[syzbot] memory leak in smc_create (2)

11 views
Skip to first unread message

syzbot

unread,
Mar 28, 2022, 4:59:27 PM3/28/22
to da...@davemloft.net, kgr...@linux.ibm.com, ku...@kernel.org, linux-...@vger.kernel.org, linux...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: ed4643521e6a Merge tag 'arm-dt-5.18' of git://git.kernel.o..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=14d17b99700000
kernel config: https://syzkaller.appspot.com/x/.config?x=8414405fa34d7154
dashboard link: https://syzkaller.appspot.com/bug?extid=6e29a053eb165bd50de5
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16431151700000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15f44cdb700000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+6e29a0...@syzkaller.appspotmail.com

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.640s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.640s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 39.860s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 39.860s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 39.860s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.700s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.700s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 39.920s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 39.920s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 39.920s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.770s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.770s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 39.990s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 39.990s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 39.990s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.830s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.830s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.050s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.050s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 40.050s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.890s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.890s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.110s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.110s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 40.110s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.960s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 40.960s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.180s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.180s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 40.180s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 41.020s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 41.020s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.250s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.250s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 40.250s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881158a5840 (size 1504):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 41.090s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888114575d80 (size 32):
comm "syz-executor131", pid 3746, jiffies 4294957877 (age 41.090s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d880 (size 1504):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.310s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888115827920 (size 32):
comm "syz-executor131", pid 3754, jiffies 4294957955 (age 40.310s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88811569d280 (size 1504):
comm "syz-executor131", pid 3753, jiffies 4294957955 (age 40.310s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:246
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2879 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2910
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae



---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Mar 29, 2022, 6:12:10 AM3/29/22
to gu...@linux.alibaba.com, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
memory leak in smc_create

BUG: memory leak
unreferenced object 0xffff8881185d3880 (size 1504):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 31.480s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881184fb3a0 (size 32):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 31.480s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3280 (size 1504):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 30.060s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888112de4e00 (size 32):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 30.060s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810aabd8c0 (size 1504):
comm "syz-executor160", pid 4208, jiffies 4294944315 (age 29.940s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3880 (size 1504):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 37.450s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881184fb3a0 (size 32):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 37.450s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3280 (size 1504):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 36.030s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888112de4e00 (size 32):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 36.030s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810aabd8c0 (size 1504):
comm "syz-executor160", pid 4208, jiffies 4294944315 (age 35.910s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3880 (size 1504):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 37.520s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881184fb3a0 (size 32):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 37.520s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3280 (size 1504):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 36.100s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888112de4e00 (size 32):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 36.100s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810aabd8c0 (size 1504):
comm "syz-executor160", pid 4208, jiffies 4294944315 (age 35.980s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3880 (size 1504):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 37.590s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881184fb3a0 (size 32):
comm "syz-executor160", pid 4196, jiffies 4294944161 (age 37.590s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881185d3280 (size 1504):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 36.170s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888112de4e00 (size 32):
comm "syz-executor160", pid 4205, jiffies 4294944303 (age 36.170s)
hex dump (first 32 bytes):
b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff821fb4e3>] kmalloc include/linux/slab.h:581 [inline]
[<ffffffff821fb4e3>] kzalloc include/linux/slab.h:714 [inline]
[<ffffffff821fb4e3>] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792
[<ffffffff821c1091>] security_sk_alloc+0x31/0x70 security/security.c:2279
[<ffffffff837cc0f5>] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810aabd8c0 (size 1504):
comm "syz-executor160", pid 4208, jiffies 4294944315 (age 36.050s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............
backtrace:
[<ffffffff837cc09e>] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917
[<ffffffff837cfcf2>] sk_alloc+0x32/0x2e0 net/core/sock.c:1976
[<ffffffff84173e61>] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:254
[<ffffffff84174e89>] __smc_create net/smc/af_smc.c:2887 [inline]
[<ffffffff84174e89>] smc_create+0x89/0x180 net/smc/af_smc.c:2918
[<ffffffff837c49cb>] __sock_create+0x1ab/0x2b0 net/socket.c:1468
[<ffffffff837c794f>] sock_create net/socket.c:1519 [inline]
[<ffffffff837c794f>] __sys_socket+0x6f/0x140 net/socket.c:1561
[<ffffffff837c7a3a>] __do_sys_socket net/socket.c:1570 [inline]
[<ffffffff837c7a3a>] __se_sys_socket net/socket.c:1568 [inline]
[<ffffffff837c7a3a>] __x64_sys_socket+0x1a/0x20 net/socket.c:1568
[<ffffffff844f9695>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<ffffffff844f9695>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae



Tested on:

commit: ed464352 Merge tag 'arm-dt-5.18' of git://git.kernel.o..
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=166e643b700000
kernel config: https://syzkaller.appspot.com/x/.config?x=8414405fa34d7154
dashboard link: https://syzkaller.appspot.com/bug?extid=6e29a053eb165bd50de5
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=128ba673700000

Tony Lu

unread,
Mar 31, 2022, 2:42:34 AM3/31/22
to syzbot, da...@davemloft.net, kgr...@linux.ibm.com, ku...@kernel.org, linux-...@vger.kernel.org, linux...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com
On Mon, Mar 28, 2022 at 01:59:26PM -0700, syzbot wrote:
> Hello,
>
> syzbot found the following issue on:
>
> HEAD commit: ed4643521e6a Merge tag 'arm-dt-5.18' of git://git.kernel.o..
> git tree: upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=14d17b99700000
> kernel config: https://syzkaller.appspot.com/x/.config?x=8414405fa34d7154
> dashboard link: https://syzkaller.appspot.com/bug?extid=6e29a053eb165bd50de5
> compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16431151700000
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15f44cdb700000
>
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+6e29a0...@syzkaller.appspotmail.com

__smc_release() does not handle it properly when it falls back and
sk_state is SMC_CLOSED but not calls sock_put(). This makes sk leaks.

I will fix it soon.

Tony Lu

syzbot

unread,
Mar 31, 2022, 5:11:27 AM3/31/22
to Tony Lu, ton...@linux.alibaba.com, syzkall...@googlegroups.com
> #syz test: upstream master

"upstream" does not look like a valid git repo address.

syzbot

unread,
Mar 31, 2022, 7:49:09 AM3/31/22
to syzkall...@googlegroups.com, ton...@linux.alibaba.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+6e29a0...@syzkaller.appspotmail.com

Tested on:

commit: 787af64d mm: page_alloc: validate buddy before check i..
git tree: upstream
kernel config: https://syzkaller.appspot.com/x/.config?x=2d9d5f86a551417e
dashboard link: https://syzkaller.appspot.com/bug?extid=6e29a053eb165bd50de5
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=156c0687700000

Note: testing is done by a robot and is best-effort only.
Reply all
Reply to author
Forward
0 new messages