executing program executing program executing program BUG: memory leak unreferenced object 0xffff888110882600 (size 96): comm "syz-executor941", pid 8463, jiffies 4294942966 (age 19.520s) hex dump (first 32 bytes): 00 90 6e 01 00 c9 ff ff 00 00 00 01 00 00 00 00 ..n............. 00 00 00 00 00 10 00 00 00 10 00 00 00 10 00 00 ................ backtrace: [<00000000fd2d3ea6>] kmalloc include/linux/slab.h:552 [inline] [<00000000fd2d3ea6>] kzalloc include/linux/slab.h:664 [inline] [<00000000fd2d3ea6>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<00000000f1f94213>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000009ccd8399>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<0000000099559f45>] __do_sys_setsockopt net/socket.c:2143 [inline] [<0000000099559f45>] __se_sys_setsockopt net/socket.c:2140 [inline] [<0000000099559f45>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<0000000022eb118e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000008c30ee3e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110882280 (size 96): comm "syz-executor941", pid 8464, jiffies 4294943553 (age 13.650s) hex dump (first 32 bytes): 00 d0 3e 0b 00 c9 ff ff 00 00 00 01 00 00 00 00 ..>............. 00 00 00 00 00 10 00 00 00 10 00 00 00 10 00 00 ................ backtrace: [<00000000fd2d3ea6>] kmalloc include/linux/slab.h:552 [inline] [<00000000fd2d3ea6>] kzalloc include/linux/slab.h:664 [inline] [<00000000fd2d3ea6>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<00000000f1f94213>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000009ccd8399>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<0000000099559f45>] __do_sys_setsockopt net/socket.c:2143 [inline] [<0000000099559f45>] __se_sys_setsockopt net/socket.c:2140 [inline] [<0000000099559f45>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<0000000022eb118e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000008c30ee3e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110882880 (size 96): comm "syz-executor941", pid 8465, jiffies 4294944141 (age 7.770s) hex dump (first 32 bytes): 00 e0 3e 0c 00 c9 ff ff 00 00 00 01 00 00 00 00 ..>............. 00 00 00 00 00 10 00 00 00 10 00 00 00 10 00 00 ................ backtrace: [<00000000fd2d3ea6>] kmalloc include/linux/slab.h:552 [inline] [<00000000fd2d3ea6>] kzalloc include/linux/slab.h:664 [inline] [<00000000fd2d3ea6>] xdp_umem_create+0x33/0x630 net/xdp/xdp_umem.c:229 [<00000000f1f94213>] xsk_setsockopt+0x4ad/0x590 net/xdp/xsk.c:852 [<000000009ccd8399>] __sys_setsockopt+0x1b0/0x360 net/socket.c:2132 [<0000000099559f45>] __do_sys_setsockopt net/socket.c:2143 [inline] [<0000000099559f45>] __se_sys_setsockopt net/socket.c:2140 [inline] [<0000000099559f45>] __x64_sys_setsockopt+0x22/0x30 net/socket.c:2140 [<0000000022eb118e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000008c30ee3e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9