echo scan > /sys/kernel/debug/kmemleak xx__-> X..... 01 00 00 00 02 00 00 00 98 b0 63 02 00 00 11 ff ..........c..... backtrace (crc ac39cd7): __kmalloc_cache_noprof+0x463/0x620 nfc_allocate_device+0x131/0x590 nci_allocate_device+0x202/0x3b0 virtual_ncidev_open+0x6a/0x1f0 misc_open+0x1f1/0x3b0 chrdev_open+0x1e8/0x5d0 do_dentry_open+0x3f9/0x12f0 vfs_open+0x7a/0x440 do_open+0x659/0xd80 path_openat+0x1d0/0x3b0 do_file_open+0x1d2/0x460 do_sys_openat2+0xde/0x170 __x64_sys_openat+0x10e/0x210 do_syscall_64+0x117/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xff1100000263b098 (size 8): comm "nci_dev", pid 3985, jiffies 4295428094 hex dump (first 8 bytes): 6e 66 63 30 00 cc cc cc nfc0.... backtrace (crc 6f6e77d9): __kmalloc_node_track_caller_noprof+0x518/0x760 kvasprintf+0xb0/0x130 kobject_set_name_vargs+0x48/0x110 dev_set_name+0xb5/0xe0 nfc_allocate_device+0x1c4/0x590 nci_allocate_device+0x202/0x3b0 virtual_ncidev_open+0x6a/0x1f0 misc_open+0x1f1/0x3b0 chrdev_open+0x1e8/0x5d0 do_dentry_open+0x3f9/0x12f0 vfs_open+0x7a/0x440 do_open+0x659/0xd80 path_openat+0x1d0/0x3b0 do_file_open+0x1d2/0x460 do_sys_openat2+0xde/0x170 __x64_sys_openat+0x10e/0x210 unreferenced object 0xff11000015798800 (size 512): comm "nci_dev", pid 3985, jiffies 4295428095 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 80 61 b3 ff ff ff ff ........`.a..... backtrace (crc ad36fb5f): __kmalloc_cache_noprof+0x463/0x620 device_add+0x602/0x1080 nfc_register_device+0x36/0x210 nci_register_device+0x7c9/0xb30 virtual_ncidev_open+0x130/0x1f0 misc_open+0x1f1/0x3b0 chrdev_open+0x1e8/0x5d0 do_dentry_open+0x3f9/0x12f0 vfs_open+0x7a/0x440 do_open+0x659/0xd80 path_openat+0x1d0/0x3b0 do_file_open+0x1d2/0x460 do_sys_openat2+0xde/0x170 __x64_sys_openat+0x10e/0x210 do_syscall_64+0x117/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xff11000014e4a000 (size 2048): comm "nci_dev", pid 3985, jiffies 4295428105 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 27 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 '..@............ backtrace (crc 1620f6ee): __kmalloc_noprof+0x4db/0x730 sk_prot_alloc.isra.0+0xe4/0x1d0 sk_alloc+0x36/0x760 rawsock_create+0xd1/0x540 nfc_sock_create+0x11f/0x280 __sock_create+0x22d/0x630 __sys_socket+0x115/0x1d0 __x64_sys_socket+0x72/0xd0 do_syscall_64+0x117/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xff11000014dd1e40 (size 216): comm "nci_dev", pid 3985, jiffies 4295428105 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 a0 e4 14 00 00 11 ff ................ backtrace (crc 729f91fe): kmem_cache_alloc_node_noprof+0x492/0x630 __alloc_skb+0xde/0x5f0 alloc_skb_with_frags+0xc6/0x8f0 sock_alloc_send_pskb+0x326/0x3f0 nfc_alloc_send_skb+0x94/0x1d0 rawsock_sendmsg+0x162/0x4c0 __sys_sendto+0x265/0x390 __x64_sys_sendto+0xe4/0x1f0 do_syscall_64+0x117/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xff1100001a87a6c0 (size 640): comm "nci_dev", pid 3985, jiffies 4295428105 hex dump (first 32 bytes): 6b 6b 6b 6b 00 a4 00 0c 02 e1 03 6b 6b 6b 6b 6b kkkk.......kkkkk 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk backtrace (crc 7c40cc2a): kmem_cache_alloc_node_noprof+0x492/0x630 kmalloc_reserve+0xfd/0x2b0 __alloc_skb+0x11e/0x5f0 alloc_skb_with_frags+0xc6/0x8f0 sock_alloc_send_pskb+0x326/0x3f0 nfc_alloc_send_skb+0x94/0x1d0 rawsock_sendmsg+0x162/0x4c0 __sys_sendto+0x265/0x390 __x64_sys_sendto+0xe4/0x1f0 do_syscall_64+0x117/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->