BUG: memory leak unreferenced object 0xffff888116a9b840 (size 1504): comm "syz-executor.1", pid 3789, jiffies 4294975460 (age 10.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917 [] sk_alloc+0x32/0x2e0 net/core/sock.c:1976 [] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:240 [] __smc_create net/smc/af_smc.c:2873 [inline] [] smc_create+0x89/0x180 net/smc/af_smc.c:2904 [] __sock_create+0x1ab/0x2b0 net/socket.c:1468 [] sock_create net/socket.c:1519 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1561 [] __do_sys_socket net/socket.c:1570 [inline] [] __se_sys_socket net/socket.c:1568 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1568 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810c14cd80 (size 32): comm "syz-executor.1", pid 3789, jiffies 4294975460 (age 10.370s) hex dump (first 32 bytes): b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:581 [inline] [] kzalloc include/linux/slab.h:715 [inline] [] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792 [] security_sk_alloc+0x31/0x70 security/security.c:2266 [] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926 [] sk_alloc+0x32/0x2e0 net/core/sock.c:1976 [] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:240 [] __smc_create net/smc/af_smc.c:2873 [inline] [] smc_create+0x89/0x180 net/smc/af_smc.c:2904 [] __sock_create+0x1ab/0x2b0 net/socket.c:1468 [] sock_create net/socket.c:1519 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1561 [] __do_sys_socket net/socket.c:1570 [inline] [] __se_sys_socket net/socket.c:1568 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1568 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888116a9b240 (size 1504): comm "syz-executor.1", pid 3792, jiffies 4294975481 (age 10.160s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917 [] sk_alloc+0x32/0x2e0 net/core/sock.c:1976 [] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:240 [] __smc_create net/smc/af_smc.c:2873 [inline] [] smc_create+0x89/0x180 net/smc/af_smc.c:2904 [] __sock_create+0x1ab/0x2b0 net/socket.c:1468 [] sock_create net/socket.c:1519 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1561 [] __do_sys_socket net/socket.c:1570 [inline] [] __se_sys_socket net/socket.c:1568 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1568 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888117441320 (size 32): comm "syz-executor.1", pid 3792, jiffies 4294975481 (age 10.160s) hex dump (first 32 bytes): b0 2e 04 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:581 [inline] [] kzalloc include/linux/slab.h:715 [inline] [] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:792 [] security_sk_alloc+0x31/0x70 security/security.c:2266 [] sk_prot_alloc+0x95/0x1b0 net/core/sock.c:1926 [] sk_alloc+0x32/0x2e0 net/core/sock.c:1976 [] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:240 [] __smc_create net/smc/af_smc.c:2873 [inline] [] smc_create+0x89/0x180 net/smc/af_smc.c:2904 [] __sock_create+0x1ab/0x2b0 net/socket.c:1468 [] sock_create net/socket.c:1519 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1561 [] __do_sys_socket net/socket.c:1570 [inline] [] __se_sys_socket net/socket.c:1568 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1568 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888116a9ac40 (size 1504): comm "syz-executor.1", pid 3795, jiffies 4294975490 (age 10.070s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [] sk_prot_alloc+0x3e/0x1b0 net/core/sock.c:1917 [] sk_alloc+0x32/0x2e0 net/core/sock.c:1976 [] smc_sock_alloc+0x51/0x1a0 net/smc/af_smc.c:240 [] __smc_create net/smc/af_smc.c:2873 [inline] [] smc_create+0x89/0x180 net/smc/af_smc.c:2904 [] __sock_create+0x1ab/0x2b0 net/socket.c:1468 [] sock_create net/socket.c:1519 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1561 [] __do_sys_socket net/socket.c:1570 [inline] [] __se_sys_socket net/socket.c:1568 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1568 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae