BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.130s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.130s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 37.810s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 37.810s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.230s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.230s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 37.910s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 37.910s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.330s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.330s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.430s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.430s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.110s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.110s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.210s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.210s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.630s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.630s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.310s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.310s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.730s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.730s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.410s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.410s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111da0800 (size 2048): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.830s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111623a00 (size 32): comm "syz-executor272", pid 8212, jiffies 4295097797 (age 39.830s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111e77800 (size 2048): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.510s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000043412ae9>] kmalloc include/linux/slab.h:559 [inline] [<0000000043412ae9>] sk_prot_alloc+0xae/0x170 net/core/sock.c:1685 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110ed73e0 (size 32): comm "syz-executor272", pid 8324, jiffies 4295097929 (age 38.510s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000093cff281>] kmalloc include/linux/slab.h:554 [inline] [<0000000093cff281>] kzalloc include/linux/slab.h:666 [inline] [<0000000093cff281>] selinux_sk_alloc_security+0x46/0xb0 security/selinux/hooks.c:5123 [<00000000f280ed25>] security_sk_alloc+0x33/0x60 security/security.c:2180 [<00000000846a4220>] sk_prot_alloc+0xc9/0x170 net/core/sock.c:1688 [<00000000ed04b505>] sk_alloc+0x30/0x330 net/core/sock.c:1739 [<0000000044aadf28>] nr_create+0x67/0x1a0 net/netrom/af_netrom.c:433 [<00000000b7055620>] __sock_create+0x14f/0x230 net/socket.c:1427 [<00000000e86f7867>] sock_create net/socket.c:1478 [inline] [<00000000e86f7867>] __sys_socket+0x60/0x110 net/socket.c:1520 [<00000000bc781e9d>] __do_sys_socket net/socket.c:1529 [inline] [<00000000bc781e9d>] __se_sys_socket net/socket.c:1527 [inline] [<00000000bc781e9d>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<00000000bffc4d2d>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<000000006b029071>] entry_SYSCALL_64_after_hwframe+0x44/0xa9