[ 41.780857][ T24] audit: type=1400 audit(1558879116.371:35): avc: denied { map } for pid=7077 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. [ 61.808122][ T24] audit: type=1400 audit(1558879136.401:36): avc: denied { map } for pid=7089 comm="syz-executor688" path="/root/syz-executor688743819" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 68.555604][ T7090] IPVS: ftp: loaded support on port[0] = 21 [ 68.572380][ T7090] chnl_net:caif_netlink_parms(): no params data found [ 68.584028][ T7090] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.591049][ T7090] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.598289][ T7090] device bridge_slave_0 entered promiscuous mode [ 68.605309][ T7090] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.612430][ T7090] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.619724][ T7090] device bridge_slave_1 entered promiscuous mode [ 68.628584][ T7090] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 68.637504][ T7090] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 68.648154][ T7090] team0: Port device team_slave_0 added [ 68.653986][ T7090] team0: Port device team_slave_1 added [ 68.684529][ T7090] device hsr_slave_0 entered promiscuous mode [ 68.743975][ T7090] device hsr_slave_1 entered promiscuous mode [ 68.796010][ T7090] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.803166][ T7090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.810408][ T7090] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.817429][ T7090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.831619][ T7090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.839609][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.847275][ T3040] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.854800][ T3040] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.862031][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 68.871051][ T7090] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.888930][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.897095][ T2911] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.904125][ T2911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.913943][ T7092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.922077][ T7092] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.929096][ T7092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.937328][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.945672][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.955430][ T7090] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.965848][ T7090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.977035][ T7092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.985087][ T7092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready executing program [ 68.992963][ T7092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.001086][ T7092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.010642][ T7090] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program [ 75.221327][ T7090] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881179f2e80 (size 64): comm "softirq", pid 0, jiffies 4294944178 (age 12.410s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 ac 14 14 bb 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000006d936c91>] kmem_cache_alloc_trace+0x13d/0x280 [<000000005f756262>] ip_mc_add_src+0x36b/0x400 [<00000000eabe99ea>] ip_mc_msfilter+0x22d/0x310 [<00000000d0b9cef2>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<00000000548a72be>] ip_setsockopt+0x3b/0xb0 [<00000000e112b358>] udp_setsockopt+0x4e/0x90 [<0000000061131103>] sock_common_setsockopt+0x38/0x50 [<000000000d9667ac>] __sys_setsockopt+0x98/0x120 [<000000008a450bba>] __x64_sys_setsockopt+0x26/0x30 [<000000003fc9ea51>] do_syscall_64+0x76/0x1a0 [<0000000066a7d410>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179f2ec0 (size 64): comm "softirq", pid 0, jiffies 4294944178 (age 12.410s) hex dump (first 32 bytes): 80 2e 9f 17 81 88 ff ff 7f 00 00 01 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000006d936c91>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000345da524>] ip_mc_add_src+0x29c/0x400 [<00000000eabe99ea>] ip_mc_msfilter+0x22d/0x310 [<00000000d0b9cef2>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<00000000548a72be>] ip_setsockopt+0x3b/0xb0 [<00000000e112b358>] udp_setsockopt+0x4e/0x90 [<0000000061131103>] sock_common_setsockopt+0x38/0x50 [<000000000d9667ac>] __sys_setsockopt+0x98/0x120 [<000000008a450bba>] __x64_sys_setsockopt+0x26/0x30 [<000000003fc9ea51>] do_syscall_64+0x76/0x1a0 [<0000000066a7d410>] entry_SYSCALL_64_after_hwframe+0x44/0xa9