executing program executing program executing program BUG: memory leak unreferenced object 0xffff8881126ab080 (size 96): comm "syz-executor312", pid 8475, jiffies 4294943989 (age 20.050s) hex dump (first 32 bytes): 00 e0 e7 00 00 c9 ff ff 00 00 02 00 00 00 00 00 ................ 00 00 00 00 00 10 00 00 20 00 00 00 20 00 00 00 ........ ... ... backtrace: [<00000000c092e960>] kmalloc include/linux/slab.h:552 [inline] [<00000000c092e960>] kzalloc include/linux/slab.h:664 [inline] [<00000000c092e960>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<000000006a4b3c9e>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<00000000b7977421>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<000000000c71cf24>] __do_sys_setsockopt net/socket.c:2143 [inline] [<000000000c71cf24>] __se_sys_setsockopt net/socket.c:2140 [inline] [<000000000c71cf24>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000009e02c601>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000058d08345>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881109d5100 (size 256): comm "syz-executor312", pid 8475, jiffies 4294943989 (age 20.050s) hex dump (first 32 bytes): 00 00 50 04 00 ea ff ff 40 00 50 04 00 ea ff ff ..P.....@.P..... 80 00 50 04 00 ea ff ff c0 00 50 04 00 ea ff ff ..P.......P..... backtrace: [<00000000f81a420a>] kmalloc_array include/linux/slab.h:592 [inline] [<00000000f81a420a>] kcalloc include/linux/slab.h:603 [inline] [<00000000f81a420a>] xdp_umem_pin_pages net/xdp/xdp_umem.c:89 [inline] [<00000000f81a420a>] xdp_umem_reg net/xdp/xdp_umem.c:207 [inline] [<00000000f81a420a>] xdp_umem_create+0x3cc/0x630 net/xdp/xdp_umem.c:240 [<000000006a4b3c9e>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<00000000b7977421>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<000000000c71cf24>] __do_sys_setsockopt net/socket.c:2143 [inline] [<000000000c71cf24>] __se_sys_setsockopt net/socket.c:2140 [inline] [<000000000c71cf24>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000009e02c601>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000058d08345>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881126ab400 (size 96): comm "syz-executor312", pid 8476, jiffies 4294944591 (age 14.030s) hex dump (first 32 bytes): 00 f0 e9 00 00 c9 ff ff 00 00 02 00 00 00 00 00 ................ 00 00 00 00 00 10 00 00 20 00 00 00 20 00 00 00 ........ ... ... backtrace: [<00000000c092e960>] kmalloc include/linux/slab.h:552 [inline] [<00000000c092e960>] kzalloc include/linux/slab.h:664 [inline] [<00000000c092e960>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<000000006a4b3c9e>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<00000000b7977421>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<000000000c71cf24>] __do_sys_setsockopt net/socket.c:2143 [inline] [<000000000c71cf24>] __se_sys_setsockopt net/socket.c:2140 [inline] [<000000000c71cf24>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000009e02c601>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000058d08345>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881109d5f00 (size 256): comm "syz-executor312", pid 8476, jiffies 4294944591 (age 14.030s) hex dump (first 32 bytes): 00 80 50 04 00 ea ff ff 40 80 50 04 00 ea ff ff ..P.....@.P..... 80 80 50 04 00 ea ff ff c0 80 50 04 00 ea ff ff ..P.......P..... backtrace: [<00000000f81a420a>] kmalloc_array include/linux/slab.h:592 [inline] [<00000000f81a420a>] kcalloc include/linux/slab.h:603 [inline] [<00000000f81a420a>] xdp_umem_pin_pages net/xdp/xdp_umem.c:89 [inline] [<00000000f81a420a>] xdp_umem_reg net/xdp/xdp_umem.c:207 [inline] [<00000000f81a420a>] xdp_umem_create+0x3cc/0x630 net/xdp/xdp_umem.c:240 [<000000006a4b3c9e>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<00000000b7977421>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<000000000c71cf24>] __do_sys_setsockopt net/socket.c:2143 [inline] [<000000000c71cf24>] __se_sys_setsockopt net/socket.c:2140 [inline] [<000000000c71cf24>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000009e02c601>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000058d08345>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881126ab580 (size 96): comm "syz-executor312", pid 8477, jiffies 4294945193 (age 8.010s) hex dump (first 32 bytes): 00 00 ec 00 00 c9 ff ff 00 00 02 00 00 00 00 00 ................ 00 00 00 00 00 10 00 00 20 00 00 00 20 00 00 00 ........ ... ... backtrace: [<00000000c092e960>] kmalloc include/linux/slab.h:552 [inline] [<00000000c092e960>] kzalloc include/linux/slab.h:664 [inline] [<00000000c092e960>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<000000006a4b3c9e>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<00000000b7977421>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<000000000c71cf24>] __do_sys_setsockopt net/socket.c:2143 [inline] [<000000000c71cf24>] __se_sys_setsockopt net/socket.c:2140 [inline] [<000000000c71cf24>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000009e02c601>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000058d08345>] entry_SYSCALL_64_after_hwframe+0x44/0xa9