2023/02/21 14:42:07 executed programs: 16 2023/02/21 14:42:14 executed programs: 31 BUG: memory leak unreferenced object 0xffff88810c711400 (size 512): comm "dhcpcd", pid 3127, jiffies 4294938312 (age 76.970s) hex dump (first 32 bytes): 00 b8 db 10 81 88 ff ff 40 24 b9 84 ff ff ff ff ........@$...... 00 69 11 07 81 88 ff ff 58 77 ff ff 00 00 00 00 .i......Xw...... backtrace: [<0000000002caa49e>] __kmem_cache_alloc_node+0x25b/0x3c0 [<00000000f7575574>] __kmalloc+0x4e/0x130 [<00000000cb85fcab>] ___neigh_create+0xb6/0xad0 [<00000000ac7f2510>] __neigh_create+0x36/0x40 [<000000003db43423>] ip6_finish_output2+0x5d5/0x7e0 [<000000005418b8c4>] ip6_finish_output+0x1f8/0x410 [<0000000088b1716a>] ip6_output+0x8b/0x190 [<00000000cd76a62c>] ip6_local_out+0x4a/0x70 [<000000007445bbc1>] ip6_send_skb+0x2e/0xb0 [<000000006674e7bd>] ip6_push_pending_frames+0x74/0x90 [<000000001b98d06e>] rawv6_sendmsg+0x11d2/0x15e0 [<0000000011df6120>] inet_sendmsg+0x42/0x60 [<000000004aaeda35>] sock_sendmsg+0x56/0xa0 [<000000001373d8d8>] ____sys_sendmsg+0x30a/0x390 [<0000000073b2a319>] ___sys_sendmsg+0xa3/0x110 [<00000000c84d7c67>] __sys_sendmsg+0x87/0x100 BUG: memory leak unreferenced object 0xffff8881147d3800 (size 240): comm "syz-executor.3", pid 3781, jiffies 4294945073 (age 9.370s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 a8 f4 11 81 88 ff ff ................ backtrace: [<00000000405b6178>] kmem_cache_alloc_node+0x27a/0x430 [<0000000035b0f205>] __alloc_skb+0x1af/0x1e0 [<000000005b93f84e>] sock_wmalloc+0x55/0x80 [<000000008a970308>] pppoe_sendmsg+0xd7/0x280 [<000000004aaeda35>] sock_sendmsg+0x56/0xa0 [<00000000d805ddc1>] ____sys_sendmsg+0x129/0x390 [<0000000073b2a319>] ___sys_sendmsg+0xa3/0x110 [<000000003f3826c0>] __sys_sendmmsg+0x108/0x2c0 [<00000000e8ad6b6a>] __x64_sys_sendmmsg+0x2c/0x40 [<00000000d22a0b30>] do_syscall_64+0x39/0x80 [<000000002554023f>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888114504c80 (size 640): comm "syz-executor.3", pid 3781, jiffies 4294945073 (age 9.370s) hex dump (first 32 bytes): 00 01 aa aa aa aa aa 0a aa aa aa aa aa 0a 88 64 ...............d 11 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000405b6178>] kmem_cache_alloc_node+0x27a/0x430 [<000000009c86140b>] kmalloc_reserve+0xcb/0x120 [<00000000cb2af001>] __alloc_skb+0xad/0x1e0 [<000000005b93f84e>] sock_wmalloc+0x55/0x80 [<000000008a970308>] pppoe_sendmsg+0xd7/0x280 [<000000004aaeda35>] sock_sendmsg+0x56/0xa0 [<00000000d805ddc1>] ____sys_sendmsg+0x129/0x390 [<0000000073b2a319>] ___sys_sendmsg+0xa3/0x110 [<000000003f3826c0>] __sys_sendmmsg+0x108/0x2c0 [<00000000e8ad6b6a>] __x64_sys_sendmmsg+0x2c/0x40 [<00000000d22a0b30>] do_syscall_64+0x39/0x80 [<000000002554023f>] entry_SYSCALL_64_after_hwframe+0x63/0xcd