executing program executing program executing program executing program executing program BUG: memory leak unreferenced object 0xffff888119aed800 (size 2048): comm "syz-executor732", pid 6767, jiffies 4294947339 (age 36.540s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c6cb222b>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000c6cb222b>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000c6cb222b>] slab_alloc mm/slab.c:3319 [inline] [<00000000c6cb222b>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000c6cb222b>] __kmalloc+0x169/0x300 mm/slab.c:3664 [<00000000123712cb>] kmalloc include/linux/slab.h:557 [inline] [<00000000123712cb>] sk_prot_alloc+0x112/0x170 net/core/sock.c:1603 [<000000004c0b187b>] sk_alloc+0x35/0x2f0 net/core/sock.c:1657 [<0000000016823b6a>] llc_sk_alloc+0x35/0x170 net/llc/llc_conn.c:950 [<00000000f22ba63a>] llc_ui_create+0x7b/0x150 net/llc/af_llc.c:173 [<00000000e395d773>] __sock_create+0x164/0x250 net/socket.c:1418 [<00000000dbaa0ff4>] sock_create net/socket.c:1469 [inline] [<00000000dbaa0ff4>] __sys_socket+0x69/0x110 net/socket.c:1511 [<0000000062bf1d17>] __do_sys_socket net/socket.c:1520 [inline] [<0000000062bf1d17>] __se_sys_socket net/socket.c:1518 [inline] [<0000000062bf1d17>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518 [<000000008290c0dd>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000004ed9cd9f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121bbe400 (size 224): comm "syz-executor732", pid 6767, jiffies 4294947339 (age 36.540s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 b0 da 24 81 88 ff ff 00 d8 ae 19 81 88 ff ff ...$............ backtrace: [<00000000b265f4d4>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000b265f4d4>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000b265f4d4>] slab_alloc_node mm/slab.c:3262 [inline] [<00000000b265f4d4>] kmem_cache_alloc_node+0x163/0x2f0 mm/slab.c:3574 [<00000000bfd25987>] __alloc_skb+0x6e/0x210 net/core/skbuff.c:197 [<00000000c93018e9>] alloc_skb include/linux/skbuff.h:1049 [inline] [<00000000c93018e9>] alloc_skb_with_frags+0x5f/0x250 net/core/skbuff.c:5659 [<000000000c66b501>] sock_alloc_send_pskb+0x269/0x2a0 net/core/sock.c:2235 [<00000000dc726d88>] sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2252 [<000000000c4e97d5>] llc_ui_sendmsg+0x10a/0x540 net/llc/af_llc.c:933 [<00000000661bae8a>] sock_sendmsg_nosec net/socket.c:637 [inline] [<00000000661bae8a>] sock_sendmsg+0x54/0x70 net/socket.c:657 [<00000000afcfc8b4>] __sys_sendto+0x148/0x1f0 net/socket.c:1952 [<00000000d9282a13>] __do_sys_sendto net/socket.c:1964 [inline] [<00000000d9282a13>] __se_sys_sendto net/socket.c:1960 [inline] [<00000000d9282a13>] __x64_sys_sendto+0x2a/0x30 net/socket.c:1960 [<000000008290c0dd>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000004ed9cd9f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811fec6800 (size 2048): comm "syz-executor732", pid 6768, jiffies 4294947917 (age 30.760s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c6cb222b>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000c6cb222b>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000c6cb222b>] slab_alloc mm/slab.c:3319 [inline] [<00000000c6cb222b>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000c6cb222b>] __kmalloc+0x169/0x300 mm/slab.c:3664 [<00000000123712cb>] kmalloc include/linux/slab.h:557 [inline] [<00000000123712cb>] sk_prot_alloc+0x112/0x170 net/core/sock.c:1603 [<000000004c0b187b>] sk_alloc+0x35/0x2f0 net/core/sock.c:1657 [<0000000016823b6a>] llc_sk_alloc+0x35/0x170 net/llc/llc_conn.c:950 [<00000000f22ba63a>] llc_ui_create+0x7b/0x150 net/llc/af_llc.c:173 [<00000000e395d773>] __sock_create+0x164/0x250 net/socket.c:1418 [<00000000dbaa0ff4>] sock_create net/socket.c:1469 [inline] [<00000000dbaa0ff4>] __sys_socket+0x69/0x110 net/socket.c:1511 [<0000000062bf1d17>] __do_sys_socket net/socket.c:1520 [inline] [<0000000062bf1d17>] __se_sys_socket net/socket.c:1518 [inline] [<0000000062bf1d17>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518 [<000000008290c0dd>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000004ed9cd9f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118211d00 (size 32): comm "syz-executor732", pid 6768, jiffies 4294947917 (age 30.760s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000059642a4d>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<0000000059642a4d>] slab_post_alloc_hook mm/slab.h:586 [inline] [<0000000059642a4d>] slab_alloc mm/slab.c:3319 [inline] [<0000000059642a4d>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000759d8bde>] kmalloc include/linux/slab.h:552 [inline] [<00000000759d8bde>] kzalloc include/linux/slab.h:686 [inline] [<00000000759d8bde>] selinux_sk_alloc_security+0x48/0xb0 security/selinux/hooks.c:5119 [<000000000ee7c690>] security_sk_alloc+0x49/0x70 security/security.c:2035 [<00000000c6047c29>] sk_prot_alloc+0x12d/0x170 net/core/sock.c:1606 [<000000004c0b187b>] sk_alloc+0x35/0x2f0 net/core/sock.c:1657 [<0000000016823b6a>] llc_sk_alloc+0x35/0x170 net/llc/llc_conn.c:950 [<00000000f22ba63a>] llc_ui_create+0x7b/0x150 net/llc/af_llc.c:173 [<00000000e395d773>] __sock_create+0x164/0x250 net/socket.c:1418 [<00000000dbaa0ff4>] sock_create net/socket.c:1469 [inline] [<00000000dbaa0ff4>] __sys_socket+0x69/0x110 net/socket.c:1511 [<0000000062bf1d17>] __do_sys_socket net/socket.c:1520 [inline] [<0000000062bf1d17>] __se_sys_socket net/socket.c:1518 [inline] [<0000000062bf1d17>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518 [<000000008290c0dd>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000004ed9cd9f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9