write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 38.940s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 38.940s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 36.920s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 36.920s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 36.690s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.030s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.030s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.010s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 36.780s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.110s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.110s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.090s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.090s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 36.870s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.200s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.200s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.180s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.180s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 36.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.290s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.290s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.270s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.270s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 37.040s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.370s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.370s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.360s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 37.130s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.460s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.440s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.440s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 37.210s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115072800 (size 2048): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.540s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811819be20 (size 32): comm "syz-executor009", pid 10173, jiffies 4294970559 (age 39.540s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115f2c800 (size 2048): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811879bf40 (size 32): comm "syz-executor009", pid 10238, jiffies 4294970761 (age 37.530s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abf4e8a3>] kmalloc include/linux/slab.h:552 [inline] [<00000000abf4e8a3>] kzalloc include/linux/slab.h:682 [inline] [<00000000abf4e8a3>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000005294684f>] security_sk_alloc+0x31/0x70 security/security.c:2197 [<0000000022e36a03>] sk_prot_alloc+0x15d/0x1c0 net/core/sock.c:1688 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811496b800 (size 2048): comm "syz-executor009", pid 10241, jiffies 4294970784 (age 37.300s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000005a8d4cab>] kmalloc include/linux/slab.h:557 [inline] [<000000005a8d4cab>] sk_prot_alloc+0xdf/0x1c0 net/core/sock.c:1685 [<00000000641ef6bf>] sk_alloc+0x30/0x3f0 net/core/sock.c:1739 [<00000000e90e42ce>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<0000000034109815>] __sock_create+0x1ab/0x2b0 net/socket.c:1406 [<000000000b991598>] sock_create net/socket.c:1457 [inline] [<000000000b991598>] __sys_socket+0x6f/0x140 net/socket.c:1499 [<000000002ab4c468>] __do_sys_socket net/socket.c:1508 [inline] [<000000002ab4c468>] __se_sys_socket net/socket.c:1506 [inline] [<000000002ab4c468>] __x64_sys_socket+0x1a/0x20 net/socket.c:1506 [<00000000ccf0d09c>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000c39c34a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory