executing program executing program executing program BUG: memory leak unreferenced object 0xffff888111060e80 (size 64): comm "syz-executor394", pid 8454, jiffies 4294945552 (age 19.920s) hex dump (first 32 bytes): 00 0c 43 04 00 ea ff ff 00 24 0f 04 00 ea ff ff ..C......$...... 80 e2 37 04 00 ea ff ff 00 a1 40 04 00 ea ff ff ..7.......@..... backtrace: [<000000001267210c>] kmalloc_node include/linux/slab.h:575 [inline] [<000000001267210c>] __bpf_map_area_alloc+0xfc/0x120 kernel/bpf/syscall.c:300 [<000000005ef290e8>] bpf_ringbuf_area_alloc kernel/bpf/ringbuf.c:90 [inline] [<000000005ef290e8>] bpf_ringbuf_alloc kernel/bpf/ringbuf.c:131 [inline] [<000000005ef290e8>] ringbuf_map_alloc kernel/bpf/ringbuf.c:170 [inline] [<000000005ef290e8>] ringbuf_map_alloc+0x134/0x350 kernel/bpf/ringbuf.c:146 [<00000000b38529b2>] find_and_alloc_map kernel/bpf/syscall.c:122 [inline] [<00000000b38529b2>] map_create kernel/bpf/syscall.c:828 [inline] [<00000000b38529b2>] __do_sys_bpf+0x7c3/0x2fa0 kernel/bpf/syscall.c:4364 [<00000000eabdabbf>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006020bb4a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110e44700 (size 64): comm "syz-executor394", pid 8457, jiffies 4294946150 (age 13.940s) hex dump (first 32 bytes): 40 17 34 04 00 ea ff ff 00 4b 37 04 00 ea ff ff @.4......K7..... 00 05 44 04 00 ea ff ff 40 1f 39 04 00 ea ff ff ..D.....@.9..... backtrace: [<000000001267210c>] kmalloc_node include/linux/slab.h:575 [inline] [<000000001267210c>] __bpf_map_area_alloc+0xfc/0x120 kernel/bpf/syscall.c:300 [<000000005ef290e8>] bpf_ringbuf_area_alloc kernel/bpf/ringbuf.c:90 [inline] [<000000005ef290e8>] bpf_ringbuf_alloc kernel/bpf/ringbuf.c:131 [inline] [<000000005ef290e8>] ringbuf_map_alloc kernel/bpf/ringbuf.c:170 [inline] [<000000005ef290e8>] ringbuf_map_alloc+0x134/0x350 kernel/bpf/ringbuf.c:146 [<00000000b38529b2>] find_and_alloc_map kernel/bpf/syscall.c:122 [inline] [<00000000b38529b2>] map_create kernel/bpf/syscall.c:828 [inline] [<00000000b38529b2>] __do_sys_bpf+0x7c3/0x2fa0 kernel/bpf/syscall.c:4364 [<00000000eabdabbf>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006020bb4a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9