2020/12/10 04:09:43 executed programs: 23 2020/12/10 04:09:49 executed programs: 37 BUG: memory leak unreferenced object 0xffff888123d5fc00 (size 768): comm "syz-executor.2", pid 10736, jiffies 4294963251 (age 14.980s) hex dump (first 32 bytes): 01 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000063914f1d>] sock_alloc_inode+0x18/0x90 net/socket.c:253 [<000000001791f4a2>] alloc_inode+0x27/0x100 fs/inode.c:234 [<000000005230bb15>] new_inode_pseudo+0x13/0x70 fs/inode.c:930 [<00000000523455b5>] sock_alloc+0x18/0x90 net/socket.c:573 [<00000000b0154d3b>] __sock_create+0xb8/0x2b0 net/socket.c:1391 [<0000000023806483>] io_uring_get_fd fs/io_uring.c:9188 [inline] [<0000000023806483>] io_uring_create fs/io_uring.c:9379 [inline] [<0000000023806483>] io_uring_setup+0xcb2/0x1650 fs/io_uring.c:9413 [<000000004f736263>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000073b08441>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812591e558 (size 24): comm "syz-executor.2", pid 10736, jiffies 4294963251 (age 14.980s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000a03f0266>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<00000000a03f0266>] lsm_inode_alloc security/security.c:589 [inline] [<00000000a03f0266>] security_inode_alloc+0x2a/0xb0 security/security.c:972 [<000000001db9048c>] inode_init_always+0x10c/0x250 fs/inode.c:171 [<0000000081ce301a>] alloc_inode+0x44/0x100 fs/inode.c:241 [<000000005230bb15>] new_inode_pseudo+0x13/0x70 fs/inode.c:930 [<00000000523455b5>] sock_alloc+0x18/0x90 net/socket.c:573 [<00000000b0154d3b>] __sock_create+0xb8/0x2b0 net/socket.c:1391 [<0000000023806483>] io_uring_get_fd fs/io_uring.c:9188 [inline] [<0000000023806483>] io_uring_create fs/io_uring.c:9379 [inline] [<0000000023806483>] io_uring_setup+0xcb2/0x1650 fs/io_uring.c:9413 [<000000004f736263>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000073b08441>] entry_SYSCALL_64_after_hwframe+0x44/0xa9