Warning: Permanently added '10.128.0.110' (ECDSA) to the list of known hosts. [ 36.488490][ T25] audit: type=1400 audit(1581703849.370:42): avc: denied { map } for pid=7117 comm="syz-executor797" path="/root/syz-executor797027062" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 36.516374][ T25] audit: type=1400 audit(1581703849.370:43): avc: denied { integrity } for pid=7117 comm="syz-executor797" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program [ 43.312509][ T7119] IPVS: ftp: loaded support on port[0] = 21 executing program [ 50.110863][ T7119] kmemleak: 60 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 57.010205][ T7119] kmemleak: 42 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812398e300 (size 256): comm "syz-executor797", pid 7121, jiffies 4294941599 (age 13.750s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003354196f>] kmem_cache_alloc_trace+0x145/0x2c0 [<0000000069a2fbf5>] tcindex_set_parms+0xac/0x9e0 [<000000007004d79d>] tcindex_change+0xd8/0x110 [<0000000008ea8bdc>] tc_new_tfilter+0x566/0xf50 [<0000000058a95c77>] rtnetlink_rcv_msg+0x3b2/0x4b0 [<00000000bc95c955>] netlink_rcv_skb+0x61/0x170 [<000000006d8793f9>] rtnetlink_rcv+0x1d/0x30 [<00000000b67f8ac8>] netlink_unicast+0x223/0x310 [<000000001d449ac1>] netlink_sendmsg+0x2c0/0x570 [<00000000e333225c>] sock_sendmsg+0x54/0x70 [<00000000c07032c3>] ____sys_sendmsg+0x2d0/0x300 [<0000000023b5aaab>] ___sys_sendmsg+0x8a/0xd0 [<00000000997f8171>] __sys_sendmsg+0x80/0xf0 [<00000000d83f29ce>] __x64_sys_sendmsg+0x23/0x30 [<0000000025ebc24c>] do_syscall_64+0x73/0x220 [<000000006523c0e2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811899f300 (size 256): comm "syz-executor797", pid 7121, jiffies 4294941599 (age 13.750s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003354196f>] kmem_cache_alloc_trace+0x145/0x2c0 [<0000000002d45cb6>] tcindex_alloc_perfect_hash+0x8f/0xf0 [<0000000085326bc9>] tcindex_set_parms+0x8b4/0x9e0 [<000000007004d79d>] tcindex_change+0xd8/0x110 [<0000000008ea8bdc>] tc_new_tfilter+0x566/0xf50 [<0000000058a95c77>] rtnetlink_rcv_msg+0x3b2/0x4b0 [<00000000bc95c955>] netlink_rcv_skb+0x61/0x170 [<000000006d8793f9>] rtnetlink_rcv+0x1d/0x30 [<00000000b67f8ac8>] netlink_unicast+0x223/0x310 [<000000001d449ac1>] netlink_sendmsg+0x2c0/0x570 [<00000000e333225c>] sock_sendmsg+0x54/0x70 [<00000000c07032c3>] ____sys_sendmsg+0x2d0/0x300 [<0000000023b5aaab>] ___sys_sendmsg+0x8a/0xd0 [<00000000997f8171>] __sys_sendmsg+0x80/0xf0 [<00000000d83f29ce>] __x64_sys_sendmsg+0x23/0x30 [<0000000025ebc24c>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff88811899f200 (size 256): comm "syz-executor797", pid 7121, jiffies 4294941599 (age 13.750s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003354196f>] kmem_cache_alloc_trace+0x145/0x2c0 [<0000000002d45cb6>] tcindex_alloc_perfect_hash+0x8f/0xf0 [<0000000085326bc9>] tcindex_set_parms+0x8b4/0x9e0 [<000000007004d79d>] tcindex_change+0xd8/0x110 [<0000000008ea8bdc>] tc_new_tfilter+0x566/0xf50 [<0000000058a95c77>] rtnetlink_rcv_msg+0x3b2/0x4b0 [<00000000bc95c955>] netlink_rcv_skb+0x61/0x170 [<000000006d8793f9>] rtnetlink_rcv+0x1d/0x30 [<00000000b67f8ac8>] netlink_unicast+0x223/0x310 [<000000001d449ac1>] netlink_sendmsg+0x2c0/0x570 [<00000000e333225c>] sock_sendmsg+0x54/0x70 [<00000000c07032c3>] ____sys_sendmsg+0x2d0/0x300 [<0000000023b5aaab>] ___sys_sendmsg+0x8a/0xd0 [<00000000997f8171>] __sys_sendmsg+0x80/0xf0 [<00000000d83f29ce>] __x64_sys_sendmsg+0x23/0x30 [<0000000025ebc24c>] do_syscall_64+0x73/0x220