From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AB4AFC433E0 for ; Fri, 10 Jul 2020 06:28:30 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 55A7B2078B for ; Fri, 10 Jul 2020 06:28:30 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="1vzliXlz" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 55A7B2078B Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id BBF6F6B0006; Fri, 10 Jul 2020 02:28:29 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B70226B0007; Fri, 10 Jul 2020 02:28:29 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A85586B0008; Fri, 10 Jul 2020 02:28:29 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0019.hostedemail.com [216.40.44.19]) by kanga.kvack.org (Postfix) with ESMTP id 91E636B0006 for ; Fri, 10 Jul 2020 02:28:29 -0400 (EDT) Received: from smtpin28.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 0808D441E for ; Fri, 10 Jul 2020 06:28:29 +0000 (UTC) X-FDA: 77021187138.28.tiger87_5016c8c26ecc Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin28.hostedemail.com (Postfix) with ESMTP id D5F6A6D73 for ; Fri, 10 Jul 2020 06:28:28 +0000 (UTC) X-HE-Tag: tiger87_5016c8c26ecc X-Filterd-Recvd-Size: 2770 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf34.hostedemail.com (Postfix) with ESMTP for ; Fri, 10 Jul 2020 06:28:28 +0000 (UTC) Received: from sol.localdomain (c-107-3-166-239.hsd1.ca.comcast.net [107.3.166.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 529FA20787; Fri, 10 Jul 2020 06:28:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594362507; bh=QMr5RKvBVCK3MHm+IemUsLjzM5STc5MqEnD55XB/ueM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=1vzliXlz0LJv3QBsekCWAoWxp5eHoxPY5bOb9kQ46lalw6U4i9swma3GXesXUffc+ XAyGr68sWCzcXlQVPc1uM3YAAsvfSbed2vSfY2JA1e8JeRW2PU0rNKuv4U3o18jaF7 AANIGA9rXOCMUN/iOEfm480p8XrNechHwsGIYqqw= Date: Thu, 9 Jul 2020 23:28:25 -0700 From: Eric Biggers To: cH3332 XR Cc: linux-mm@kvack.org, syzkaller@googlegroups.com Subject: Re: memory leak in ip_mc_add_src ( Not tainted 5.8.0-rc3+) Message-ID: <20200710062825.GC2805@sol.localdomain> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: D5F6A6D73 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam02 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000001, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, Jul 10, 2020 at 11:47:07AM +0530, cH3332 XR wrote: > Hi, > SYZKALLER found the following Memory leak > > ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- > BUG: memory leak > unreferenced object 0xffff955412ff9e00 (size 32): > comm "syz-executor.3", pid 4726, jiffies 4294777846 (age 3098.168s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 06 00 00 00 00 00 00 00 ac 1e 00 04 00 00 00 00 ................ > backtrace: > [<000000002976d53e>] ip_mc_add_src+0x35f/0x3e0 > [<00000000f22fc984>] ip_mc_source+0x2db/0x4e0 > [<00000000a814b668>] do_ip_setsockopt.isra.14+0x541/0x11c0 > [<0000000071f25adf>] ip_setsockopt+0x33/0xa0 > [<00000000a49ec12e>] udp_setsockopt+0x40/0x90 > [<000000002cc8a42f>] __sys_setsockopt+0x99/0x120 > [<00000000167d1a29>] __x64_sys_setsockopt+0x22/0x30 > [<00000000971d38a0>] do_syscall_64+0x3e/0x70 > [<00000000b19407da>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 This looks like a bug in networking code, so you'd probably have better luck sending this to netdev@vger.kernel.org instead of linux-mm@kvack.org. Also if you can please send a patch. - Eric