Warning: Permanently added '10.128.1.50' (ECDSA) to the list of known hosts. [ 120.954275][ T22] audit: type=1400 audit(1571477659.296:42): avc: denied { map } for pid=6854 comm="syz-executor893" path="/root/syz-executor893918928" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program [ 161.668136][ T6854] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 163.541094][ T6854] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811eb9c800 (size 2048): comm "syz-executor893", pid 6859, jiffies 4294952317 (age 13.180s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 02 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000062d6d9c2>] __kmalloc+0x169/0x300 [<000000002e405cc8>] sk_prot_alloc+0x112/0x170 [<00000000ff7601ad>] sk_alloc+0x35/0x2f0 [<0000000061c1dbf2>] llc_sk_alloc+0x35/0x170 [<00000000cd5f9d0c>] llc_ui_create+0x7b/0x150 [<0000000077e7f156>] __sock_create+0x164/0x250 [<000000004616c448>] __sys_socket+0x69/0x110 [<00000000b98b8324>] __x64_sys_socket+0x1e/0x30 [<00000000e1b79251>] do_syscall_64+0x73/0x1f0 [<00000000bd855cb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881184719a0 (size 32): comm "syz-executor893", pid 6859, jiffies 4294952317 (age 13.180s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<00000000485cb10d>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000d70f1fcb>] selinux_sk_alloc_security+0x48/0xb0 [<00000000c6410cf7>] security_sk_alloc+0x49/0x70 [<00000000dbc84b1b>] sk_prot_alloc+0x12d/0x170 [<00000000ff7601ad>] sk_alloc+0x35/0x2f0 [<0000000061c1dbf2>] llc_sk_alloc+0x35/0x170 [<00000000cd5f9d0c>] llc_ui_create+0x7b/0x150 [<0000000077e7f156>] __sock_create+0x164/0x250 [<000000004616c448>] __sys_socket+0x69/0x110 [<00000000b98b8324>] __x64_sys_socket+0x1e/0x30 [<00000000e1b79251>] do_syscall_64+0x73/0x1f0 [<00000000bd855cb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116c59800 (size 224): comm "syz-executor893", pid 6859, jiffies 4294952317 (age 13.180s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 40 e8 2a 81 88 ff ff 00 c8 b9 1e 81 88 ff ff .@.*............ backtrace: [<00000000650023ec>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000cfcd23d9>] __alloc_skb+0x6e/0x210 [<00000000f8ff32f5>] llc_alloc_frame+0x66/0x110 [<000000006268628a>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<0000000009f272d1>] llc_conn_state_process+0x1ac/0x640 [<00000000cef52fc2>] llc_establish_connection+0x110/0x170 [<00000000779adfee>] llc_ui_connect+0x10e/0x370 [<000000007b1bbac3>] __sys_connect+0x11d/0x170 [<00000000edced189>] __x64_sys_connect+0x1e/0x30 [<00000000e1b79251>] do_syscall_64+0x73/0x1f0 [<00000000bd855cb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811a478c00 (size 512): comm "syz-executor893", pid 6859, jiffies 4294952317 (age 13.180s) hex dump (first 32 bytes): 00 00 00 00 00 00 82 cc 03 8c 02 3a 00 03 00 c8 ...........:.... 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000628c4f94>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<0000000023eec4ad>] __kmalloc_node_track_caller+0x38/0x50 [<000000001a403ec1>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000001641cbb8>] __alloc_skb+0xa0/0x210 [<00000000f8ff32f5>] llc_alloc_frame+0x66/0x110 [<000000006268628a>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<0000000009f272d1>] llc_conn_state_process+0x1ac/0x640 [<00000000cef52fc2>] llc_establish_connection+0x110/0x170 [<00000000779adfee>] llc_ui_connect+0x10e/0x370 [<000000007b1bbac3>] __sys_connect+0x11d/0x170 [<00000000edced189>] __x64_sys_connect+0x1e/0x30 [<00000000e1b79251>] do_syscall_64+0x73/0x1f0 [<00000000bd855cb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9