Warning: Permanently added '10.128.0.217' (ECDSA) to the list of known hosts. [ 43.600218][ T24] audit: type=1400 audit(1558422415.564:36): avc: denied { map } for pid=7082 comm="syz-executor491" path="/root/syz-executor491141132" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 50.547661][ T7082] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 50.598634][ T7083] IPVS: ftp: loaded support on port[0] = 21 [ 50.616325][ T7083] chnl_net:caif_netlink_parms(): no params data found [ 50.628376][ T7083] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.635480][ T7083] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.644087][ T7083] device bridge_slave_0 entered promiscuous mode [ 50.651447][ T7083] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.658565][ T7083] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.666236][ T7083] device bridge_slave_1 entered promiscuous mode [ 50.675461][ T7083] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.684518][ T7083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.695337][ T7083] team0: Port device team_slave_0 added [ 50.701293][ T7083] team0: Port device team_slave_1 added [ 50.754591][ T7083] device hsr_slave_0 entered promiscuous mode [ 50.793839][ T7083] device hsr_slave_1 entered promiscuous mode [ 50.846436][ T7083] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.853888][ T7083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.861241][ T7083] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.868807][ T7083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.883245][ T7083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.892059][ T7085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.899863][ T7085] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.908509][ T7085] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.916073][ T7085] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.924664][ T7083] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.934216][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.942489][ T3520] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.949513][ T3520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.956855][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.965235][ T3520] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.972242][ T3520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.981029][ T7086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready executing program [ 50.990082][ T7086] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.000431][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.009669][ T7086] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.018960][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.027746][ T7083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.038219][ T7083] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program [ 57.931079][ T7083] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 64.924437][ T7083] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888123c28f00 (size 64): comm "softirq", pid 0, jiffies 4294942376 (age 13.930s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 e0 00 00 01 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000006105011b>] kmem_cache_alloc_trace+0x13d/0x280 [<000000004bba8073>] ip_mc_add_src+0x36b/0x400 [<00000000a46a65a0>] ip_mc_msfilter+0x22d/0x310 [<000000005956ca89>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<00000000848e2d2f>] ip_setsockopt+0x3b/0xb0 [<00000000b9db185c>] udp_setsockopt+0x4e/0x90 [<000000003028e438>] sock_common_setsockopt+0x38/0x50 [<0000000015b65589>] __sys_setsockopt+0x98/0x120 [<00000000ac198ef0>] __x64_sys_setsockopt+0x26/0x30 [<000000000a770437>] do_syscall_64+0x76/0x1a0 [<00000000d3adb93b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812069ee00 (size 64): comm "softirq", pid 0, jiffies 4294942376 (age 13.930s) hex dump (first 32 bytes): 00 8f c2 23 81 88 ff ff 00 00 00 00 00 00 00 00 ...#............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000006105011b>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000a0697565>] ip_mc_add_src+0x29c/0x400 [<00000000a46a65a0>] ip_mc_msfilter+0x22d/0x310 [<000000005956ca89>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<00000000848e2d2f>] ip_setsockopt+0x3b/0xb0 [<00000000b9db185c>] udp_setsockopt+0x4e/0x90 [<000000003028e438>] sock_common_setsockopt+0x38/0x50 [<0000000015b65589>] __sys_setsockopt+0x98/0x120 [<00000000ac198ef0>] __x64_sys_setsockopt+0x26/0x30 [<000000000a770437>] do_syscall_64+0x76/0x1a0 [<00000000d3adb93b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888123e32b00 (size 64): comm "softirq", pid 0, jiffies 4294942968 (age 8.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 e0 00 00 01 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000006105011b>] kmem_cache_alloc_trace+0x13d/0x280 [<000000004bba8073>] ip_mc_add_src+0x36b/0x400 [<00000000a46a65a0>] ip_mc_msfilter+0x22d/0x310 [<000000005956ca89>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<00000000848e2d2f>] ip_setsockopt+0x3b/0xb0 [<00000000b9db185c>] udp_setsockopt+0x4e/0x90 [<000000003028e438>] sock_common_setsockopt+0x38/0x50 [<0000000015b65589>] __sys_setsockopt+0x98/0x120 [<00000000ac198ef0>] __x64_sys_setsockopt+0x26/0x30 [<000000000a770437>] do_syscall_64+0x76/0x1a0 [<00000000d3adb93b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812069ec40 (size 64): comm "softirq", pid 0, jiffies 4294942968 (age 8.010s) hex dump (first 32 bytes): 00 2b e3 23 81 88 ff ff 00 00 00 00 00 00 00 00 .+.#............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000006105011b>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000a0697565>] ip_mc_add_src+0x29c/0x400 [<00000000a46a65a0>] ip_mc_msfilter+0x22d/0x310 [<000000005956ca89>] do_ip_setsockopt.isra.0+0x1795/0x1930 [<00000000848e2d2f>] ip_setsockopt+0x3b/0xb0 [<00000000b9db185c>] udp_setsockopt+0x4e/0x90 [<000000003028e438>] sock_common_setsockopt+0x38/0x50 [<0000000015b65589>] __sys_setsockopt+0x98/0x120 [<00000000ac198ef0>] __x64_sys_setsockopt+0x26/0x30 [<000000000a770437>] do_syscall_64+0x76/0x1a0 [<00000000d3adb93b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program