BUG: memory leak unreferenced object 0xffff888122795000 (size 2048): comm "syz-executor370", pid 9471, jiffies 4294981420 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace (crc bd251687): [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slub.c:3802 [inline] [] slab_alloc_node mm/slub.c:3845 [inline] [] __do_kmalloc_node mm/slub.c:3965 [inline] [] __kmalloc+0x2ce/0x410 mm/slub.c:3979 [] kmalloc include/linux/slab.h:632 [inline] [] sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2080 [] sk_alloc+0x36/0x2f0 net/core/sock.c:2133 [] nr_create+0x84/0x1c0 net/netrom/af_netrom.c:438 [] __sock_create+0x1a5/0x2e0 net/socket.c:1571 [] sock_create net/socket.c:1622 [inline] [] __sys_socket_create net/socket.c:1659 [inline] [] __sys_socket+0xbb/0x1a0 net/socket.c:1706 [] __do_sys_socket net/socket.c:1720 [inline] [] __se_sys_socket net/socket.c:1718 [inline] [] __x64_sys_socket+0x1b/0x30 net/socket.c:1718 [] do_syscall_x64 arch/x86/entry/common.c:52 [inline] [] do_syscall_64+0xa0/0x1d0 arch/x86/entry/common.c:83 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888110359ed0 (size 16): comm "syz-executor370", pid 9471, jiffies 4294981420 hex dump (first 16 bytes): 00 a3 86 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 32c62c02): [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slub.c:3802 [inline] [] slab_alloc_node mm/slub.c:3845 [inline] [] kmalloc_trace+0x282/0x330 mm/slub.c:3992 [] kmalloc include/linux/slab.h:628 [inline] [] kzalloc include/linux/slab.h:749 [inline] [] apparmor_sk_alloc_security+0x52/0xd0 security/apparmor/lsm.c:1064 [] security_sk_alloc+0x4a/0x90 security/security.c:4662 [] sk_prot_alloc+0x135/0x1b0 net/core/sock.c:2083 [] sk_alloc+0x36/0x2f0 net/core/sock.c:2133 [] nr_create+0x84/0x1c0 net/netrom/af_netrom.c:438 [] __sock_create+0x1a5/0x2e0 net/socket.c:1571 [] sock_create net/socket.c:1622 [inline] [] __sys_socket_create net/socket.c:1659 [inline] [] __sys_socket+0xbb/0x1a0 net/socket.c:1706 [] __do_sys_socket net/socket.c:1720 [inline] [] __se_sys_socket net/socket.c:1718 [inline] [] __x64_sys_socket+0x1b/0x30 net/socket.c:1718 [] do_syscall_x64 arch/x86/entry/common.c:52 [inline] [] do_syscall_64+0xa0/0x1d0 arch/x86/entry/common.c:83 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88812005f000 (size 2048): comm "syz-executor370", pid 9601, jiffies 4294981686 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace (crc f34b4e): [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slub.c:3802 [inline] [] slab_alloc_node mm/slub.c:3845 [inline] [] __do_kmalloc_node mm/slub.c:3965 [inline] [] __kmalloc+0x2ce/0x410 mm/slub.c:3979 [] kmalloc include/linux/slab.h:632 [inline] [] sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2080 [] sk_alloc+0x36/0x2f0 net/core/sock.c:2133 [] nr_create+0x84/0x1c0 net/netrom/af_netrom.c:438 [] __sock_create+0x1a5/0x2e0 net/socket.c:1571 [] sock_create net/socket.c:1622 [inline] [] __sys_socket_create net/socket.c:1659 [inline] [] __sys_socket+0xbb/0x1a0 net/socket.c:1706 [] __do_sys_socket net/socket.c:1720 [inline] [] __se_sys_socket net/socket.c:1718 [inline] [] __x64_sys_socket+0x1b/0x30 net/socket.c:1718 [] do_syscall_x64 arch/x86/entry/common.c:52 [inline] [] do_syscall_64+0xa0/0x1d0 arch/x86/entry/common.c:83 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888110359ad0 (size 16): comm "syz-executor370", pid 9601, jiffies 4294981686 hex dump (first 16 bytes): 00 a3 86 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 32c62c02): [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slub.c:3802 [inline] [] slab_alloc_node mm/slub.c:3845 [inline] [] kmalloc_trace+0x282/0x330 mm/slub.c:3992 [] kmalloc include/linux/slab.h:628 [inline] [] kzalloc include/linux/slab.h:749 [inline] [] apparmor_sk_alloc_security+0x52/0xd0 security/apparmor/lsm.c:1064 [] security_sk_alloc+0x4a/0x90 security/security.c:4662 [] sk_prot_alloc+0x135/0x1b0 net/core/sock.c:2083 [] sk_alloc+0x36/0x2f0 net/core/sock.c:2133 [] nr_create+0x84/0x1c0 net/netrom/af_netrom.c:438 [] __sock_create+0x1a5/0x2e0 net/socket.c:1571 [] sock_create net/socket.c:1622 [inline] [] __sys_socket_create net/socket.c:1659 [inline] [] __sys_socket+0xbb/0x1a0 net/socket.c:1706 [] __do_sys_socket net/socket.c:1720 [inline] [] __se_sys_socket net/socket.c:1718 [inline] [] __x64_sys_socket+0x1b/0x30 net/socket.c:1718 [] do_syscall_x64 arch/x86/entry/common.c:52 [inline] [] do_syscall_64+0xa0/0x1d0 arch/x86/entry/common.c:83 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888122792800 (size 2048): comm "syz-executor370", pid 9664, jiffies 4294981837 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace (crc 1bacc942): [] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline] [] slab_post_alloc_hook mm/slub.c:3802 [inline] [] slab_alloc_node mm/slub.c:3845 [inline] [] __do_kmalloc_node mm/slub.c:3965 [inline] [] __kmalloc+0x2ce/0x410 mm/slub.c:3979 [] kmalloc include/linux/slab.h:632 [inline] [] sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2080 [] sk_alloc+0x36/0x2f0 net/core/sock.c:2133 [] nr_create+0x84/0x1c0 net/netrom/af_netrom.c:438 [] __sock_create+0x1a5/0x2e0 net/socket.c:1571 [] sock_create net/socket.c:1622 [inline] [] __sys_socket_create net/socket.c:1659 [inline] [] __sys_socket+0xbb/0x1a0 net/socket.c:1706 [] __do_sys_socket net/socket.c:1720 [inline] [] __se_sys_socket net/socket.c:1718 [inline] [] __x64_sys_socket+0x1b/0x30 net/socket.c:1718 [] do_syscall_x64 arch/x86/entry/common.c:52 [inline] [] do_syscall_64+0xa0/0x1d0 arch/x86/entry/common.c:83 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f