2021/07/29 06:45:25 executed programs: 3 2021/07/29 06:45:30 executed programs: 5 BUG: memory leak unreferenced object 0xffff8881017fb700 (size 832): comm "syz-executor.0", pid 8713, jiffies 4295045556 (age 18.510s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2a 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 *..@............ backtrace: [] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1802 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] qrtr_create+0x4d/0xb0 net/qrtr/qrtr.c:1254 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888119d7e320 (size 32): comm "syz-executor.0", pid 8713, jiffies 4295045556 (age 18.510s) hex dump (first 32 bytes): b0 02 05 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:591 [inline] [] kzalloc include/linux/slab.h:721 [inline] [] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:785 [] security_sk_alloc+0x31/0x70 security/security.c:2261 [] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1811 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] qrtr_create+0x4d/0xb0 net/qrtr/qrtr.c:1254 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881017fb3c0 (size 832): comm "syz-executor.0", pid 8714, jiffies 4295045557 (age 18.500s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2a 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 *..@............ backtrace: [] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1802 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] qrtr_create+0x4d/0xb0 net/qrtr/qrtr.c:1254 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888119d7e300 (size 32): comm "syz-executor.0", pid 8714, jiffies 4295045557 (age 18.500s) hex dump (first 32 bytes): b0 02 05 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:591 [inline] [] kzalloc include/linux/slab.h:721 [inline] [] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:785 [] security_sk_alloc+0x31/0x70 security/security.c:2261 [] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1811 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] qrtr_create+0x4d/0xb0 net/qrtr/qrtr.c:1254 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881017fb080 (size 832): comm "syz-executor.0", pid 8720, jiffies 4295046100 (age 13.070s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2a 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 *..@............ backtrace: [] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1802 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] qrtr_create+0x4d/0xb0 net/qrtr/qrtr.c:1254 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae