2021/08/03 02:18:41 executed programs: 37 2021/08/03 02:18:46 executed programs: 46 2021/08/03 02:18:52 executed programs: 64 2021/08/03 02:18:58 executed programs: 75 BUG: memory leak unreferenced object 0xffff888110362360 (size 32): comm "syz-executor.4", pid 6736, jiffies 4294944789 (age 13.310s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ae249c65>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000ae249c65>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000ae249c65>] slab_alloc mm/slab.c:3323 [inline] [<00000000ae249c65>] __do_kmalloc mm/slab.c:3700 [inline] [<00000000ae249c65>] __kmalloc_track_caller+0x2c3/0x4d0 mm/slab.c:3717 [<00000000e46c1193>] __do_krealloc mm/slab_common.c:1206 [inline] [<00000000e46c1193>] krealloc+0x4f/0xb0 mm/slab_common.c:1239 [<00000000062f3eea>] vfs_getxattr_alloc+0x109/0x190 fs/xattr.c:377 [<00000000e17bda02>] cap_inode_getsecurity+0xa4/0x3b0 security/commoncap.c:399 [<000000007e60c4d5>] security_inode_getsecurity+0x72/0xa0 security/security.c:1429 [<0000000079506e1c>] xattr_getsecurity fs/xattr.c:330 [inline] [<0000000079506e1c>] vfs_getxattr+0x107/0x210 fs/xattr.c:421 [<00000000a1bf31f8>] getxattr+0xa1/0x280 fs/xattr.c:666 [<00000000212f0176>] path_getxattr+0x73/0xd0 fs/xattr.c:694 [<00000000eeae9202>] __do_sys_getxattr fs/xattr.c:706 [inline] [<00000000eeae9202>] __se_sys_getxattr fs/xattr.c:703 [inline] [<00000000eeae9202>] __x64_sys_getxattr+0x28/0x30 fs/xattr.c:703 [<00000000a1588acc>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<00000000a1588acc>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [<000000003a93f0fc>] entry_SYSCALL_64_after_hwframe+0x44/0xae