Warning: Permanently added '10.128.1.62' (ECDSA) to the list of known hosts. [ 47.342085][ T26] audit: type=1400 audit(1580683061.784:42): avc: denied { map } for pid=7176 comm="syz-executor218" path="/root/syz-executor218631881" dev="sda1" ino=2339 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 47.369637][ T26] audit: type=1400 audit(1580683061.784:43): avc: denied { integrity } for pid=7176 comm="syz-executor218" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program executing program [ 60.838098][ T7176] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881209ce040 (size 64): comm "syz-executor218", pid 7177, jiffies 4294942685 (age 13.580s) hex dump (first 32 bytes): 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 90 c9 01 00 c9 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000017d2a165>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000009eb3aa16>] snd_pcm_lib_malloc_pages+0x12b/0x200 [<00000000d6331ad0>] snd_pcm_hw_params+0x720/0x830 [<00000000fe59f889>] snd_pcm_kernel_ioctl+0xb5/0x170 [<000000008b6b0a29>] snd_pcm_oss_change_params_locked+0x745/0x1140 [<000000005c549f84>] snd_pcm_oss_change_params+0x43/0x80 [<00000000b75529f2>] snd_pcm_oss_make_ready+0x55/0xc0 [<00000000fd8faa28>] snd_pcm_oss_sync.isra.0+0x137/0x310 [<0000000061a3a74c>] snd_pcm_oss_release+0xef/0x100 [<00000000d013092f>] __fput+0xed/0x300 [<00000000f77f4249>] ____fput+0x16/0x20 [<00000000eb506b3e>] task_work_run+0x9d/0xc0 [<00000000e16956ab>] do_exit+0x3fa/0xe20 [<000000003cd0dccc>] do_group_exit+0x4b/0xe0 [<000000004ed2b0ee>] __x64_sys_exit_group+0x1c/0x20 [<00000000072c4472>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff88811a224a80 (size 64): comm "syz-executor218", pid 7177, jiffies 4294942685 (age 13.580s) hex dump (first 32 bytes): 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 a0 e9 01 00 c9 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000017d2a165>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000009eb3aa16>] snd_pcm_lib_malloc_pages+0x12b/0x200 [<00000000d6331ad0>] snd_pcm_hw_params+0x720/0x830 [<00000000fe59f889>] snd_pcm_kernel_ioctl+0xb5/0x170 [<000000008b6b0a29>] snd_pcm_oss_change_params_locked+0x745/0x1140 [<000000005c549f84>] snd_pcm_oss_change_params+0x43/0x80 [<00000000b75529f2>] snd_pcm_oss_make_ready+0x55/0xc0 [<000000005b484fbc>] snd_pcm_oss_sync.isra.0+0xb8/0x310 [<0000000061a3a74c>] snd_pcm_oss_release+0xef/0x100 [<00000000d013092f>] __fput+0xed/0x300 [<00000000f77f4249>] ____fput+0x16/0x20 [<00000000eb506b3e>] task_work_run+0x9d/0xc0 [<00000000e16956ab>] do_exit+0x3fa/0xe20 [<000000003cd0dccc>] do_group_exit+0x4b/0xe0 [<000000004ed2b0ee>] __x64_sys_exit_group+0x1c/0x20 [<00000000072c4472>] do_syscall_64+0x73/0x220