2020/05/01 15:16:01 executed programs: 7 2020/05/01 15:16:07 executed programs: 9 2020/05/01 15:16:12 executed programs: 11 2020/05/01 15:16:18 executed programs: 13 BUG: memory leak unreferenced object 0xffff88811343d2c0 (size 2200): comm "syz-executor.0", pid 6880, jiffies 4294955944 (age 14.090s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 21 11 a0 d7 40 01 00 00 ........!...@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000004398d50b>] sk_prot_alloc+0x3c/0x170 net/core/sock.c:1598 [<000000003ff6e82c>] sk_alloc+0x30/0x330 net/core/sock.c:1658 [<000000001408a70b>] inet_create net/ipv4/af_inet.c:321 [inline] [<000000001408a70b>] inet_create+0x119/0x450 net/ipv4/af_inet.c:247 [<000000003d99572e>] __sock_create+0x14a/0x220 net/socket.c:1433 [<0000000080783aa6>] sock_create net/socket.c:1484 [inline] [<0000000080783aa6>] __sys_socket+0x60/0x110 net/socket.c:1526 [<00000000420d75cf>] __do_sys_socket net/socket.c:1535 [inline] [<00000000420d75cf>] __se_sys_socket net/socket.c:1533 [inline] [<00000000420d75cf>] __x64_sys_socket+0x1a/0x20 net/socket.c:1533 [<00000000cb72b4fe>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<000000008483b28f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b412c00 (size 512): comm "syz-executor.0", pid 6880, jiffies 4294955944 (age 14.090s) hex dump (first 32 bytes): c0 d2 43 13 81 88 ff ff 00 00 00 00 00 00 00 00 ..C............. 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ backtrace: [<00000000f2d78829>] kmalloc_node include/linux/slab.h:573 [inline] [<00000000f2d78829>] kzalloc_node include/linux/slab.h:680 [inline] [<00000000f2d78829>] sk_psock_init+0x2a/0x180 net/core/skmsg.c:496 [<0000000070ad82a1>] sock_map_link.isra.0+0x469/0x4f0 net/core/sock_map.c:236 [<00000000d27c4c01>] sock_map_update_common+0xa1/0x3c0 net/core/sock_map.c:451 [<000000002b0e0e92>] sock_map_update_elem+0x1e9/0x220 net/core/sock_map.c:552 [<00000000ba35f4f8>] bpf_map_update_value.isra.0+0x141/0x2f0 kernel/bpf/syscall.c:169 [<00000000a90b6a60>] map_update_elem kernel/bpf/syscall.c:1098 [inline] [<00000000a90b6a60>] __do_sys_bpf+0x15e0/0x1f60 kernel/bpf/syscall.c:3696 [<00000000cb72b4fe>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<000000008483b28f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9