Warning: Permanently added '10.128.0.150' (ECDSA) to the list of known hosts. [ 38.782242][ T26] audit: type=1400 audit(1580469172.239:42): avc: denied { map } for pid=7272 comm="syz-executor885" path="/root/syz-executor885053980" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 38.809244][ T26] audit: type=1400 audit(1580469172.239:43): avc: denied { integrity } for pid=7272 comm="syz-executor885" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program executing program executing program [ 62.896167][ T7272] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881235ed800 (size 512): comm "syz-executor885", pid 7277, jiffies 4294942409 (age 13.500s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 d8 5e 23 81 88 ff ff ..........^#.... 08 d8 5e 23 81 88 ff ff 18 d8 5e 23 81 88 ff ff ..^#......^#.... backtrace: [<00000000a1795100>] __kmalloc+0x169/0x300 [<0000000087c7fe4b>] rds_message_alloc+0x3e/0xc0 [<00000000053ed625>] rds_send_probe.constprop.0+0x42/0x380 [<000000008d1b2e3a>] rds_send_pong+0x1e/0x23 [<00000000d6d22447>] rds_recv_incoming+0x496/0x5e0 [<000000008a331811>] rds_loop_xmit+0x86/0x100 [<0000000062344e2d>] rds_send_xmit+0x5a9/0xb40 [<00000000e110cf0f>] rds_sendmsg+0x13fa/0x16d0 [<000000001e7394dd>] sock_sendmsg+0x54/0x70 [<000000003c8d51ac>] __sys_sendto+0x148/0x1f0 [<0000000016c73279>] __x64_sys_sendto+0x2a/0x30 [<00000000f96a6f45>] do_syscall_64+0x73/0x220 [<000000008a483fab>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e347e00 (size 512): comm "syz-executor885", pid 7277, jiffies 4294942409 (age 13.500s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 7e 34 1e 81 88 ff ff .........~4..... 08 7e 34 1e 81 88 ff ff 18 7e 34 1e 81 88 ff ff .~4......~4..... backtrace: [<00000000a1795100>] __kmalloc+0x169/0x300 [<0000000087c7fe4b>] rds_message_alloc+0x3e/0xc0 [<00000000053ed625>] rds_send_probe.constprop.0+0x42/0x380 [<000000008d1b2e3a>] rds_send_pong+0x1e/0x23 [<00000000d6d22447>] rds_recv_incoming+0x496/0x5e0 [<000000008a331811>] rds_loop_xmit+0x86/0x100 [<0000000062344e2d>] rds_send_xmit+0x5a9/0xb40 [<00000000e110cf0f>] rds_sendmsg+0x13fa/0x16d0 [<000000001e7394dd>] sock_sendmsg+0x54/0x70 [<000000003c8d51ac>] __sys_sendto+0x148/0x1f0 [<0000000016c73279>] __x64_sys_sendto+0x2a/0x30 [<00000000f96a6f45>] do_syscall_64+0x73/0x220 [<000000008a483fab>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c4ee800 (size 512): comm "syz-executor885", pid 7280, jiffies 4294942989 (age 7.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 e8 4e 1c 81 88 ff ff ..........N..... 08 e8 4e 1c 81 88 ff ff 18 e8 4e 1c 81 88 ff ff ..N.......N..... backtrace: [<00000000a1795100>] __kmalloc+0x169/0x300 [<0000000087c7fe4b>] rds_message_alloc+0x3e/0xc0 [<00000000053ed625>] rds_send_probe.constprop.0+0x42/0x380 [<000000008d1b2e3a>] rds_send_pong+0x1e/0x23 [<00000000d6d22447>] rds_recv_incoming+0x496/0x5e0 [<000000008a331811>] rds_loop_xmit+0x86/0x100 [<0000000062344e2d>] rds_send_xmit+0x5a9/0xb40 [<00000000e110cf0f>] rds_sendmsg+0x13fa/0x16d0 [<000000001e7394dd>] sock_sendmsg+0x54/0x70 [<000000003c8d51ac>] __sys_sendto+0x148/0x1f0 [<0000000016c73279>] __x64_sys_sendto+0x2a/0x30 [<00000000f96a6f45>] do_syscall_64+0x73/0x220 [<000000008a483fab>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c4eee00 (size 512): comm "syz-executor885", pid 7280, jiffies 4294942989 (age 7.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 ee 4e 1c 81 88 ff ff ..........N..... 08 ee 4e 1c 81 88 ff ff 18 ee 4e 1c 81 88 ff ff ..N.......N..... backtrace: [<00000000a1795100>] __kmalloc+0x169/0x300 [<0000000087c7fe4b>] rds_message_alloc+0x3e/0xc0 [<00000000053ed625>] rds_send_probe.constprop.0+0x42/0x380 [<000000008d1b2e3a>] rds_send_pong+0x1e/0x23 [<00000000d6d22447>] rds_recv_incoming+0x496/0x5e0 [<000000008a331811>] rds_loop_xmit+0x86/0x100 [<0000000062344e2d>] rds_send_xmit+0x5a9/0xb40 [<00000000e110cf0f>] rds_sendmsg+0x13fa/0x16d0 [<000000001e7394dd>] sock_sendmsg+0x54/0x70 [<000000003c8d51ac>] __sys_sendto+0x148/0x1f0 [<0000000016c73279>] __x64_sys_sendto+0x2a/0x30 [<00000000f96a6f45>] do_syscall_64+0x73/0x220 [<000000008a483fab>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.816791][ T7272] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)