Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. [ 137.827935][ T25] audit: type=1400 audit(1596569808.709:8): avc: denied { execmem } for pid=6488 comm="syz-executor206" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 145.148057][ T6506] FS-Cache: Duplicate cookie detected [ 145.153485][ T6506] FS-Cache: O-cookie c=00000000892df9fc [p=00000000762f6638 fl=222 nc=0 na=1] [ 145.162329][ T6506] FS-Cache: O-cookie d=00000000389f88f3 n=00000000e423e81e [ 145.169495][ T6506] FS-Cache: O-key=[10] '34323934393531373931' [ 145.175575][ T6506] FS-Cache: N-cookie c=00000000f99a1b9a [p=00000000762f6638 fl=2 nc=0 na=1] [ 145.184240][ T6506] FS-Cache: N-cookie d=00000000389f88f3 n=000000005d1025a8 [ 145.191425][ T6506] FS-Cache: N-key=[10] '34323934393531373931' [ 152.265841][ T6495] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 21.780s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 23.060s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 24.330s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 25.600s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 26.860s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 28.130s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 29.400s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881189dbce0 (size 32): comm "syz-executor206", pid 6506, jiffies 4294951791 (age 30.670s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 39 31 00 6a 65 63 74 5f 4294951791.ject_ 72 3a 64 65 76 69 63 65 5f 74 3a 73 30 00 00 00 r:device_t:s0... backtrace: [<000000005c1a014c>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000b5eca01b>] v9fs_session_init+0x5a1/0x840 [<0000000012799b28>] v9fs_mount+0x56/0x390 [<00000000c76f56a1>] legacy_get_tree+0x26/0x70 [<0000000001b2d43f>] vfs_get_tree+0x28/0xe0 [<00000000e291c028>] do_mount+0xa63/0xe40 [<00000000a57e6652>] __x64_sys_mount+0xb0/0x120 [<00000000438dd1d0>] do_syscall_64+0x4c/0xe0 [<00000000e72bb0b2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9