Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. [ 32.967684][ T22] audit: type=1400 audit(1568631768.626:36): avc: denied { map } for pid=6889 comm="syz-executor441" path="/root/syz-executor441954016" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 49.723059][ T6889] kmemleak: 349 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888122020d00 (size 224): comm "syz-executor441", pid 6892, jiffies 4294941259 (age 11.860s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 de 24 81 88 ff ff 00 00 6e 1d 81 88 ff ff .p.$......n..... backtrace: [<00000000335977b1>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000e557f3a5>] __alloc_skb+0x6e/0x210 [<00000000b0819971>] alloc_skb_with_frags+0x5f/0x250 [<000000000fd4725a>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fe409571>] sock_alloc_send_skb+0x32/0x40 [<000000008d72e7da>] llc_ui_sendmsg+0x10a/0x540 [<00000000903eed74>] sock_sendmsg+0x54/0x70 [<0000000058eb3d5e>] ___sys_sendmsg+0x194/0x3c0 [<000000005705b13f>] __sys_sendmmsg+0xf4/0x270 [<000000003053e315>] __x64_sys_sendmmsg+0x28/0x30 [<00000000ad843270>] do_syscall_64+0x76/0x1a0 [<0000000096de6e30>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888120d23b00 (size 224): comm "syz-executor441", pid 6892, jiffies 4294941259 (age 11.860s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 de 24 81 88 ff ff 00 00 6e 1d 81 88 ff ff .p.$......n..... backtrace: [<00000000335977b1>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000e557f3a5>] __alloc_skb+0x6e/0x210 [<00000000b0819971>] alloc_skb_with_frags+0x5f/0x250 [<000000000fd4725a>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fe409571>] sock_alloc_send_skb+0x32/0x40 [<000000008d72e7da>] llc_ui_sendmsg+0x10a/0x540 [<00000000903eed74>] sock_sendmsg+0x54/0x70 [<0000000058eb3d5e>] ___sys_sendmsg+0x194/0x3c0 [<000000005705b13f>] __sys_sendmmsg+0xf4/0x270 [<000000003053e315>] __x64_sys_sendmmsg+0x28/0x30 [<00000000ad843270>] do_syscall_64+0x76/0x1a0 [<0000000096de6e30>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b087c00 (size 512): comm "syz-executor441", pid 6892, jiffies 4294941259 (age 11.860s) hex dump (first 32 bytes): 01 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 c0 c0 bf 81 03 00 00 00 00 00 00 00 ................ backtrace: [<000000004c59c248>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<0000000022a49bd5>] __kmalloc_node_track_caller+0x38/0x50 [<0000000004a9f85e>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000005eb9cf07>] __alloc_skb+0xa0/0x210 [<00000000b0819971>] alloc_skb_with_frags+0x5f/0x250 [<000000000fd4725a>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fe409571>] sock_alloc_send_skb+0x32/0x40 [<000000008d72e7da>] llc_ui_sendmsg+0x10a/0x540 [<00000000903eed74>] sock_sendmsg+0x54/0x70 [<0000000058eb3d5e>] ___sys_sendmsg+0x194/0x3c0 [<000000005705b13f>] __sys_sendmmsg+0xf4/0x270 [<000000003053e315>] __x64_sys_sendmmsg+0x28/0x30 [<00000000ad843270>] do_syscall_64+0x76/0x1a0 [<0000000096de6e30>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119ed6a00 (size 224): comm "syz-executor441", pid 6892, jiffies 4294941259 (age 11.860s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 de 24 81 88 ff ff 00 00 6e 1d 81 88 ff ff .p.$......n..... backtrace: [<00000000335977b1>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000e557f3a5>] __alloc_skb+0x6e/0x210 [<00000000b0819971>] alloc_skb_with_frags+0x5f/0x250 [<000000000fd4725a>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fe409571>] sock_alloc_send_skb+0x32/0x40 [<000000008d72e7da>] llc_ui_sendmsg+0x10a/0x540 [<00000000903eed74>] sock_sendmsg+0x54/0x70 [<0000000058eb3d5e>] ___sys_sendmsg+0x194/0x3c0 [<000000005705b13f>] __sys_sendmmsg+0xf4/0x270 [<000000003053e315>] __x64_sys_sendmmsg+0x28/0x30 [<00000000ad843270>] do_syscall_64+0x76/0x1a0 [<0000000096de6e30>] entry_SYSCALL_64_after_hwframe+0x44/0xa9