Warning: Permanently added '10.128.10.60' (ECDSA) to the list of known hosts. [ 39.026719][ T24] audit: type=1400 audit(1569466749.020:62): avc: denied { map } for pid=6849 comm="syz-executor570" path="/root/syz-executor570793305" dev="sda1" ino=16503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 56.342449][ T6849] kmemleak: 378 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888121f97500 (size 224): comm "syz-executor570", pid 6850, jiffies 4294941845 (age 12.580s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 be 2a 81 88 ff ff 00 d8 f5 1a 81 88 ff ff .P.*............ backtrace: [<00000000a3186448>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000014d658c9>] __alloc_skb+0x6e/0x210 [<0000000029225753>] alloc_skb_with_frags+0x5f/0x250 [<00000000e4930db9>] sock_alloc_send_pskb+0x269/0x2a0 [<000000006dc66607>] sock_alloc_send_skb+0x32/0x40 [<00000000c0ba19eb>] llc_ui_sendmsg+0x10a/0x540 [<0000000024835a3c>] sock_sendmsg+0x54/0x70 [<000000009551ed0d>] ___sys_sendmsg+0x194/0x3c0 [<0000000093e469e0>] __sys_sendmmsg+0xf4/0x270 [<00000000e5dc9087>] __x64_sys_sendmmsg+0x28/0x30 [<00000000a3915f42>] do_syscall_64+0x73/0x1f0 [<000000007224c870>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121f97400 (size 224): comm "syz-executor570", pid 6850, jiffies 4294941845 (age 12.580s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 be 2a 81 88 ff ff 00 d8 f5 1a 81 88 ff ff .P.*............ backtrace: [<00000000a3186448>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000014d658c9>] __alloc_skb+0x6e/0x210 [<0000000029225753>] alloc_skb_with_frags+0x5f/0x250 [<00000000e4930db9>] sock_alloc_send_pskb+0x269/0x2a0 [<000000006dc66607>] sock_alloc_send_skb+0x32/0x40 [<00000000c0ba19eb>] llc_ui_sendmsg+0x10a/0x540 [<0000000024835a3c>] sock_sendmsg+0x54/0x70 [<000000009551ed0d>] ___sys_sendmsg+0x194/0x3c0 [<0000000093e469e0>] __sys_sendmmsg+0xf4/0x270 [<00000000e5dc9087>] __x64_sys_sendmmsg+0x28/0x30 [<00000000a3915f42>] do_syscall_64+0x73/0x1f0 [<000000007224c870>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811f52a600 (size 512): comm "syz-executor570", pid 6850, jiffies 4294941845 (age 12.580s) hex dump (first 32 bytes): 01 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 c0 c0 bf 81 03 00 00 00 00 00 00 00 ................ backtrace: [<000000009d49dc3e>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000bb8a7b3c>] __kmalloc_node_track_caller+0x38/0x50 [<0000000044f5fed1>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000786cd49e>] __alloc_skb+0xa0/0x210 [<0000000029225753>] alloc_skb_with_frags+0x5f/0x250 [<00000000e4930db9>] sock_alloc_send_pskb+0x269/0x2a0 [<000000006dc66607>] sock_alloc_send_skb+0x32/0x40 [<00000000c0ba19eb>] llc_ui_sendmsg+0x10a/0x540 [<0000000024835a3c>] sock_sendmsg+0x54/0x70 [<000000009551ed0d>] ___sys_sendmsg+0x194/0x3c0 [<0000000093e469e0>] __sys_sendmmsg+0xf4/0x270 [<00000000e5dc9087>] __x64_sys_sendmmsg+0x28/0x30 [<00000000a3915f42>] do_syscall_64+0x73/0x1f0 [<000000007224c870>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121f97900 (size 224): comm "syz-executor570", pid 6850, jiffies 4294941845 (age 12.580s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 be 2a 81 88 ff ff 00 d8 f5 1a 81 88 ff ff .P.*............ backtrace: [<00000000a3186448>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000014d658c9>] __alloc_skb+0x6e/0x210 [<0000000029225753>] alloc_skb_with_frags+0x5f/0x250 [<00000000e4930db9>] sock_alloc_send_pskb+0x269/0x2a0 [<000000006dc66607>] sock_alloc_send_skb+0x32/0x40 [<00000000c0ba19eb>] llc_ui_sendmsg+0x10a/0x540 [<0000000024835a3c>] sock_sendmsg+0x54/0x70 [<000000009551ed0d>] ___sys_sendmsg+0x194/0x3c0 [<0000000093e469e0>] __sys_sendmmsg+0xf4/0x270 [<00000000e5dc9087>] __x64_sys_sendmmsg+0x28/0x30 [<00000000a3915f42>] do_syscall_64+0x73/0x1f0 [<000000007224c870>] entry_SYSCALL_64_after_hwframe+0x44/0xa9