BUG: memory leak unreferenced object 0xffff88812131e490 (size 576): comm "syz.0.17", pid 6093, jiffies 4294943511 hex dump (first 32 bytes): 06 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 50 1a 59 09 81 88 ff ff a8 e4 31 21 81 88 ff ff P.Y.......1!.... backtrace (crc fa1533ac): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x41a/0x590 mm/slub.c:5282 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x1c5/0x1a30 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x3c5/0xae0 mm/khugepaged.c:2387 madvise_collapse+0x1fc/0x630 mm/khugepaged.c:2810 madvise_vma_behavior+0xa86/0x12b0 mm/madvise.c:1372 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1721 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1937 do_madvise+0x137/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812131e6d8 (size 576): comm "syz.0.17", pid 6093, jiffies 4294943511 hex dump (first 32 bytes): 00 07 00 00 00 00 00 00 90 e4 31 21 81 88 ff ff ..........1!.... 50 1a 59 09 81 88 ff ff f0 e6 31 21 81 88 ff ff P.Y.......1!.... backtrace (crc d4d2fbf3): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x41a/0x590 mm/slub.c:5282 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x1c5/0x1a30 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x3c5/0xae0 mm/khugepaged.c:2387 madvise_collapse+0x1fc/0x630 mm/khugepaged.c:2810 madvise_vma_behavior+0xa86/0x12b0 mm/madvise.c:1372 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1721 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1937 do_madvise+0x137/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812131e920 (size 576): comm "syz.0.17", pid 6093, jiffies 4294943511 hex dump (first 32 bytes): 00 06 00 00 00 00 00 00 90 e4 31 21 81 88 ff ff ..........1!.... 50 1a 59 09 81 88 ff ff 38 e9 31 21 81 88 ff ff P.Y.....8.1!.... backtrace (crc 37232a7b): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x41a/0x590 mm/slub.c:5282 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x1c5/0x1a30 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x3c5/0xae0 mm/khugepaged.c:2387 madvise_collapse+0x1fc/0x630 mm/khugepaged.c:2810 madvise_vma_behavior+0xa86/0x12b0 mm/madvise.c:1372 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1721 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1937 do_madvise+0x137/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812131eb68 (size 576): comm "syz.0.17", pid 6093, jiffies 4294943511 hex dump (first 32 bytes): 00 05 00 00 00 00 00 00 90 e4 31 21 81 88 ff ff ..........1!.... 50 1a 59 09 81 88 ff ff 80 eb 31 21 81 88 ff ff P.Y.......1!.... backtrace (crc 4c8684d8): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x41a/0x590 mm/slub.c:5282 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x1c5/0x1a30 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x3c5/0xae0 mm/khugepaged.c:2387 madvise_collapse+0x1fc/0x630 mm/khugepaged.c:2810 madvise_vma_behavior+0xa86/0x12b0 mm/madvise.c:1372 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1721 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1937 do_madvise+0x137/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812131edb0 (size 576): comm "syz.0.17", pid 6093, jiffies 4294943511 hex dump (first 32 bytes): 00 04 00 00 00 00 00 00 90 e4 31 21 81 88 ff ff ..........1!.... 50 1a 59 09 81 88 ff ff c8 ed 31 21 81 88 ff ff P.Y.......1!.... backtrace (crc 9e77b314): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x41a/0x590 mm/slub.c:5282 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x1c5/0x1a30 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x3c5/0xae0 mm/khugepaged.c:2387 madvise_collapse+0x1fc/0x630 mm/khugepaged.c:2810 madvise_vma_behavior+0xa86/0x12b0 mm/madvise.c:1372 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1721 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1937 do_madvise+0x137/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF