2020/02/08 04:36:25 executed programs: 15 2020/02/08 04:36:31 executed programs: 35 BUG: memory leak unreferenced object 0xffff888111ce4b40 (size 64): comm "syz-executor.2", pid 7460, jiffies 4294956233 (age 14.870s) hex dump (first 32 bytes): 00 4b ce 11 81 88 ff ff 00 00 00 00 00 00 00 00 .K.............. 0b af 43 c3 81 88 ff ff 40 80 6d 1a 81 88 ff ff ..C.....@.m..... backtrace: [<0000000084a5a69a>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<0000000084a5a69a>] slab_post_alloc_hook mm/slab.h:586 [inline] [<0000000084a5a69a>] slab_alloc_node mm/slab.c:3263 [inline] [<0000000084a5a69a>] kmem_cache_alloc_node_trace+0x161/0x2f0 mm/slab.c:3593 [<00000000d6b78080>] __do_kmalloc_node mm/slab.c:3615 [inline] [<00000000d6b78080>] __kmalloc_node+0x38/0x50 mm/slab.c:3623 [<000000007be5eb69>] kmalloc_node include/linux/slab.h:578 [inline] [<000000007be5eb69>] sock_hash_alloc_elem net/core/sock_map.c:646 [inline] [<000000007be5eb69>] sock_hash_update_common+0x314/0x570 net/core/sock_map.c:700 [<00000000c5fdec2f>] sock_hash_update_elem+0x100/0x140 net/core/sock_map.c:749 [<00000000c8e67a3d>] bpf_map_update_value.isra.0+0x14d/0x300 kernel/bpf/syscall.c:168 [<00000000ebaea51f>] map_update_elem kernel/bpf/syscall.c:1089 [inline] [<00000000ebaea51f>] __do_sys_bpf+0x19dc/0x1e50 kernel/bpf/syscall.c:3384 [<000000002d4d1db8>] __se_sys_bpf kernel/bpf/syscall.c:3355 [inline] [<000000002d4d1db8>] __x64_sys_bpf+0x1e/0x30 kernel/bpf/syscall.c:3355 [<00000000105e87e3>] do_syscall_64+0x73/0x220 arch/x86/entry/common.c:294 [<00000000b31a35cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111ce4bc0 (size 64): comm "syz-executor.5", pid 7458, jiffies 4294956233 (age 14.870s) hex dump (first 32 bytes): 80 4b ce 11 81 88 ff ff 00 00 00 00 00 00 00 00 .K.............. 0b af 43 c3 81 88 ff ff 40 c0 71 1a 81 88 ff ff ..C.....@.q..... backtrace: [<0000000084a5a69a>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<0000000084a5a69a>] slab_post_alloc_hook mm/slab.h:586 [inline] [<0000000084a5a69a>] slab_alloc_node mm/slab.c:3263 [inline] [<0000000084a5a69a>] kmem_cache_alloc_node_trace+0x161/0x2f0 mm/slab.c:3593 [<00000000d6b78080>] __do_kmalloc_node mm/slab.c:3615 [inline] [<00000000d6b78080>] __kmalloc_node+0x38/0x50 mm/slab.c:3623 [<000000007be5eb69>] kmalloc_node include/linux/slab.h:578 [inline] [<000000007be5eb69>] sock_hash_alloc_elem net/core/sock_map.c:646 [inline] [<000000007be5eb69>] sock_hash_update_common+0x314/0x570 net/core/sock_map.c:700 [<00000000c5fdec2f>] sock_hash_update_elem+0x100/0x140 net/core/sock_map.c:749 [<00000000c8e67a3d>] bpf_map_update_value.isra.0+0x14d/0x300 kernel/bpf/syscall.c:168 [<00000000ebaea51f>] map_update_elem kernel/bpf/syscall.c:1089 [inline] [<00000000ebaea51f>] __do_sys_bpf+0x19dc/0x1e50 kernel/bpf/syscall.c:3384 [<000000002d4d1db8>] __se_sys_bpf kernel/bpf/syscall.c:3355 [inline] [<000000002d4d1db8>] __x64_sys_bpf+0x1e/0x30 kernel/bpf/syscall.c:3355 [<00000000105e87e3>] do_syscall_64+0x73/0x220 arch/x86/entry/common.c:294 [<00000000b31a35cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881184c1300 (size 64): comm "syz-executor.3", pid 7479, jiffies 4294956236 (age 14.840s) hex dump (first 32 bytes): c0 12 4c 18 81 88 ff ff 00 00 00 00 00 00 00 00 ..L............. 0b af 43 c3 81 88 ff ff 40 f3 7a 1a 81 88 ff ff ..C.....@.z..... backtrace: [<0000000084a5a69a>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<0000000084a5a69a>] slab_post_alloc_hook mm/slab.h:586 [inline] [<0000000084a5a69a>] slab_alloc_node mm/slab.c:3263 [inline] [<0000000084a5a69a>] kmem_cache_alloc_node_trace+0x161/0x2f0 mm/slab.c:3593 [<00000000d6b78080>] __do_kmalloc_node mm/slab.c:3615 [inline] [<00000000d6b78080>] __kmalloc_node+0x38/0x50 mm/slab.c:3623 [<000000007be5eb69>] kmalloc_node include/linux/slab.h:578 [inline] [<000000007be5eb69>] sock_hash_alloc_elem net/core/sock_map.c:646 [inline] [<000000007be5eb69>] sock_hash_update_common+0x314/0x570 net/core/sock_map.c:700 [<00000000c5fdec2f>] sock_hash_update_elem+0x100/0x140 net/core/sock_map.c:749 [<00000000c8e67a3d>] bpf_map_update_value.isra.0+0x14d/0x300 kernel/bpf/syscall.c:168 [<00000000ebaea51f>] map_update_elem kernel/bpf/syscall.c:1089 [inline] [<00000000ebaea51f>] __do_sys_bpf+0x19dc/0x1e50 kernel/bpf/syscall.c:3384 [<000000002d4d1db8>] __se_sys_bpf kernel/bpf/syscall.c:3355 [inline] [<000000002d4d1db8>] __x64_sys_bpf+0x1e/0x30 kernel/bpf/syscall.c:3355 [<00000000105e87e3>] do_syscall_64+0x73/0x220 arch/x86/entry/common.c:294 [<00000000b31a35cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9