BUG: memory leak unreferenced object 0xffff88811bb75400 (size 1024): comm "syz-executor.6", pid 6662, jiffies 4294943226 (age 13.130s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000772c66d0>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000772c66d0>] slab_post_alloc_hook mm/slab.h:531 [inline] [<00000000772c66d0>] slab_alloc mm/slab.c:3314 [inline] [<00000000772c66d0>] __do_kmalloc mm/slab.c:3655 [inline] [<00000000772c66d0>] __kmalloc+0x1e5/0x3d0 mm/slab.c:3666 [<00000000bbd1858b>] kmalloc_array include/linux/slab.h:594 [inline] [<00000000bbd1858b>] kcalloc include/linux/slab.h:605 [inline] [<00000000bbd1858b>] veth_alloc_queues drivers/net/veth.c:1025 [inline] [<00000000bbd1858b>] veth_dev_init+0x81/0x130 drivers/net/veth.c:1052 [<000000006f7650c6>] register_netdevice+0x14d/0x790 net/core/dev.c:9894 [<00000000eba33d9e>] veth_newlink+0x2af/0x490 drivers/net/veth.c:1386 [<0000000090b954fa>] __rtnl_newlink+0x94f/0xc40 net/core/rtnetlink.c:3441 [<00000000bb4f4dc7>] rtnl_newlink+0x4e/0x80 net/core/rtnetlink.c:3500 [<0000000005432d61>] rtnetlink_rcv_msg+0x188/0x470 net/core/rtnetlink.c:5563 [<0000000069f5b067>] netlink_rcv_skb+0x68/0x170 net/netlink/af_netlink.c:2494 [<0000000008754724>] rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5581 [<00000000c5e17527>] netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] [<00000000c5e17527>] netlink_unicast+0x2f9/0x430 net/netlink/af_netlink.c:1330 [<000000005deb8be0>] netlink_sendmsg+0x2bd/0x570 net/netlink/af_netlink.c:1919 [<000000003bb3d0e1>] sock_sendmsg_nosec net/socket.c:651 [inline] [<000000003bb3d0e1>] sock_sendmsg+0x54/0x70 net/socket.c:671 [<00000000f684689f>] __sys_sendto+0x148/0x1f0 net/socket.c:1992 [<00000000bec0c7f7>] __do_sys_sendto net/socket.c:2004 [inline] [<00000000bec0c7f7>] __se_sys_sendto net/socket.c:2000 [inline] [<00000000bec0c7f7>] __x64_sys_sendto+0x2a/0x40 net/socket.c:2000 [<0000000072444387>] do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 [<0000000026c484da>] entry_SYSCALL_64_after_hwframe+0x44/0xa9