BUG: memory leak unreferenced object 0xffff8881204ad960 (size 48): comm "syz-executor.4", pid 6459, jiffies 4294947578 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 46 00 00 03 00 00 00 .........F...... 00 00 00 00 00 00 00 00 80 77 c5 20 81 88 ff ff .........w. .... backtrace (crc 9667a36): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x31c/0x3f0 mm/slub.c:4204 fasync_alloc fs/fcntl.c:1018 [inline] fasync_add_entry fs/fcntl.c:1076 [inline] fasync_helper+0x3d/0xd0 fs/fcntl.c:1105 sock_fasync+0x4c/0xa0 net/socket.c:1416 ioctl_fioasync fs/ioctl.c:379 [inline] do_vfs_ioctl+0x87f/0xe60 fs/ioctl.c:821 __do_sys_ioctl fs/ioctl.c:905 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0xb7/0x140 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8881204ad9c0 (size 48): comm "syz-executor.7", pid 6466, jiffies 4294947584 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 46 00 00 03 00 00 00 .........F...... 00 00 00 00 00 00 00 00 80 4d 4b 20 81 88 ff ff .........MK .... backtrace (crc 63815d62): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x31c/0x3f0 mm/slub.c:4204 fasync_alloc fs/fcntl.c:1018 [inline] fasync_add_entry fs/fcntl.c:1076 [inline] fasync_helper+0x3d/0xd0 fs/fcntl.c:1105 sock_fasync+0x4c/0xa0 net/socket.c:1416 ioctl_fioasync fs/ioctl.c:379 [inline] do_vfs_ioctl+0x87f/0xe60 fs/ioctl.c:821 __do_sys_ioctl fs/ioctl.c:905 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0xb7/0x140 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811fb90c90 (size 48): comm "syz-executor.4", pid 6471, jiffies 4294947585 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 46 00 00 03 00 00 00 .........F...... 00 00 00 00 00 00 00 00 00 49 4b 20 81 88 ff ff .........IK .... backtrace (crc 2e64099b): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x31c/0x3f0 mm/slub.c:4204 fasync_alloc fs/fcntl.c:1018 [inline] fasync_add_entry fs/fcntl.c:1076 [inline] fasync_helper+0x3d/0xd0 fs/fcntl.c:1105 sock_fasync+0x4c/0xa0 net/socket.c:1416 ioctl_fioasync fs/ioctl.c:379 [inline] do_vfs_ioctl+0x87f/0xe60 fs/ioctl.c:821 __do_sys_ioctl fs/ioctl.c:905 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0xb7/0x140 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811fb90e40 (size 48): comm "syz-executor.7", pid 6477, jiffies 4294947595 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 46 00 00 03 00 00 00 .........F...... 00 00 00 00 00 00 00 00 c0 19 9e 08 81 88 ff ff ................ backtrace (crc 945e6a1f): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x31c/0x3f0 mm/slub.c:4204 fasync_alloc fs/fcntl.c:1018 [inline] fasync_add_entry fs/fcntl.c:1076 [inline] fasync_helper+0x3d/0xd0 fs/fcntl.c:1105 sock_fasync+0x4c/0xa0 net/socket.c:1416 ioctl_fioasync fs/ioctl.c:379 [inline] do_vfs_ioctl+0x87f/0xe60 fs/ioctl.c:821 __do_sys_ioctl fs/ioctl.c:905 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0xb7/0x140 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811d6cb090 (size 48): comm "syz-executor.7", pid 6492, jiffies 4294947605 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 46 00 00 03 00 00 00 .........F...... 00 00 00 00 00 00 00 00 c0 7c c5 20 81 88 ff ff .........|. .... backtrace (crc 59e6fa98): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x31c/0x3f0 mm/slub.c:4204 fasync_alloc fs/fcntl.c:1018 [inline] fasync_add_entry fs/fcntl.c:1076 [inline] fasync_helper+0x3d/0xd0 fs/fcntl.c:1105 sock_fasync+0x4c/0xa0 net/socket.c:1416 ioctl_fioasync fs/ioctl.c:379 [inline] do_vfs_ioctl+0x87f/0xe60 fs/ioctl.c:821 __do_sys_ioctl fs/ioctl.c:905 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0xb7/0x140 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f