2025/11/08 23:02:00 executed programs: 5 BUG: memory leak unreferenced object 0xffff888124bcfb60 (size 576): comm "syz.0.17", pid 6078, jiffies 4294944721 hex dump (first 32 bytes): 06 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 58 5d 42 25 81 88 ff ff 78 fb bc 24 81 88 ff ff X]B%....x..$.... backtrace (crc aa0cc4f7): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4979 [inline] slab_alloc_node mm/slub.c:5284 [inline] kmem_cache_alloc_lru_noprof+0x3a4/0x5d0 mm/slub.c:5303 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1874 hpage_collapse_scan_file+0x617/0xb00 mm/khugepaged.c:2370 madvise_collapse+0x2a7/0x690 mm/khugepaged.c:2795 madvise_vma_behavior+0x886/0x1470 mm/madvise.c:1358 madvise_walk_vmas+0x152/0x4d0 mm/madvise.c:1669 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1885 do_madvise+0x118/0x1c0 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:1985 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888124bcfda8 (size 576): comm "syz.0.17", pid 6078, jiffies 4294944721 hex dump (first 32 bytes): 00 07 00 00 00 00 00 00 60 fb bc 24 81 88 ff ff ........`..$.... 58 5d 42 25 81 88 ff ff c0 fd bc 24 81 88 ff ff X]B%.......$.... backtrace (crc 8f41b7d4): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4979 [inline] slab_alloc_node mm/slub.c:5284 [inline] kmem_cache_alloc_lru_noprof+0x3a4/0x5d0 mm/slub.c:5303 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1874 hpage_collapse_scan_file+0x617/0xb00 mm/khugepaged.c:2370 madvise_collapse+0x2a7/0x690 mm/khugepaged.c:2795 madvise_vma_behavior+0x886/0x1470 mm/madvise.c:1358 madvise_walk_vmas+0x152/0x4d0 mm/madvise.c:1669 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1885 do_madvise+0x118/0x1c0 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:1985 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888125036db0 (size 576): comm "syz.0.17", pid 6078, jiffies 4294944721 hex dump (first 32 bytes): 00 06 00 00 00 00 00 00 60 fb bc 24 81 88 ff ff ........`..$.... 58 5d 42 25 81 88 ff ff c8 6d 03 25 81 88 ff ff X]B%.....m.%.... backtrace (crc 999b79da): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4979 [inline] slab_alloc_node mm/slub.c:5284 [inline] kmem_cache_alloc_lru_noprof+0x3a4/0x5d0 mm/slub.c:5303 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1874 hpage_collapse_scan_file+0x617/0xb00 mm/khugepaged.c:2370 madvise_collapse+0x2a7/0x690 mm/khugepaged.c:2795 madvise_vma_behavior+0x886/0x1470 mm/madvise.c:1358 madvise_walk_vmas+0x152/0x4d0 mm/madvise.c:1669 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1885 do_madvise+0x118/0x1c0 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:1985 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888125036ff8 (size 576): comm "syz.0.17", pid 6078, jiffies 4294944721 hex dump (first 32 bytes): 00 05 00 00 00 00 00 00 60 fb bc 24 81 88 ff ff ........`..$.... 58 5d 42 25 81 88 ff ff 10 70 03 25 81 88 ff ff X]B%.....p.%.... backtrace (crc 9081936e): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4979 [inline] slab_alloc_node mm/slub.c:5284 [inline] kmem_cache_alloc_lru_noprof+0x3a4/0x5d0 mm/slub.c:5303 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1874 hpage_collapse_scan_file+0x617/0xb00 mm/khugepaged.c:2370 madvise_collapse+0x2a7/0x690 mm/khugepaged.c:2795 madvise_vma_behavior+0x886/0x1470 mm/madvise.c:1358 madvise_walk_vmas+0x152/0x4d0 mm/madvise.c:1669 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1885 do_madvise+0x118/0x1c0 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:1985 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888125037240 (size 576): comm "syz.0.17", pid 6078, jiffies 4294944721 hex dump (first 32 bytes): 00 04 00 00 00 00 00 00 60 fb bc 24 81 88 ff ff ........`..$.... 58 5d 42 25 81 88 ff ff 58 72 03 25 81 88 ff ff X]B%....Xr.%.... backtrace (crc 8509dc8b): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4979 [inline] slab_alloc_node mm/slub.c:5284 [inline] kmem_cache_alloc_lru_noprof+0x3a4/0x5d0 mm/slub.c:5303 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1874 hpage_collapse_scan_file+0x617/0xb00 mm/khugepaged.c:2370 madvise_collapse+0x2a7/0x690 mm/khugepaged.c:2795 madvise_vma_behavior+0x886/0x1470 mm/madvise.c:1358 madvise_walk_vmas+0x152/0x4d0 mm/madvise.c:1669 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1885 do_madvise+0x118/0x1c0 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:1985 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF