2020/05/04 10:19:26 executed programs: 3 2020/05/04 10:19:31 executed programs: 5 BUG: memory leak unreferenced object 0xffff888113403240 (size 2200): comm "syz-executor.0", pid 6898, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 54 b1 1a 19 40 01 00 00 ........T...@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000017b2d97d>] sk_prot_alloc+0x3c/0x170 net/core/sock.c:1598 [<000000002490047a>] sk_alloc+0x30/0x330 net/core/sock.c:1658 [<00000000672ff2b4>] inet_create net/ipv4/af_inet.c:321 [inline] [<00000000672ff2b4>] inet_create+0x119/0x450 net/ipv4/af_inet.c:247 [<0000000024c1881d>] __sock_create+0x14a/0x220 net/socket.c:1433 [<000000002b1dca91>] sock_create net/socket.c:1484 [inline] [<000000002b1dca91>] __sys_socket+0x60/0x110 net/socket.c:1526 [<000000007a8b0ada>] __do_sys_socket net/socket.c:1535 [inline] [<000000007a8b0ada>] __se_sys_socket net/socket.c:1533 [inline] [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 net/socket.c:1533 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118af9700 (size 32): comm "syz-executor.0", pid 6898, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 c0 de e3 13 81 88 ff ff ................ 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<00000000bad3d3a5>] kmalloc include/linux/slab.h:555 [inline] [<00000000bad3d3a5>] kzalloc include/linux/slab.h:669 [inline] [<00000000bad3d3a5>] selinux_sk_alloc_security+0x43/0xa0 security/selinux/hooks.c:5126 [<00000000254331f5>] security_sk_alloc+0x42/0x70 security/security.c:2120 [<000000006ac681e3>] sk_prot_alloc+0x9c/0x170 net/core/sock.c:1607 [<000000002490047a>] sk_alloc+0x30/0x330 net/core/sock.c:1658 [<00000000672ff2b4>] inet_create net/ipv4/af_inet.c:321 [inline] [<00000000672ff2b4>] inet_create+0x119/0x450 net/ipv4/af_inet.c:247 [<0000000024c1881d>] __sock_create+0x14a/0x220 net/socket.c:1433 [<000000002b1dca91>] sock_create net/socket.c:1484 [inline] [<000000002b1dca91>] __sys_socket+0x60/0x110 net/socket.c:1526 [<000000007a8b0ada>] __do_sys_socket net/socket.c:1535 [inline] [<000000007a8b0ada>] __se_sys_socket net/socket.c:1533 [inline] [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 net/socket.c:1533 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888113f70600 (size 512): comm "syz-executor.0", pid 6898, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): 40 32 40 13 81 88 ff ff 00 00 00 00 00 00 00 00 @2@............. 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ backtrace: [<00000000dcbf2172>] kmalloc_node include/linux/slab.h:573 [inline] [<00000000dcbf2172>] kzalloc_node include/linux/slab.h:680 [inline] [<00000000dcbf2172>] sk_psock_init+0x2a/0x180 net/core/skmsg.c:496 [<00000000f0d7a04c>] sock_map_link.isra.0+0x469/0x4f0 net/core/sock_map.c:236 [<00000000396cf2d6>] sock_map_update_common+0xa1/0x3c0 net/core/sock_map.c:451 [<00000000951ce791>] sock_map_update_elem+0x1e9/0x220 net/core/sock_map.c:552 [<00000000b18b6462>] bpf_map_update_value.isra.0+0x141/0x2f0 kernel/bpf/syscall.c:169 [<0000000076b7aa1b>] map_update_elem kernel/bpf/syscall.c:1098 [inline] [<0000000076b7aa1b>] __do_sys_bpf+0x15e0/0x1f60 kernel/bpf/syscall.c:3696 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115a63280 (size 2200): comm "syz-executor.0", pid 6900, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 99 8d ac 9b 40 01 00 00 ............@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000017b2d97d>] sk_prot_alloc+0x3c/0x170 net/core/sock.c:1598 [<000000002490047a>] sk_alloc+0x30/0x330 net/core/sock.c:1658 [<00000000672ff2b4>] inet_create net/ipv4/af_inet.c:321 [inline] [<00000000672ff2b4>] inet_create+0x119/0x450 net/ipv4/af_inet.c:247 [<0000000024c1881d>] __sock_create+0x14a/0x220 net/socket.c:1433 [<000000002b1dca91>] sock_create net/socket.c:1484 [inline] [<000000002b1dca91>] __sys_socket+0x60/0x110 net/socket.c:1526 [<000000007a8b0ada>] __do_sys_socket net/socket.c:1535 [inline] [<000000007a8b0ada>] __se_sys_socket net/socket.c:1533 [inline] [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 net/socket.c:1533 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888113ca0c80 (size 32): comm "syz-executor.0", pid 6900, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 89 cc 13 81 88 ff ff ................ 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<00000000bad3d3a5>] kmalloc include/linux/slab.h:555 [inline] [<00000000bad3d3a5>] kzalloc include/linux/slab.h:669 [inline] [<00000000bad3d3a5>] selinux_sk_alloc_security+0x43/0xa0 security/selinux/hooks.c:5126 [<00000000254331f5>] security_sk_alloc+0x42/0x70 security/security.c:2120 [<000000006ac681e3>] sk_prot_alloc+0x9c/0x170 net/core/sock.c:1607 [<000000002490047a>] sk_alloc+0x30/0x330 net/core/sock.c:1658 [<00000000672ff2b4>] inet_create net/ipv4/af_inet.c:321 [inline] [<00000000672ff2b4>] inet_create+0x119/0x450 net/ipv4/af_inet.c:247 [<0000000024c1881d>] __sock_create+0x14a/0x220 net/socket.c:1433 [<000000002b1dca91>] sock_create net/socket.c:1484 [inline] [<000000002b1dca91>] __sys_socket+0x60/0x110 net/socket.c:1526 [<000000007a8b0ada>] __do_sys_socket net/socket.c:1535 [inline] [<000000007a8b0ada>] __se_sys_socket net/socket.c:1533 [inline] [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 net/socket.c:1533 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9