2020/02/24 16:38:06 executed programs: 31 2020/02/24 16:38:12 executed programs: 55 BUG: memory leak unreferenced object 0xffff88810ad82400 (size 64): comm "syz-executor.4", pid 7433, jiffies 4294956212 (age 14.610s) hex dump (first 32 bytes): 62 c0 51 1a 7d 2e 84 97 88 23 d8 0a 81 88 ff ff b.Q.}....#...... 87 10 a9 d9 00 00 00 00 80 29 ba 0a 81 88 ff ff .........)...... backtrace: [<00000000acd2f2a8>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000acd2f2a8>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000acd2f2a8>] slab_alloc_node mm/slab.c:3263 [inline] [<00000000acd2f2a8>] kmem_cache_alloc_node_trace+0x161/0x2f0 mm/slab.c:3593 [<000000004b3dc2b0>] __do_kmalloc_node mm/slab.c:3615 [inline] [<000000004b3dc2b0>] __kmalloc_node+0x38/0x50 mm/slab.c:3623 [<00000000fbd5bfac>] kmalloc_node include/linux/slab.h:578 [inline] [<00000000fbd5bfac>] sock_hash_alloc_elem net/core/sock_map.c:649 [inline] [<00000000fbd5bfac>] sock_hash_update_common+0x314/0x570 net/core/sock_map.c:703 [<000000004a43e4c8>] sock_hash_update_elem+0x13b/0x150 net/core/sock_map.c:754 [<00000000e98a60a7>] bpf_map_update_value.isra.0+0x14d/0x300 kernel/bpf/syscall.c:168 [<00000000196963c0>] map_update_elem kernel/bpf/syscall.c:1089 [inline] [<00000000196963c0>] __do_sys_bpf+0x19dc/0x1e50 kernel/bpf/syscall.c:3384 [<000000008509ac83>] __se_sys_bpf kernel/bpf/syscall.c:3355 [inline] [<000000008509ac83>] __x64_sys_bpf+0x1e/0x30 kernel/bpf/syscall.c:3355 [<00000000fe69f0f9>] do_syscall_64+0x73/0x220 arch/x86/entry/common.c:294 [<00000000c29b988e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810b3e9400 (size 64): comm "syz-executor.2", pid 7439, jiffies 4294956214 (age 14.590s) hex dump (first 32 bytes): 70 72 6f 63 3a 2f 73 65 6c 66 2f 6f 6f 6d 5f 73 proc:/self/oom_s 87 10 a9 d9 5f 61 64 6a c0 f2 fa 0a 81 88 ff ff ...._adj........ backtrace: [<00000000acd2f2a8>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000acd2f2a8>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000acd2f2a8>] slab_alloc_node mm/slab.c:3263 [inline] [<00000000acd2f2a8>] kmem_cache_alloc_node_trace+0x161/0x2f0 mm/slab.c:3593 [<000000004b3dc2b0>] __do_kmalloc_node mm/slab.c:3615 [inline] [<000000004b3dc2b0>] __kmalloc_node+0x38/0x50 mm/slab.c:3623 [<00000000fbd5bfac>] kmalloc_node include/linux/slab.h:578 [inline] [<00000000fbd5bfac>] sock_hash_alloc_elem net/core/sock_map.c:649 [inline] [<00000000fbd5bfac>] sock_hash_update_common+0x314/0x570 net/core/sock_map.c:703 [<000000004a43e4c8>] sock_hash_update_elem+0x13b/0x150 net/core/sock_map.c:754 [<00000000e98a60a7>] bpf_map_update_value.isra.0+0x14d/0x300 kernel/bpf/syscall.c:168 [<00000000196963c0>] map_update_elem kernel/bpf/syscall.c:1089 [inline] [<00000000196963c0>] __do_sys_bpf+0x19dc/0x1e50 kernel/bpf/syscall.c:3384 [<000000008509ac83>] __se_sys_bpf kernel/bpf/syscall.c:3355 [inline] [<000000008509ac83>] __x64_sys_bpf+0x1e/0x30 kernel/bpf/syscall.c:3355 [<00000000fe69f0f9>] do_syscall_64+0x73/0x220 arch/x86/entry/common.c:294 [<00000000c29b988e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810ad88f80 (size 64): comm "syz-executor.0", pid 7438, jiffies 4294956217 (age 14.560s) hex dump (first 32 bytes): d6 1e f9 15 12 2e 7a 4f c9 e9 d8 0a 81 88 ff ff ......zO........ 87 10 a9 d9 81 88 ff ff c0 60 39 0b 81 88 ff ff .........`9..... backtrace: [<00000000acd2f2a8>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000acd2f2a8>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000acd2f2a8>] slab_alloc_node mm/slab.c:3263 [inline] [<00000000acd2f2a8>] kmem_cache_alloc_node_trace+0x161/0x2f0 mm/slab.c:3593 [<000000004b3dc2b0>] __do_kmalloc_node mm/slab.c:3615 [inline] [<000000004b3dc2b0>] __kmalloc_node+0x38/0x50 mm/slab.c:3623 [<00000000fbd5bfac>] kmalloc_node include/linux/slab.h:578 [inline] [<00000000fbd5bfac>] sock_hash_alloc_elem net/core/sock_map.c:649 [inline] [<00000000fbd5bfac>] sock_hash_update_common+0x314/0x570 net/core/sock_map.c:703 [<000000004a43e4c8>] sock_hash_update_elem+0x13b/0x150 net/core/sock_map.c:754 [<00000000e98a60a7>] bpf_map_update_value.isra.0+0x14d/0x300 kernel/bpf/syscall.c:168 [<00000000196963c0>] map_update_elem kernel/bpf/syscall.c:1089 [inline] [<00000000196963c0>] __do_sys_bpf+0x19dc/0x1e50 kernel/bpf/syscall.c:3384 [<000000008509ac83>] __se_sys_bpf kernel/bpf/syscall.c:3355 [inline] [<000000008509ac83>] __x64_sys_bpf+0x1e/0x30 kernel/bpf/syscall.c:3355 [<00000000fe69f0f9>] do_syscall_64+0x73/0x220 arch/x86/entry/common.c:294 [<00000000c29b988e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9