2026/05/02 21:29:49 executed programs: 13 2026/05/02 21:29:54 executed programs: 15 2026/05/02 21:30:00 executed programs: 17 2026/05/02 21:30:05 executed programs: 19 BUG: memory leak unreferenced object 0xffff88810f214490 (size 576): comm "syz.0.25", pid 5975, jiffies 4294944213 hex dump (first 32 bytes): 06 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 70 4a 28 10 81 88 ff ff a8 44 21 0f 81 88 ff ff pJ(......D!..... backtrace (crc 89cdeff): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4574 [inline] slab_alloc_node mm/slub.c:4898 [inline] kmem_cache_alloc_lru_noprof+0x377/0x490 mm/slub.c:4917 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b30 mm/khugepaged.c:1916 collapse_scan_file mm/khugepaged.c:2412 [inline] collapse_single_pmd+0x85c/0x18d0 mm/khugepaged.c:2447 madvise_collapse+0x173/0x450 mm/khugepaged.c:2869 madvise_vma_behavior+0x9ae/0xf80 mm/madvise.c:1364 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1713 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1929 do_madvise+0x137/0x1c0 mm/madvise.c:2022 __do_sys_madvise mm/madvise.c:2031 [inline] __se_sys_madvise mm/madvise.c:2029 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2029 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xee/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810f213da8 (size 576): comm "syz.0.25", pid 5975, jiffies 4294944213 hex dump (first 32 bytes): 00 07 00 00 00 00 00 00 90 44 21 0f 81 88 ff ff .........D!..... 70 4a 28 10 81 88 ff ff c0 3d 21 0f 81 88 ff ff pJ(......=!..... backtrace (crc e1729aa): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4574 [inline] slab_alloc_node mm/slub.c:4898 [inline] kmem_cache_alloc_lru_noprof+0x377/0x490 mm/slub.c:4917 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b30 mm/khugepaged.c:1916 collapse_scan_file mm/khugepaged.c:2412 [inline] collapse_single_pmd+0x85c/0x18d0 mm/khugepaged.c:2447 madvise_collapse+0x173/0x450 mm/khugepaged.c:2869 madvise_vma_behavior+0x9ae/0xf80 mm/madvise.c:1364 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1713 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1929 do_madvise+0x137/0x1c0 mm/madvise.c:2022 __do_sys_madvise mm/madvise.c:2031 [inline] __se_sys_madvise mm/madvise.c:2029 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2029 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xee/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810f209240 (size 576): comm "syz.0.25", pid 5975, jiffies 4294944213 hex dump (first 32 bytes): 00 06 00 00 00 00 00 00 90 44 21 0f 81 88 ff ff .........D!..... 70 4a 28 10 81 88 ff ff 58 92 20 0f 81 88 ff ff pJ(.....X. ..... backtrace (crc a6fe37e1): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4574 [inline] slab_alloc_node mm/slub.c:4898 [inline] kmem_cache_alloc_lru_noprof+0x377/0x490 mm/slub.c:4917 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b30 mm/khugepaged.c:1916 collapse_scan_file mm/khugepaged.c:2412 [inline] collapse_single_pmd+0x85c/0x18d0 mm/khugepaged.c:2447 madvise_collapse+0x173/0x450 mm/khugepaged.c:2869 madvise_vma_behavior+0x9ae/0xf80 mm/madvise.c:1364 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1713 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1929 do_madvise+0x137/0x1c0 mm/madvise.c:2022 __do_sys_madvise mm/madvise.c:2031 [inline] __se_sys_madvise mm/madvise.c:2029 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2029 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xee/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810f208ff8 (size 576): comm "syz.0.25", pid 5975, jiffies 4294944213 hex dump (first 32 bytes): 00 05 00 00 00 00 00 00 90 44 21 0f 81 88 ff ff .........D!..... 70 4a 28 10 81 88 ff ff 10 90 20 0f 81 88 ff ff pJ(....... ..... backtrace (crc ae38123b): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4574 [inline] slab_alloc_node mm/slub.c:4898 [inline] kmem_cache_alloc_lru_noprof+0x377/0x490 mm/slub.c:4917 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b30 mm/khugepaged.c:1916 collapse_scan_file mm/khugepaged.c:2412 [inline] collapse_single_pmd+0x85c/0x18d0 mm/khugepaged.c:2447 madvise_collapse+0x173/0x450 mm/khugepaged.c:2869 madvise_vma_behavior+0x9ae/0xf80 mm/madvise.c:1364 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1713 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1929 do_madvise+0x137/0x1c0 mm/madvise.c:2022 __do_sys_madvise mm/madvise.c:2031 [inline] __se_sys_madvise mm/madvise.c:2029 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2029 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xee/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810f2086d8 (size 576): comm "syz.0.25", pid 5975, jiffies 4294944213 hex dump (first 32 bytes): 00 04 00 00 00 00 00 00 90 44 21 0f 81 88 ff ff .........D!..... 70 4a 28 10 81 88 ff ff f0 86 20 0f 81 88 ff ff pJ(....... ..... backtrace (crc e980657): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4574 [inline] slab_alloc_node mm/slub.c:4898 [inline] kmem_cache_alloc_lru_noprof+0x377/0x490 mm/slub.c:4917 xas_alloc+0xf1/0x110 lib/xarray.c:378 xas_create+0x40d/0x8a0 lib/xarray.c:685 xas_create_range+0xb5/0x1b0 lib/xarray.c:725 collapse_file+0x209/0x1b30 mm/khugepaged.c:1916 collapse_scan_file mm/khugepaged.c:2412 [inline] collapse_single_pmd+0x85c/0x18d0 mm/khugepaged.c:2447 madvise_collapse+0x173/0x450 mm/khugepaged.c:2869 madvise_vma_behavior+0x9ae/0xf80 mm/madvise.c:1364 madvise_walk_vmas+0x14f/0x510 mm/madvise.c:1713 madvise_do_behavior+0xc6/0x2c0 mm/madvise.c:1929 do_madvise+0x137/0x1c0 mm/madvise.c:2022 __do_sys_madvise mm/madvise.c:2031 [inline] __se_sys_madvise mm/madvise.c:2029 [inline] __x64_sys_madvise+0x2c/0x40 mm/madvise.c:2029 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xee/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF