BUG: memory leak
unreferenced object 0xffff888221a73dc0 (size 32):
  comm "syz-executor.2", pid 4443, jiffies 4294942570 (age 9.320s)
  hex dump (first 32 bytes):
    00 00 49 21 82 88 ff ff 00 00 00 00 00 00 00 00  ..I!............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003a7fd35a>] __kmalloc+0x10f/0x2a0
    [<00000000739a6cfb>] packet_set_ring+0x235/0x8e0
    [<000000009382c3c8>] packet_setsockopt+0x273/0x11b0
    [<00000000237ea043>] __sys_setsockopt+0x9d/0x130
    [<00000000d8d1095d>] __x64_sys_setsockopt+0x23/0x30
    [<000000007ea2cc30>] do_syscall_64+0x76/0x1a0
    [<000000007be5249e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8882214275e0 (size 32):
  comm "syz-executor.3", pid 4459, jiffies 4294942576 (age 9.260s)
  hex dump (first 32 bytes):
    00 00 4c 21 82 88 ff ff 00 00 00 00 00 00 00 00  ..L!............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003a7fd35a>] __kmalloc+0x10f/0x2a0
    [<00000000739a6cfb>] packet_set_ring+0x235/0x8e0
    [<000000009382c3c8>] packet_setsockopt+0x273/0x11b0
    [<00000000237ea043>] __sys_setsockopt+0x9d/0x130
    [<00000000d8d1095d>] __x64_sys_setsockopt+0x23/0x30
    [<000000007ea2cc30>] do_syscall_64+0x76/0x1a0
    [<000000007be5249e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888221a734c0 (size 32):
  comm "syz-executor.2", pid 4457, jiffies 4294942577 (age 9.250s)
  hex dump (first 32 bytes):
    00 00 4d 21 82 88 ff ff 00 00 00 00 00 00 00 00  ..M!............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003a7fd35a>] __kmalloc+0x10f/0x2a0
    [<00000000739a6cfb>] packet_set_ring+0x235/0x8e0
    [<000000009382c3c8>] packet_setsockopt+0x273/0x11b0
    [<00000000237ea043>] __sys_setsockopt+0x9d/0x130
    [<00000000d8d1095d>] __x64_sys_setsockopt+0x23/0x30
    [<000000007ea2cc30>] do_syscall_64+0x76/0x1a0
    [<000000007be5249e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8882214273a0 (size 32):
  comm "syz-executor.2", pid 4462, jiffies 4294942593 (age 9.090s)
  hex dump (first 32 bytes):
    00 00 54 21 82 88 ff ff 00 00 00 00 00 00 00 00  ..T!............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003a7fd35a>] __kmalloc+0x10f/0x2a0
    [<00000000739a6cfb>] packet_set_ring+0x235/0x8e0
    [<000000009382c3c8>] packet_setsockopt+0x273/0x11b0
    [<00000000237ea043>] __sys_setsockopt+0x9d/0x130
    [<00000000d8d1095d>] __x64_sys_setsockopt+0x23/0x30
    [<000000007ea2cc30>] do_syscall_64+0x76/0x1a0
    [<000000007be5249e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888221a73600 (size 32):
  comm "syz-executor.3", pid 4463, jiffies 4294942593 (age 9.090s)
  hex dump (first 32 bytes):
    00 00 55 21 82 88 ff ff 00 00 00 00 00 00 00 00  ..U!............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003a7fd35a>] __kmalloc+0x10f/0x2a0
    [<00000000739a6cfb>] packet_set_ring+0x235/0x8e0
    [<000000009382c3c8>] packet_setsockopt+0x273/0x11b0
    [<00000000237ea043>] __sys_setsockopt+0x9d/0x130
    [<00000000d8d1095d>] __x64_sys_setsockopt+0x23/0x30
    [<000000007ea2cc30>] do_syscall_64+0x76/0x1a0
    [<000000007be5249e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888221da4c00 (size 32):
  comm "syz-executor.2", pid 4487, jiffies 4294942613 (age 8.890s)
  hex dump (first 32 bytes):
    00 00 51 21 82 88 ff ff 00 00 00 00 00 00 00 00  ..Q!............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003a7fd35a>] __kmalloc+0x10f/0x2a0
    [<00000000739a6cfb>] packet_set_ring+0x235/0x8e0
    [<000000009382c3c8>] packet_setsockopt+0x273/0x11b0
    [<00000000237ea043>] __sys_setsockopt+0x9d/0x130
    [<00000000d8d1095d>] __x64_sys_setsockopt+0x23/0x30
    [<000000007ea2cc30>] do_syscall_64+0x76/0x1a0
    [<000000007be5249e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

