executing program executing program executing program executing program executing program BUG: memory leak unreferenced object 0xffff88812aeca8c0 (size 1088): comm "syz-executor017", pid 7155, jiffies 4294948247 (age 13.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 7b d7 2f 1b 00 00 00 00 ........{./..... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000569898f2>] kmemleak_alloc_recursive include/linux/kmemleak.h:55 [inline] [<00000000569898f2>] slab_post_alloc_hook mm/slab.h:439 [inline] [<00000000569898f2>] slab_alloc mm/slab.c:3326 [inline] [<00000000569898f2>] kmem_cache_alloc+0x134/0x270 mm/slab.c:3488 [<00000000d078209c>] sk_prot_alloc+0x41/0x170 net/core/sock.c:1602 [<00000000b906069c>] sk_alloc+0x35/0x2f0 net/core/sock.c:1662 [<00000000f68ebd71>] inet_create net/ipv4/af_inet.c:325 [inline] [<00000000f68ebd71>] inet_create+0x11c/0x470 net/ipv4/af_inet.c:251 [<000000007229d654>] __sock_create+0x164/0x250 net/socket.c:1430 [<0000000071a202ab>] sock_create net/socket.c:1481 [inline] [<0000000071a202ab>] __sys_socket+0x69/0x110 net/socket.c:1523 [<00000000aa732207>] __do_sys_socket net/socket.c:1532 [inline] [<00000000aa732207>] __se_sys_socket net/socket.c:1530 [inline] [<00000000aa732207>] __x64_sys_socket+0x1e/0x30 net/socket.c:1530 [<000000004e2cca9d>] do_syscall_64+0x76/0x1a0 arch/x86/entry/common.c:301 [<000000001320fd43>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881135fa100 (size 224): comm "syz-executor017", pid 7155, jiffies 4294948247 (age 13.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 c0 a8 ec 2a 81 88 ff ff ...........*.... backtrace: [<00000000a300585f>] kmemleak_alloc_recursive include/linux/kmemleak.h:55 [inline] [<00000000a300585f>] slab_post_alloc_hook mm/slab.h:439 [inline] [<00000000a300585f>] slab_alloc_node mm/slab.c:3269 [inline] [<00000000a300585f>] kmem_cache_alloc_node+0x153/0x2a0 mm/slab.c:3579 [<00000000abae7c86>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:198 [<000000007de2d3cd>] alloc_skb include/linux/skbuff.h:1058 [inline] [<000000007de2d3cd>] sock_omalloc+0x4e/0x90 net/core/sock.c:2104 [<00000000b14ebe05>] sock_zerocopy_alloc+0x3c/0xf0 net/core/skbuff.c:979 [<000000004adc8585>] sock_zerocopy_realloc+0x7d/0x100 net/core/skbuff.c:1045 [<000000008438dc7e>] __ip_append_data.isra.0+0x6c3/0xe30 net/ipv4/ip_output.c:917 [<00000000b4baebc6>] ip_append_data.part.0+0x9a/0x100 net/ipv4/ip_output.c:1215 [<00000000b11060fb>] ip_append_data+0x5b/0x80 net/ipv4/ip_output.c:1204 [<00000000df144136>] udp_sendmsg+0x6f0/0xf60 net/ipv4/udp.c:1214 [<0000000000504928>] inet_sendmsg+0x64/0x120 net/ipv4/af_inet.c:802 [<000000003354f594>] sock_sendmsg_nosec net/socket.c:652 [inline] [<000000003354f594>] sock_sendmsg+0x54/0x70 net/socket.c:671 [<00000000f766c229>] __sys_sendto+0x148/0x1f0 net/socket.c:1964 [<000000003878a0f8>] __do_sys_sendto net/socket.c:1976 [inline] [<000000003878a0f8>] __se_sys_sendto net/socket.c:1972 [inline] [<000000003878a0f8>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1972 [<000000004e2cca9d>] do_syscall_64+0x76/0x1a0 arch/x86/entry/common.c:301 [<000000001320fd43>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program