BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.740s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.740s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.820s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.820s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.900s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.900s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.980s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 33.980s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.060s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.060s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.140s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.220s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.220s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811895e800 (size 2048): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.300s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000c27644f5>] kmalloc include/linux/slab.h:557 [inline] [<00000000c27644f5>] sk_prot_alloc+0xd3/0x1c0 net/core/sock.c:1666 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881188408e0 (size 32): comm "syz-executor505", pid 10240, jiffies 4294958262 (age 34.300s) hex dump (first 32 bytes): b0 6e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 .n.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3c49542>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3c49542>] kzalloc include/linux/slab.h:664 [inline] [<00000000d3c49542>] apparmor_sk_alloc_security+0x4c/0x90 security/apparmor/lsm.c:776 [<000000006bbd859b>] security_sk_alloc+0x31/0x70 security/security.c:2196 [<00000000225c7f3f>] sk_prot_alloc+0xee/0x1c0 net/core/sock.c:1669 [<00000000ff682e06>] sk_alloc+0x30/0x3f0 net/core/sock.c:1720 [<000000001453f5b6>] nr_create+0x80/0x1c0 net/netrom/af_netrom.c:433 [<000000000d803d9e>] __sock_create+0x1ab/0x2b0 net/socket.c:1427 [<0000000089fab2bd>] sock_create net/socket.c:1478 [inline] [<0000000089fab2bd>] __sys_socket+0x6f/0x140 net/socket.c:1520 [<00000000ad531476>] __do_sys_socket net/socket.c:1529 [inline] [<00000000ad531476>] __se_sys_socket net/socket.c:1527 [inline] [<00000000ad531476>] __x64_sys_socket+0x1a/0x20 net/socket.c:1527 [<000000005c676c7e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<00000000ff80adc9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9