Project

General

Profile

Bug #11743 » CrashReport.txt

Alexey Khoroshilov, 07/08/2022 11:30 AM

 
BUG: memory leak
unreferenced object 0xffff8881052f1000 (size 2048):
comm "syz-executor882", pid 1048, jiffies 4294823345 (age 18.287s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
1d 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............
backtrace:
[<0000000072375c62>] sk_prot_alloc+0x1a4/0x2d0
[<00000000d2df37bc>] sk_alloc+0x36/0xbe0
[<000000002335221a>] can_create+0x1de/0x4d0
[<0000000012359a50>] __sock_create+0x359/0x790
[<00000000c2932e82>] __sys_socket+0xef/0x200
[<00000000ee5e0448>] __x64_sys_socket+0x6e/0xb0
[<00000000787ee121>] do_syscall_64+0x33/0x40
[<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888107ffb4c0 (size 32):
comm "syz-executor882", pid 1048, jiffies 4294823345 (age 18.287s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01 00 00 00 03 00 00 00 4a 00 00 00 00 00 00 00 ........J.......
backtrace:
[<00000000b7f65d19>] selinux_sk_alloc_security+0x7d/0x1c0
[<0000000061633e79>] security_sk_alloc+0x56/0xb0
[<00000000257771ac>] sk_prot_alloc+0x1be/0x2d0
[<00000000d2df37bc>] sk_alloc+0x36/0xbe0
[<000000002335221a>] can_create+0x1de/0x4d0
[<0000000012359a50>] __sock_create+0x359/0x790
[<00000000c2932e82>] __sys_socket+0xef/0x200
[<00000000ee5e0448>] __x64_sys_socket+0x6e/0xb0
[<00000000787ee121>] do_syscall_64+0x33/0x40
[<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811a464000 (size 8192):
comm "syz-executor882", pid 1048, jiffies 4294823346 (age 18.286s)
hex dump (first 32 bytes):
00 40 46 1a 81 88 ff ff 00 40 46 1a 81 88 ff ff .@F......@F.....
00 00 00 00 00 00 00 00 ed 1e af de ff ff ff ff ................
backtrace:
[<0000000073ea1e80>] j1939_netdev_start+0x10d/0x860
[<0000000059ac4991>] j1939_sk_bind+0x8bd/0xcf0
[<00000000e7c0264f>] __sys_bind+0x211/0x260
[<000000001054b65c>] __x64_sys_bind+0x6e/0xb0
[<00000000787ee121>] do_syscall_64+0x33/0x40
[<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811835e000 (size 224):
comm "syz-executor882", pid 1048, jiffies 4294823347 (age 18.285s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 80 39 18 81 88 ff ff 00 10 2f 05 81 88 ff ff ..9......./.....
backtrace:
[<00000000a49564f4>] __alloc_skb+0x6d/0x630
[<0000000083cf112f>] alloc_skb_with_frags+0x95/0x530
[<00000000231b76d7>] sock_alloc_send_pskb+0x72f/0x890
[<000000001fb9eb5d>] j1939_sk_sendmsg+0x6b0/0x1320
[<000000006b837130>] sock_sendmsg+0x150/0x190
[<000000007f2f2260>] ____sys_sendmsg+0x701/0x860
[<000000007e929e17>] ___sys_sendmsg+0x100/0x170
[<00000000a479ca4b>] __sys_sendmsg+0xe9/0x1b0
[<00000000787ee121>] do_syscall_64+0x33/0x40
[<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810b65e000 (size 4096):
comm "syz-executor882", pid 1048, jiffies 4294823347 (age 18.285s)
hex dump (first 32 bytes):
15 00 00 00 00 00 00 00 01 00 00 00 76 02 c0 9a ............v...
35 14 12 1f e9 cb c8 1a de 4d 83 de 65 06 c0 96 5........M..e...
backtrace:
[<00000000cf9483dd>] __alloc_skb+0xac/0x630
[<0000000083cf112f>] alloc_skb_with_frags+0x95/0x530
[<00000000231b76d7>] sock_alloc_send_pskb+0x72f/0x890
[<000000001fb9eb5d>] j1939_sk_sendmsg+0x6b0/0x1320
[<000000006b837130>] sock_sendmsg+0x150/0x190
[<000000007f2f2260>] ____sys_sendmsg+0x701/0x860
[<000000007e929e17>] ___sys_sendmsg+0x100/0x170
[<00000000a479ca4b>] __sys_sendmsg+0xe9/0x1b0
[<00000000787ee121>] do_syscall_64+0x33/0x40
[<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9


(4-4/4)