TDEV_CHANGE): team0: link becomes ready executing program executing program BUG: memory leak unreferenced object 0xffff888120d73380 (size 64): comm "softirq", pid 0, jiffies 4294943677 (age 12.520s) hex dump (first 32 bytes): 20 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 N.............. 58 02 2f 17 82 88 ff ff 00 00 00 00 00 00 00 00 X./............. backtrace: [<00000000503356a9>] kmemleak_alloc_recursive include/linux/kmemleak.h:55 [inline] [<00000000503356a9>] slab_post_alloc_hook mm/slab.h:439 [inline] [<00000000503356a9>] slab_alloc mm/slab.c:3326 [inline] [<00000000503356a9>] kmem_cache_alloc+0x134/0x270 mm/slab.c:3488 [<00000000252213c8>] sctp_bucket_create net/sctp/socket.c:8395 [inline] [<00000000252213c8>] sctp_get_port_local+0x189/0x5b0 net/sctp/socket.c:8142 [<000000005fcffb1c>] sctp_do_bind+0xcc/0x1e0 net/sctp/socket.c:402 [<00000000e1b5706d>] sctp_bind+0x44/0x70 net/sctp/socket.c:302 [<00000000aa6ffddd>] inet_bind+0x40/0xc0 net/ipv4/af_inet.c:445 [<000000008d2108a2>] __sys_bind+0x11c/0x140 net/socket.c:1659 [<00000000114d2dee>] __do_sys_bind net/socket.c:1670 [inline] [<00000000114d2dee>] __se_sys_bind net/socket.c:1668 [inline] [<00000000114d2dee>] __x64_sys_bind+0x1e/0x30 net/socket.c:1668 [<000000007ef5fe37>] do_syscall_64+0x76/0x1a0 arch/x86/entry/common.c:301 [<0000000082a28040>] entry_SYSCALL_64_after_hwframe+0x44/0xa9