2026/01/16 18:45:31 executed programs: 5 BUG: memory leak unreferenced object 0xffff88812040f240 (size 576): comm "syz.0.17", pid 6083, jiffies 4294944475 hex dump (first 32 bytes): 06 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 42 54 0e 81 88 ff ff 58 f2 40 20 81 88 ff ff .BT.....X.@ .... backtrace (crc 2e0fd4b2): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x3bb/0x5a0 mm/slub.c:5282 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x613/0xb00 mm/khugepaged.c:2387 madvise_collapse+0x1f7/0x650 mm/khugepaged.c:2810 madvise_vma_behavior+0x6e2/0x1260 mm/madvise.c:1372 madvise_walk_vmas+0x152/0x530 mm/madvise.c:1721 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1937 do_madvise+0x118/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812040f488 (size 576): comm "syz.0.17", pid 6083, jiffies 4294944475 hex dump (first 32 bytes): 00 07 00 00 00 00 00 00 40 f2 40 20 81 88 ff ff ........@.@ .... 10 42 54 0e 81 88 ff ff a0 f4 40 20 81 88 ff ff .BT.......@ .... backtrace (crc ba237a3a): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x3bb/0x5a0 mm/slub.c:5282 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x613/0xb00 mm/khugepaged.c:2387 madvise_collapse+0x1f7/0x650 mm/khugepaged.c:2810 madvise_vma_behavior+0x6e2/0x1260 mm/madvise.c:1372 madvise_walk_vmas+0x152/0x530 mm/madvise.c:1721 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1937 do_madvise+0x118/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812040f6d0 (size 576): comm "syz.0.17", pid 6083, jiffies 4294944475 hex dump (first 32 bytes): 00 06 00 00 00 00 00 00 40 f2 40 20 81 88 ff ff ........@.@ .... 10 42 54 0e 81 88 ff ff e8 f6 40 20 81 88 ff ff .BT.......@ .... backtrace (crc afab35df): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x3bb/0x5a0 mm/slub.c:5282 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x613/0xb00 mm/khugepaged.c:2387 madvise_collapse+0x1f7/0x650 mm/khugepaged.c:2810 madvise_vma_behavior+0x6e2/0x1260 mm/madvise.c:1372 madvise_walk_vmas+0x152/0x530 mm/madvise.c:1721 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1937 do_madvise+0x118/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812040f918 (size 576): comm "syz.0.17", pid 6083, jiffies 4294944475 hex dump (first 32 bytes): 00 05 00 00 00 00 00 00 40 f2 40 20 81 88 ff ff ........@.@ .... 10 42 54 0e 81 88 ff ff 30 f9 40 20 81 88 ff ff .BT.....0.@ .... backtrace (crc 83b20c79): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x3bb/0x5a0 mm/slub.c:5282 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x613/0xb00 mm/khugepaged.c:2387 madvise_collapse+0x1f7/0x650 mm/khugepaged.c:2810 madvise_vma_behavior+0x6e2/0x1260 mm/madvise.c:1372 madvise_walk_vmas+0x152/0x530 mm/madvise.c:1721 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1937 do_madvise+0x118/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812040fb60 (size 576): comm "syz.0.17", pid 6083, jiffies 4294944475 hex dump (first 32 bytes): 00 04 00 00 00 00 00 00 40 f2 40 20 81 88 ff ff ........@.@ .... 10 42 54 0e 81 88 ff ff 78 fb 40 20 81 88 ff ff .BT.....x.@ .... backtrace (crc 963a439c): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x3bb/0x5a0 mm/slub.c:5282 xas_alloc+0xf6/0x120 lib/xarray.c:378 xas_create+0x48a/0x820 lib/xarray.c:685 xas_create_range+0xb6/0x1b0 lib/xarray.c:725 collapse_file+0x1e0/0x1ae0 mm/khugepaged.c:1891 hpage_collapse_scan_file+0x613/0xb00 mm/khugepaged.c:2387 madvise_collapse+0x1f7/0x650 mm/khugepaged.c:2810 madvise_vma_behavior+0x6e2/0x1260 mm/madvise.c:1372 madvise_walk_vmas+0x152/0x530 mm/madvise.c:1721 madvise_do_behavior+0xc4/0x2e0 mm/madvise.c:1937 do_madvise+0x118/0x1c0 mm/madvise.c:2030 __do_sys_madvise mm/madvise.c:2039 [inline] __se_sys_madvise mm/madvise.c:2037 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2037 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF