Project

General

Profile

Actions

Bug #11743

open

syzkaller: memory leak in can_create

Added by Alexey Khoroshilov over 2 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Target version:
-
Start date:
07/08/2022
Due date:
% Done:

0%

Estimated time:
Detected in build:
git
Platform:
Published in build:

Description

BUG: memory leak
unreferenced object 0xffff8881052f1000 (size 2048):
  comm "syz-executor882", pid 1048, jiffies 4294823345 (age 18.287s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    1d 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00  ...A............
  backtrace:
    [<0000000072375c62>] sk_prot_alloc+0x1a4/0x2d0
    [<00000000d2df37bc>] sk_alloc+0x36/0xbe0
    [<000000002335221a>] can_create+0x1de/0x4d0
    [<0000000012359a50>] __sock_create+0x359/0x790
    [<00000000c2932e82>] __sys_socket+0xef/0x200
    [<00000000ee5e0448>] __x64_sys_socket+0x6e/0xb0
    [<00000000787ee121>] do_syscall_64+0x33/0x40
    [<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888107ffb4c0 (size 32):
  comm "syz-executor882", pid 1048, jiffies 4294823345 (age 18.287s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    01 00 00 00 03 00 00 00 4a 00 00 00 00 00 00 00  ........J.......
  backtrace:
    [<00000000b7f65d19>] selinux_sk_alloc_security+0x7d/0x1c0
    [<0000000061633e79>] security_sk_alloc+0x56/0xb0
    [<00000000257771ac>] sk_prot_alloc+0x1be/0x2d0
    [<00000000d2df37bc>] sk_alloc+0x36/0xbe0
    [<000000002335221a>] can_create+0x1de/0x4d0
    [<0000000012359a50>] __sock_create+0x359/0x790
    [<00000000c2932e82>] __sys_socket+0xef/0x200
    [<00000000ee5e0448>] __x64_sys_socket+0x6e/0xb0
    [<00000000787ee121>] do_syscall_64+0x33/0x40
    [<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811a464000 (size 8192):
  comm "syz-executor882", pid 1048, jiffies 4294823346 (age 18.286s)
  hex dump (first 32 bytes):
    00 40 46 1a 81 88 ff ff 00 40 46 1a 81 88 ff ff  .@F......@F.....
    00 00 00 00 00 00 00 00 ed 1e af de ff ff ff ff  ................
  backtrace:
    [<0000000073ea1e80>] j1939_netdev_start+0x10d/0x860
    [<0000000059ac4991>] j1939_sk_bind+0x8bd/0xcf0
    [<00000000e7c0264f>] __sys_bind+0x211/0x260
    [<000000001054b65c>] __x64_sys_bind+0x6e/0xb0
    [<00000000787ee121>] do_syscall_64+0x33/0x40
    [<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811835e000 (size 224):
  comm "syz-executor882", pid 1048, jiffies 4294823347 (age 18.285s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 80 39 18 81 88 ff ff 00 10 2f 05 81 88 ff ff  ..9......./.....
  backtrace:
    [<00000000a49564f4>] __alloc_skb+0x6d/0x630
    [<0000000083cf112f>] alloc_skb_with_frags+0x95/0x530
    [<00000000231b76d7>] sock_alloc_send_pskb+0x72f/0x890
    [<000000001fb9eb5d>] j1939_sk_sendmsg+0x6b0/0x1320
    [<000000006b837130>] sock_sendmsg+0x150/0x190
    [<000000007f2f2260>] ____sys_sendmsg+0x701/0x860
    [<000000007e929e17>] ___sys_sendmsg+0x100/0x170
    [<00000000a479ca4b>] __sys_sendmsg+0xe9/0x1b0
    [<00000000787ee121>] do_syscall_64+0x33/0x40
    [<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810b65e000 (size 4096):
  comm "syz-executor882", pid 1048, jiffies 4294823347 (age 18.285s)
  hex dump (first 32 bytes):
    15 00 00 00 00 00 00 00 01 00 00 00 76 02 c0 9a  ............v...
    35 14 12 1f e9 cb c8 1a de 4d 83 de 65 06 c0 96  5........M..e...
  backtrace:
    [<00000000cf9483dd>] __alloc_skb+0xac/0x630
    [<0000000083cf112f>] alloc_skb_with_frags+0x95/0x530
    [<00000000231b76d7>] sock_alloc_send_pskb+0x72f/0x890
    [<000000001fb9eb5d>] j1939_sk_sendmsg+0x6b0/0x1320
    [<000000006b837130>] sock_sendmsg+0x150/0x190
    [<000000007f2f2260>] ____sys_sendmsg+0x701/0x860
    [<000000007e929e17>] ___sys_sendmsg+0x100/0x170
    [<00000000a479ca4b>] __sys_sendmsg+0xe9/0x1b0
    [<00000000787ee121>] do_syscall_64+0x33/0x40
    [<00000000015aa16d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

Files

CrashLog.txt (13.9 KB) CrashLog.txt Alexey Khoroshilov, 07/08/2022 11:30 AM
kernel-config (168 KB) kernel-config Alexey Khoroshilov, 07/08/2022 11:30 AM
repro.c (56.5 KB) repro.c Alexey Khoroshilov, 07/08/2022 11:30 AM
CrashReport.txt (3.84 KB) CrashReport.txt Alexey Khoroshilov, 07/08/2022 11:30 AM

No data to display

Actions

Also available in: Atom PDF