IPVS: ftp: loaded support on port[0] = 21 2019/06/04 04:22:45 executed programs: 14 BUG: memory leak unreferenced object 0xffff88810b2c6b80 (size 96): comm "syz-executor.4", pid 7147, jiffies 4294943704 (age 9.540s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 50 9b bb 82 ff ff ff ff ........P....... 00 00 00 00 00 00 00 00 00 87 bb 82 ff ff ff ff ................ backtrace: [<00000000ac16472e>] kmemleak_alloc_recursive include/linux/kmemleak.h:55 [inline] [<00000000ac16472e>] slab_post_alloc_hook mm/slab.h:439 [inline] [<00000000ac16472e>] slab_alloc_node mm/slab.c:3269 [inline] [<00000000ac16472e>] kmem_cache_alloc_node_trace+0x15b/0x2a0 mm/slab.c:3597 [<000000009cd2ab89>] __do_kmalloc_node mm/slab.c:3619 [inline] [<000000009cd2ab89>] __kmalloc_node+0x38/0x50 mm/slab.c:3627 [<000000003d086b2d>] kmalloc_node include/linux/slab.h:590 [inline] [<000000003d086b2d>] kvmalloc_node+0x4a/0xd0 mm/util.c:431 [<00000000aecbf8f1>] kvmalloc include/linux/mm.h:637 [inline] [<00000000aecbf8f1>] kvzalloc include/linux/mm.h:645 [inline] [<00000000aecbf8f1>] allocate_hook_entries_size+0x3b/0x60 net/netfilter/core.c:61 [<00000000feafa372>] nf_hook_entries_grow+0xae/0x270 net/netfilter/core.c:128 [<000000002fee3bf2>] __nf_register_net_hook+0x9a/0x170 net/netfilter/core.c:337 [<00000000cc1563c8>] nf_register_net_hook+0x34/0xc0 net/netfilter/core.c:464 [<000000002f5979b7>] nf_register_net_hooks+0x53/0xc0 net/netfilter/core.c:480 [<0000000030c55d60>] __ip_vs_init+0xe8/0x170 net/netfilter/ipvs/ip_vs_core.c:2280 [<0000000058d080e1>] ops_init+0x4c/0x140 net/core/net_namespace.c:130 [<0000000098553bc0>] setup_net+0xde/0x230 net/core/net_namespace.c:316 [<00000000fb596539>] copy_net_ns+0xf0/0x1e0 net/core/net_namespace.c:439 [<000000003deaedb5>] create_new_namespaces+0x141/0x2a0 kernel/nsproxy.c:107 [<00000000a7d0db84>] copy_namespaces+0xa1/0xe0 kernel/nsproxy.c:165 [<000000001ad2c3fc>] copy_process.part.0+0x11fd/0x2150 kernel/fork.c:2035 [<000000006fea9dd6>] copy_process kernel/fork.c:1800 [inline] [<000000006fea9dd6>] _do_fork+0x121/0x4f0 kernel/fork.c:2369 BUG: memory leak unreferenced object 0xffff88810b2c6a00 (size 96): comm "syz-executor.4", pid 7147, jiffies 4294943704 (age 9.540s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 e0 9a bb 82 ff ff ff ff ................ 00 00 00 00 00 00 00 00 90 86 bb 82 ff ff ff ff ................ backtrace: [<00000000ac16472e>] kmemleak_alloc_recursive include/linux/kmemleak.h:55 [inline] [<00000000ac16472e>] slab_post_alloc_hook mm/slab.h:439 [inline] [<00000000ac16472e>] slab_alloc_node mm/slab.c:3269 [inline] [<00000000ac16472e>] kmem_cache_alloc_node_trace+0x15b/0x2a0 mm/slab.c:3597 [<000000009cd2ab89>] __do_kmalloc_node mm/slab.c:3619 [inline] [<000000009cd2ab89>] __kmalloc_node+0x38/0x50 mm/slab.c:3627 [<000000003d086b2d>] kmalloc_node include/linux/slab.h:590 [inline] [<000000003d086b2d>] kvmalloc_node+0x4a/0xd0 mm/util.c:431 [<00000000aecbf8f1>] kvmalloc include/linux/mm.h:637 [inline] [<00000000aecbf8f1>] kvzalloc include/linux/mm.h:645 [inline] [<00000000aecbf8f1>] allocate_hook_entries_size+0x3b/0x60 net/netfilter/core.c:61 [<00000000feafa372>] nf_hook_entries_grow+0xae/0x270 net/netfilter/core.c:128 [<000000002fee3bf2>] __nf_register_net_hook+0x9a/0x170 net/netfilter/core.c:337 [<00000000cc1563c8>] nf_register_net_hook+0x34/0xc0 net/netfilter/core.c:464 [<000000002f5979b7>] nf_register_net_hooks+0x53/0xc0 net/netfilter/core.c:480 [<0000000030c55d60>] __ip_vs_init+0xe8/0x170 net/netfilter/ipvs/ip_vs_core.c:2280 [<0000000058d080e1>] ops_init+0x4c/0x140 net/core/net_namespace.c:130 [<0000000098553bc0>] setup_net+0xde/0x230 net/core/net_namespace.c:316 [<00000000fb596539>] copy_net_ns+0xf0/0x1e0 net/core/net_namespace.c:439 [<000000003deaedb5>] create_new_namespaces+0x141/0x2a0 kernel/nsproxy.c:107 [<00000000a7d0db84>] copy_namespaces+0xa1/0xe0 kernel/nsproxy.c:165 [<000000001ad2c3fc>] copy_process.part.0+0x11fd/0x2150 kernel/fork.c:2035 [<000000006fea9dd6>] copy_process kernel/fork.c:1800 [inline] [<000000006fea9dd6>] _do_fork+0x121/0x4f0 kernel/fork.c:2369 BUG: memory leak unreferenced object 0xffff88810bde1680 (size 96): comm "syz-executor.0", pid 7155, jiffies 4294943732 (age 9.260s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 50 9b bb 82 ff ff ff ff ........P....... 00 00 00 00 00 00 00 00 00 87 bb 82 ff ff ff ff ................ backtrace: [<00000000ac16472e>] kmemleak_alloc_recursive include/linux/kmemleak.h:55 [inline] [<00000000ac16472e>] slab_post_alloc_hook mm/slab.h:439 [inline] [<00000000ac16472e>] slab_alloc_node mm/slab.c:3269 [inline] [<00000000ac16472e>] kmem_cache_alloc_node_trace+0x15b/0x2a0 mm/slab.c:3597 [<000000009cd2ab89>] __do_kmalloc_node mm/slab.c:3619 [inline] [<000000009cd2ab89>] __kmalloc_node+0x38/0x50 mm/slab.c:3627 [<000000003d086b2d>] kmalloc_node include/linux/slab.h:590 [inline] [<000000003d086b2d>] kvmalloc_node+0x4a/0xd0 mm/util.c:431 [<00000000aecbf8f1>] kvmalloc include/linux/mm.h:637 [inline] [<00000000aecbf8f1>] kvzalloc include/linux/mm.h:645 [inline] [<00000000aecbf8f1>] allocate_hook_entries_size+0x3b/0x60 net/netfilter/core.c:61 [<00000000feafa372>] nf_hook_entries_grow+0xae/0x270 net/netfilter/core.c:128 [<000000002fee3bf2>] __nf_register_net_hook+0x9a/0x170 net/netfilter/core.c:337 [<00000000cc1563c8>] nf_register_net_hook+0x34/0xc0 net/netfilter/core.c:464 [<000000002f5979b7>] nf_register_net_hooks+0x53/0xc0 net/netfilter/core.c:480 [<0000000030c55d60>] __ip_vs_init+0xe8/0x170 net/netfilter/ipvs/ip_vs_core.c:2280 [<0000000058d080e1>] ops_init+0x4c/0x140 net/core/net_namespace.c:130 [<0000000098553bc0>] setup_net+0xde/0x230 net/core/net_namespace.c:316 [<00000000fb596539>] copy_net_ns+0xf0/0x1e0 net/core/net_namespace.c:439 [<000000003deaedb5>] create_new_namespaces+0x141/0x2a0 kernel/nsproxy.c:107 [<00000000a7d0db84>] copy_namespaces+0xa1/0xe0 kernel/nsproxy.c:165 [<000000001ad2c3fc>] copy_process.part.0+0x11fd/0x2150 kernel/fork.c:2035 [<000000006fea9dd6>] copy_process kernel/fork.c:1800 [inline] [<000000006fea9dd6>] _do_fork+0x121/0x4f0 kernel/fork.c:2369