$ sudo bash ~/test.sh unreferenced object 0xffff88003753ea40 (size 1024): comm "apparmor_parser", pid 4695, jiffies 4294976630 (age 16.305s) hex dump (first 32 bytes): 64 25 fe 25 00 88 ff ff 64 25 fe 25 00 88 ff ff d%.%....d%.%.... e0 f4 af 38 00 88 ff ff 00 02 20 00 00 00 ad de ...8...... ..... backtrace: [] kmemleak_alloc+0x4e/0xc0 [] kmem_cache_alloc_trace+0x190/0x2b0 [] aa_alloc_profile+0x25/0x90 [] aa_unpack+0x420/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff880025857dd0 (size 96): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.304s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 d7 9a 31 00 88 ff ff ...........1.... d0 d2 9a 31 00 88 ff ff f8 e4 53 37 00 88 ff ff ...1......S7.... backtrace: [] kmemleak_alloc+0x4e/0xc0 [] kmem_cache_alloc_trace+0x190/0x2b0 [] aa_dfa_unpack+0x44/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x95e/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff8800319ad708 (size 32): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.304s) hex dump (first 32 bytes): 00 00 04 00 78 bd ff 25 05 00 00 00 00 00 00 00 ....x..%........ 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x95e/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff8800319ad168 (size 32): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.304s) hex dump (first 32 bytes): 06 00 04 00 78 bd ff 25 05 00 00 00 00 00 00 00 ....x..%........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x95e/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff8800319ad9d8 (size 32): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.329s) hex dump (first 32 bytes): 03 00 02 00 78 bd ff 25 05 00 00 00 00 00 00 00 ....x..%........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x95e/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff88003753dfb0 (size 1024): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.330s) hex dump (first 32 bytes): 07 00 02 00 78 bd ff 25 01 01 00 00 00 00 04 00 ....x..%........ 02 00 00 00 02 00 00 00 00 00 02 00 00 00 02 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x95e/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff88003753e4f8 (size 1024): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.330s) hex dump (first 32 bytes): 02 00 02 00 78 bd ff 25 01 01 00 00 00 00 03 00 ....x..%........ 01 00 00 00 01 00 00 00 00 00 01 00 00 00 01 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x95e/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff880025856d40 (size 96): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.330s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 88 d1 34 27 00 88 ff ff ..........4'.... b8 ca 63 28 00 88 ff ff 88 ef 53 37 00 88 ff ff ..c(......S7.... backtrace: [] kmemleak_alloc+0x4e/0xc0 [] kmem_cache_alloc_trace+0x190/0x2b0 [] aa_dfa_unpack+0x44/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff88002734d188 (size 64): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.352s) hex dump (first 32 bytes): 00 00 04 00 78 bd ff 25 06 00 00 00 00 00 00 00 ....x..%........ 00 00 00 00 7f c2 9f 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff880025497930 (size 64): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.352s) hex dump (first 32 bytes): 06 00 04 00 78 bd ff 25 06 00 00 00 00 00 00 00 ....x..%........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff88002863cab8 (size 64): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.352s) hex dump (first 32 bytes): 01 00 04 00 78 bd ff 25 06 00 00 00 00 00 00 00 ....x..%........ 00 00 00 00 01 00 00 00 01 00 00 00 02 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff8800319adca8 (size 32): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.352s) hex dump (first 32 bytes): 03 00 02 00 78 bd ff 25 06 00 00 00 00 00 00 00 ....x..%........ 02 00 00 00 05 00 05 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff88003753da68 (size 1024): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.376s) hex dump (first 32 bytes): 07 00 02 00 78 bd ff 25 02 01 00 00 00 00 03 00 ....x..%........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff88003753ef88 (size 1024): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.376s) hex dump (first 32 bytes): 02 00 02 00 78 bd ff 25 02 01 00 00 00 00 02 00 ....x..%........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_kvmalloc+0x4b/0x70 [] aa_dfa_unpack+0x154/0x4d0 [] unpack_dfa+0x91/0xb0 [] aa_unpack+0x70a/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff8800319adb40 (size 32): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.376s) hex dump (first 32 bytes): b7 6a 80 7e 48 f1 bd 34 2b ef 01 c2 e1 2c 9c 33 .j.~H..4+....,.3 9f 75 c9 85 00 00 00 00 00 00 00 00 00 00 00 00 .u.............. backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] aa_calc_profile_hash+0x6c/0x140 [] aa_unpack+0x315/0xde0 [] aa_replace_profiles+0x3c/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff unreferenced object 0xffff880027371540 (size 8): comm "apparmor_parser", pid 4695, jiffies 4294976631 (age 16.376s) hex dump (first 8 bytes): 74 65 73 74 2e 32 31 00 test.21. backtrace: [] kmemleak_alloc+0x4e/0xc0 [] __kmalloc+0x1b0/0x300 [] __aa_fs_profile_mkdir+0x2de/0x390 [] aa_replace_profiles+0x802/0x1530 [] profile_load+0x3a/0x60 [] vfs_write+0xba/0x210 [] SyS_write+0x4d/0xc0 [] system_call_fastpath+0x16/0x1b [] 0xffffffffffffffff