 81 88 ff ff ht......ht...... 00 80 0f 1b 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] kmem_cache_alloc_node+0x2c7/0x450 mm/slub.c:3523 [] __alloc_skb+0x1ef/0x230 net/core/skbuff.c:641 [] alloc_skb include/linux/skbuff.h:1286 [inline] [] j1939_session_fresh_new net/can/j1939/transport.c:1535 [inline] [] j1939_xtp_rx_rts_session_new net/can/j1939/transport.c:1631 [inline] [] j1939_xtp_rx_rts+0x49f/0xa50 net/can/j1939/transport.c:1735 [] j1939_tp_cmd_recv net/can/j1939/transport.c:2057 [inline] [] j1939_tp_recv+0x1b5/0x7f0 net/can/j1939/transport.c:2144 [] j1939_can_recv+0x349/0x4e0 net/can/j1939/main.c:112 [] deliver net/can/af_can.c:572 [inline] [] can_rcv_filter+0xd4/0x290 net/can/af_can.c:606 [] can_receive+0xf0/0x140 net/can/af_can.c:663 [] can_rcv+0xf0/0x130 net/can/af_can.c:687 [] __netif_receive_skb_one_core+0x66/0x90 net/core/dev.c:5529 [] __netif_receive_skb+0x1d/0x90 net/core/dev.c:5643 [] process_backlog+0xbc/0x190 net/core/dev.c:5971 [] __napi_poll+0x3e/0x310 net/core/dev.c:6533 [] napi_poll net/core/dev.c:6602 [inline] [] net_rx_action+0x3d8/0x510 net/core/dev.c:6735 [] __do_softirq+0xbd/0x2b0 kernel/softirq.c:553 BUG: memory leak unreferenced object 0xffff88811f340000 (size 131072): comm "softirq", pid 0, jiffies 4294947604 (age 10.850s) hex dump (first 32 bytes): 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc_large_node+0xe3/0x170 mm/slab_common.c:1157 [] __do_kmalloc_node mm/slab_common.c:995 [inline] [] __kmalloc_node_track_caller+0xbb/0x150 mm/slab_common.c:1027 [] kmalloc_reserve+0x96/0x170 net/core/skbuff.c:582 [] __alloc_skb+0xd5/0x230 net/core/skbuff.c:651 [] alloc_skb include/linux/skbuff.h:1286 [inline] [] j1939_session_fresh_new net/can/j1939/transport.c:1535 [inline] [] j1939_xtp_rx_rts_session_new net/can/j1939/transport.c:1631 [inline] [] j1939_xtp_rx_rts+0x49f/0xa50 net/can/j1939/transport.c:1735 [] j1939_tp_cmd_recv net/can/j1939/transport.c:2057 [inline] [] j1939_tp_recv+0x1b5/0x7f0 net/can/j1939/transport.c:2144 [] j1939_can_recv+0x349/0x4e0 net/can/j1939/main.c:112 [] deliver net/can/af_can.c:572 [inline] [] can_rcv_filter+0xd4/0x290 net/can/af_can.c:606 [] can_receive+0xf0/0x140 net/can/af_can.c:663 [] can_rcv+0xf0/0x130 net/can/af_can.c:687 [] __netif_receive_skb_one_core+0x66/0x90 net/core/dev.c:5529 [] __netif_receive_skb+0x1d/0x90 net/core/dev.c:5643 [] process_backlog+0xbc/0x190 net/core/dev.c:5971 [] __napi_poll+0x3e/0x310 net/core/dev.c:6533 [] napi_poll net/core/dev.c:6602 [inline] [] net_rx_action+0x3d8/0x510 net/core/dev.c:6735 [] __do_softirq+0xbd/0x2b0 kernel/softirq.c:553 BUG: memory leak unreferenced object 0xffff88811dbb7400 (size 512): comm "softirq", pid 0, jiffies 4294947604 (age 10.850s) hex dump (first 32 bytes): 00 40 32 1f 81 88 ff ff 28 50 32 1f 81 88 ff ff .@2.....(P2..... 28 50 32 1f 81 88 ff ff 18 74 bb 1d 81 88 ff ff (P2......t...... backtrace: [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slab.h:766 [inline] [] slab_alloc_node mm/slub.c:3478 [inline] [] __kmem_cache_alloc_node+0x2dd/0x3f0 mm/slub.c:3517 [] kmalloc_trace+0x25/0x90 mm/slab_common.c:1098 [] kmalloc include/linux/slab.h:600 [inline] [] kzalloc include/linux/slab.h:721 [inline] [] j1939_session_new+0x53/0x140 net/can/j1939/transport.c:1494 [] j1939_session_fresh_new net/can/j1939/transport.c:1546 [inline] [] j1939_xtp_rx_rts_session_new net/can/j1939/transport.c:1631 [inline] [] j1939_xtp_rx_rts+0x535/0xa50 net/can/j1939/transport.c:1735 [] j1939_tp_cmd_recv net/can/j1939/transport.c:2057 [inline] [] j1939_tp_recv+0x1b5/0x7f0 net/can/j1939/transport.c:2144 [] j1939_can_recv+0x349/0x4e0 net/can/j1939/main.c:112 [] deliver net/can/af_can.c:572 [inline] [] can_rcv_filter+0xd4/0x290 net/can/af_can.c:606 [] can_receive+0xf0/0x140 net/can/af_can.c:663 [] can_rcv+0xf0/0x130 net/can/af_can.c:687 [] __netif_receive_skb_one_core+0x66/0x90 net/core/dev.c:5529 [] __netif_receive_skb+0x1d/0x90 net/core/dev.c:5643 [] process_backlog+0xbc/0x190 net/core/dev.c:5971 [] __napi_poll+0x3e/0x310 net/core/dev.c:6533 [] napi_poll net/core/dev.c:6602 [inline] [] net_rx_action+0x3d8/0x510 net/core/dev.c:6735 [] __do_softirq+0xbd/0x2b0 kernel/softirq.c:553 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the report is already addressed, let syzbot know by replying with: #syz fix: exact-commit-title If you want syzbot to run the reproducer, reply with: #syz test: git://repo/address.git branch-or-commit-hash If you attach or paste a git patch, syzbot will apply it before testing. If you want to overwrite report's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the report is a duplicate of another one, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup