BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.100s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.570s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.570s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.190s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.190s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.660s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.660s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.270s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.270s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.740s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.740s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.360s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.830s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.830s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.440s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.440s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.910s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 33.910s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.530s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 34.000s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 34.000s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.610s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.610s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 34.080s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 34.080s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116273800 (size 2048): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881183697e0 (size 32): comm "syz-executor847", pid 10195, jiffies 4294971929 (age 35.700s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811489a800 (size 2048): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 34.170s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000076b8e0f2>] kmalloc include/linux/slab.h:557 [inline] [<0000000076b8e0f2>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cd63a0 (size 32): comm "syz-executor847", pid 10250, jiffies 4294972082 (age 34.170s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3081a20>] kmalloc include/linux/slab.h:552 [inline] [<00000000f3081a20>] kzalloc include/linux/slab.h:682 [inline] [<00000000f3081a20>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<0000000058945de9>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000071315b44>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<0000000013c113a4>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000bb43f330>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<00000000dbbc3e0b>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000007117726e>] sock_create net/socket.c:1457 [inline] [<000000007117726e>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<00000000ce2cf223>] __do_sys_socket net/socket.c:1508 [inline] [<00000000ce2cf223>] __se_sys_socket net/socket.c:1506 [inline] [<00000000ce2cf223>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<0000000087a5bf96>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000bf288bd9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9