Warning: Permanently added '10.128.0.122' (ECDSA) to the list of known hosts. [ 38.773381][ T25] audit: type=1400 audit(1561580838.241:36): avc: denied { map } for pid=6974 comm="syz-executor493" path="/root/syz-executor493052561" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program [ 76.732068][ T6974] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 81.687246][ T6974] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811450f140 (size 64): comm "softirq", pid 0, jiffies 4294942448 (age 32.070s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace: [<00000000c7bad083>] kmem_cache_alloc_trace+0x13d/0x280 [<000000009acc4151>] ip_mc_add_src+0x36b/0x400 [<000000004ac14566>] ip_mc_msfilter+0x22d/0x310 [<0000000052d8f995>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<000000004ee1e21f>] ip_setsockopt+0x3b/0xb0 [<0000000066cdfe74>] udp_setsockopt+0x4e/0x90 [<000000009383a786>] sock_common_setsockopt+0x38/0x50 [<00000000d8ac0c94>] __sys_setsockopt+0x98/0x120 [<000000001b1e9666>] __x64_sys_setsockopt+0x26/0x30 [<00000000420d395e>] do_syscall_64+0x76/0x1a0 [<000000007fd83a4b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810ec5ab40 (size 64): comm "softirq", pid 0, jiffies 4294943651 (age 20.040s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace: [<00000000c7bad083>] kmem_cache_alloc_trace+0x13d/0x280 [<000000009acc4151>] ip_mc_add_src+0x36b/0x400 [<000000004ac14566>] ip_mc_msfilter+0x22d/0x310 [<0000000052d8f995>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<000000004ee1e21f>] ip_setsockopt+0x3b/0xb0 [<0000000066cdfe74>] udp_setsockopt+0x4e/0x90 [<000000009383a786>] sock_common_setsockopt+0x38/0x50 [<00000000d8ac0c94>] __sys_setsockopt+0x98/0x120 [<000000001b1e9666>] __x64_sys_setsockopt+0x26/0x30 [<00000000420d395e>] do_syscall_64+0x76/0x1a0 [<000000007fd83a4b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888112a6e080 (size 64): comm "softirq", pid 0, jiffies 4294944252 (age 14.030s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ backtrace: [<00000000c7bad083>] kmem_cache_alloc_trace+0x13d/0x280 [<000000009acc4151>] ip_mc_add_src+0x36b/0x400 [<000000004ac14566>] ip_mc_msfilter+0x22d/0x310 [<0000000052d8f995>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<000000004ee1e21f>] ip_setsockopt+0x3b/0xb0 [<0000000066cdfe74>] udp_setsockopt+0x4e/0x90 [<000000009383a786>] sock_common_setsockopt+0x38/0x50 [<00000000d8ac0c94>] __sys_setsockopt+0x98/0x120 [<000000001b1e9666>] __x64_sys_setsockopt+0x26/0x30 [<00000000420d395e>] do_syscall_64+0x76/0x1a0 [<000000007fd83a4b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9