udit: type=1400 audit(1567746315.633:36): avc: denied { map } for pid=6944 comm="syz-executor031" path="/root/syz-executor031878532" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program BUG: memory leak unreferenced object 0xffff888112a74380 (size 64): comm "syz-executor031", pid 6947, jiffies 4294941324 (age 12.430s) hex dump (first 32 bytes): 21 4e 00 00 65 6d 64 31 00 00 00 00 00 00 00 00 !N..emd1........ e8 54 e1 24 81 88 ff ff 00 00 00 00 00 00 00 00 .T.$............ backtrace: [<00000000c44048cb>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000c44048cb>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000c44048cb>] slab_alloc mm/slab.c:3319 [inline] [<00000000c44048cb>] kmem_cache_alloc+0x13f/0x2c0 mm/slab.c:3483 [<00000000aca76fef>] sctp_bucket_create net/sctp/socket.c:8374 [inline] [<00000000aca76fef>] sctp_get_port_local+0x189/0x5b0 net/sctp/socket.c:8121 [<00000000223d442b>] sctp_do_bind+0xcc/0x1e0 net/sctp/socket.c:402 [<000000003ed6369c>] sctp_bind+0x44/0x70 net/sctp/socket.c:302 [<000000001d674639>] inet6_bind+0x40/0xb7 net/ipv6/af_inet6.c:441 [<00000000a7fb7c15>] __sys_bind+0x11c/0x140 net/socket.c:1647 [<00000000fe96f2e5>] __do_sys_bind net/socket.c:1658 [inline] [<00000000fe96f2e5>] __se_sys_bind net/socket.c:1656 [inline] [<00000000fe96f2e5>] __x64_sys_bind+0x1e/0x30 net/socket.c:1656 [<000000008fadb446>] do_syscall_64+0x76/0x1a0 arch/x86/entry/common.c:296 [<00000000fec90eb6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9