Warning: Permanently added '10.128.1.33' (ECDSA) to the list of known hosts. executing program executing program BUG: memory leak unreferenced object 0xffff88810ef71380 (size 96): comm "syz-executor330", pid 8482, jiffies 4294948212 (age 12.390s) hex dump (first 32 bytes): 00 10 df 00 00 c9 ff ff 00 00 02 00 00 00 00 00 ................ 00 00 00 00 00 10 00 00 20 00 00 00 20 00 00 00 ........ ... ... backtrace: [<00000000059c8ff4>] kmalloc include/linux/slab.h:552 [inline] [<00000000059c8ff4>] kzalloc include/linux/slab.h:664 [inline] [<00000000059c8ff4>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<00000000da010e54>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000004fdac09e>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<00000000af53a3b9>] __do_sys_setsockopt net/socket.c:2143 [inline] [<00000000af53a3b9>] __se_sys_setsockopt net/socket.c:2140 [inline] [<00000000af53a3b9>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000000273a364>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000edf838e1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888101463f00 (size 256): comm "syz-executor330", pid 8482, jiffies 4294948212 (age 12.390s) hex dump (first 32 bytes): 00 00 4d 04 00 ea ff ff 40 00 4d 04 00 ea ff ff ..M.....@.M..... 80 00 4d 04 00 ea ff ff c0 00 4d 04 00 ea ff ff ..M.......M..... backtrace: [<000000008ffea5ce>] kmalloc_array include/linux/slab.h:592 [inline] [<000000008ffea5ce>] kcalloc include/linux/slab.h:603 [inline] [<000000008ffea5ce>] xdp_umem_pin_pages net/xdp/xdp_umem.c:89 [inline] [<000000008ffea5ce>] xdp_umem_reg net/xdp/xdp_umem.c:207 [inline] [<000000008ffea5ce>] xdp_umem_create+0x3cc/0x630 net/xdp/xdp_umem.c:240 [<00000000da010e54>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000004fdac09e>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<00000000af53a3b9>] __do_sys_setsockopt net/socket.c:2143 [inline] [<00000000af53a3b9>] __se_sys_setsockopt net/socket.c:2140 [inline] [<00000000af53a3b9>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000000273a364>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000edf838e1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810ef71400 (size 96): comm "syz-executor330", pid 8483, jiffies 4294948730 (age 7.210s) hex dump (first 32 bytes): 00 90 e3 00 00 c9 ff ff 00 00 02 00 00 00 00 00 ................ 00 00 00 00 00 10 00 00 20 00 00 00 20 00 00 00 ........ ... ... backtrace: [<00000000059c8ff4>] kmalloc include/linux/slab.h:552 [inline] [<00000000059c8ff4>] kzalloc include/linux/slab.h:664 [inline] [<00000000059c8ff4>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<00000000da010e54>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000004fdac09e>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<00000000af53a3b9>] __do_sys_setsockopt net/socket.c:2143 [inline] [<00000000af53a3b9>] __se_sys_setsockopt net/socket.c:2140 [inline] [<00000000af53a3b9>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000000273a364>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000edf838e1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888101463e00 (size 256): comm "syz-executor330", pid 8483, jiffies 4294948730 (age 7.210s) hex dump (first 32 bytes): 00 80 4d 04 00 ea ff ff 40 80 4d 04 00 ea ff ff ..M.....@.M..... 80 80 4d 04 00 ea ff ff c0 80 4d 04 00 ea ff ff ..M.......M..... backtrace: [<000000008ffea5ce>] kmalloc_array include/linux/slab.h:592 [inline] [<000000008ffea5ce>] kcalloc include/linux/slab.h:603 [inline] [<000000008ffea5ce>] xdp_umem_pin_pages net/xdp/xdp_umem.c:89 [inline] [<000000008ffea5ce>] xdp_umem_reg net/xdp/xdp_umem.c:207 [inline] [<000000008ffea5ce>] xdp_umem_create+0x3cc/0x630 net/xdp/xdp_umem.c:240 [<00000000da010e54>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000004fdac09e>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<00000000af53a3b9>] __do_sys_setsockopt net/socket.c:2143 [inline] [<00000000af53a3b9>] __se_sys_setsockopt net/socket.c:2140 [inline] [<00000000af53a3b9>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<000000000273a364>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000edf838e1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9