2026/04/09 13:01:49 executed programs: 17 2026/04/09 13:01:54 executed programs: 19 BUG: memory leak unreferenced object 0xffff88810ff656d0 (size 576): comm "syz.0.27", pid 6774, jiffies 4294948491 hex dump (first 32 bytes): 06 08 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ b0 3e 81 0f 81 88 ff ff e8 56 f6 0f 81 88 ff ff .>.......V...... backtrace (crc 55f180c): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4543 [inline] slab_alloc_node mm/slub.c:4866 [inline] kmem_cache_alloc_lru_noprof+0x37d/0x490 mm/slub.c:4885 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b70 mm/khugepaged.c:1883 hpage_collapse_scan_file+0x3b8/0xb10 mm/khugepaged.c:2380 madvise_collapse+0x22a/0x700 mm/khugepaged.c:2809 madvise_vma_behavior+0xb05/0x1310 mm/madvise.c:1370 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1719 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1935 do_madvise+0x137/0x1c0 mm/madvise.c:2028 __do_sys_madvise mm/madvise.c:2037 [inline] __se_sys_madvise mm/madvise.c:2035 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2035 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810ff65488 (size 576): comm "syz.0.27", pid 6774, jiffies 4294948491 hex dump (first 32 bytes): 00 07 00 00 00 00 00 00 d0 56 f6 0f 81 88 ff ff .........V...... b0 3e 81 0f 81 88 ff ff a0 54 f6 0f 81 88 ff ff .>.......T...... backtrace (crc 2dcf1507): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4543 [inline] slab_alloc_node mm/slub.c:4866 [inline] kmem_cache_alloc_lru_noprof+0x37d/0x490 mm/slub.c:4885 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b70 mm/khugepaged.c:1883 hpage_collapse_scan_file+0x3b8/0xb10 mm/khugepaged.c:2380 madvise_collapse+0x22a/0x700 mm/khugepaged.c:2809 madvise_vma_behavior+0xb05/0x1310 mm/madvise.c:1370 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1719 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1935 do_madvise+0x137/0x1c0 mm/madvise.c:2028 __do_sys_madvise mm/madvise.c:2037 [inline] __se_sys_madvise mm/madvise.c:2035 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2035 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810ff66920 (size 576): comm "syz.0.27", pid 6774, jiffies 4294948491 hex dump (first 32 bytes): 00 06 00 00 00 00 00 00 d0 56 f6 0f 81 88 ff ff .........V...... b0 3e 81 0f 81 88 ff ff 38 69 f6 0f 81 88 ff ff .>......8i...... backtrace (crc 489d4f47): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4543 [inline] slab_alloc_node mm/slub.c:4866 [inline] kmem_cache_alloc_lru_noprof+0x37d/0x490 mm/slub.c:4885 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b70 mm/khugepaged.c:1883 hpage_collapse_scan_file+0x3b8/0xb10 mm/khugepaged.c:2380 madvise_collapse+0x22a/0x700 mm/khugepaged.c:2809 madvise_vma_behavior+0xb05/0x1310 mm/madvise.c:1370 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1719 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1935 do_madvise+0x137/0x1c0 mm/madvise.c:2028 __do_sys_madvise mm/madvise.c:2037 [inline] __se_sys_madvise mm/madvise.c:2035 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2035 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810ff666d8 (size 576): comm "syz.0.27", pid 6774, jiffies 4294948491 hex dump (first 32 bytes): 00 05 00 00 00 00 00 00 d0 56 f6 0f 81 88 ff ff .........V...... b0 3e 81 0f 81 88 ff ff f0 66 f6 0f 81 88 ff ff .>.......f...... backtrace (crc b622f4f0): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4543 [inline] slab_alloc_node mm/slub.c:4866 [inline] kmem_cache_alloc_lru_noprof+0x37d/0x490 mm/slub.c:4885 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b70 mm/khugepaged.c:1883 hpage_collapse_scan_file+0x3b8/0xb10 mm/khugepaged.c:2380 madvise_collapse+0x22a/0x700 mm/khugepaged.c:2809 madvise_vma_behavior+0xb05/0x1310 mm/madvise.c:1370 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1719 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1935 do_madvise+0x137/0x1c0 mm/madvise.c:2028 __do_sys_madvise mm/madvise.c:2037 [inline] __se_sys_madvise mm/madvise.c:2035 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2035 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810ff66490 (size 576): comm "syz.0.27", pid 6774, jiffies 4294948491 hex dump (first 32 bytes): 00 04 00 00 00 00 00 00 d0 56 f6 0f 81 88 ff ff .........V...... b0 3e 81 0f 81 88 ff ff a8 64 f6 0f 81 88 ff ff .>.......d...... backtrace (crc 710c3904): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4543 [inline] slab_alloc_node mm/slub.c:4866 [inline] kmem_cache_alloc_lru_noprof+0x37d/0x490 mm/slub.c:4885 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b70 mm/khugepaged.c:1883 hpage_collapse_scan_file+0x3b8/0xb10 mm/khugepaged.c:2380 madvise_collapse+0x22a/0x700 mm/khugepaged.c:2809 madvise_vma_behavior+0xb05/0x1310 mm/madvise.c:1370 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1719 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1935 do_madvise+0x137/0x1c0 mm/madvise.c:2028 __do_sys_madvise mm/madvise.c:2037 [inline] __se_sys_madvise mm/madvise.c:2035 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2035 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF