Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. [ 140.261507][ T22] audit: type=1400 audit(1570072851.794:68): avc: denied { map } for pid=6849 comm="syz-executor278" path="/root/syz-executor278661812" dev="sda1" ino=1420 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 188.868102][ T6849] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 193.735920][ T6849] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 195.683094][ T6849] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881191dbd00 (size 224): comm "syz-executor278", pid 6850, jiffies 4294951979 (age 48.690s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 a0 4f 2a 81 88 ff ff 00 98 a9 21 81 88 ff ff ..O*.......!.... backtrace: [<00000000b8c33f6e>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000c134c166>] __alloc_skb+0x6e/0x210 [<000000000b5b7061>] alloc_skb_with_frags+0x5f/0x250 [<0000000014cf7a44>] sock_alloc_send_pskb+0x269/0x2a0 [<000000004c0d50e4>] sock_alloc_send_skb+0x32/0x40 [<00000000a0656448>] llc_ui_sendmsg+0x10a/0x540 [<0000000051f5c371>] sock_sendmsg+0x54/0x70 [<00000000e8c4c8ba>] __sys_sendto+0x148/0x1f0 [<0000000024a04acf>] __x64_sys_sendto+0x2a/0x30 [<000000004b1b582c>] do_syscall_64+0x73/0x1f0 [<0000000019a066cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811ea7b800 (size 2048): comm "syz-executor278", pid 6853, jiffies 4294953738 (age 31.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000000d17e78c>] __kmalloc+0x169/0x300 [<0000000093a72dce>] sk_prot_alloc+0x112/0x170 [<000000000061df85>] sk_alloc+0x35/0x2f0 [<000000007fc16bbe>] llc_sk_alloc+0x35/0x170 [<000000002b62a782>] llc_ui_create+0x7b/0x150 [<00000000cdfc16ca>] __sock_create+0x164/0x250 [<00000000df2b027a>] __sys_socket+0x69/0x110 [<00000000e1d602a0>] __x64_sys_socket+0x1e/0x30 [<000000004b1b582c>] do_syscall_64+0x73/0x1f0 [<0000000019a066cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881186adea0 (size 32): comm "syz-executor278", pid 6853, jiffies 4294953738 (age 31.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<0000000019a44635>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000fb7902b6>] selinux_sk_alloc_security+0x48/0xb0 [<00000000b28d77ec>] security_sk_alloc+0x49/0x70 [<0000000035f4c88a>] sk_prot_alloc+0x12d/0x170 [<000000000061df85>] sk_alloc+0x35/0x2f0 [<000000007fc16bbe>] llc_sk_alloc+0x35/0x170 [<000000002b62a782>] llc_ui_create+0x7b/0x150 [<00000000cdfc16ca>] __sock_create+0x164/0x250 [<00000000df2b027a>] __sys_socket+0x69/0x110 [<00000000e1d602a0>] __x64_sys_socket+0x1e/0x30 [<000000004b1b582c>] do_syscall_64+0x73/0x1f0 [<0000000019a066cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881191db100 (size 224): comm "syz-executor278", pid 6853, jiffies 4294953738 (age 31.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 a0 4f 2a 81 88 ff ff 00 b8 a7 1e 81 88 ff ff ..O*............ backtrace: [<00000000b8c33f6e>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000c134c166>] __alloc_skb+0x6e/0x210 [<000000000b5b7061>] alloc_skb_with_frags+0x5f/0x250 [<0000000014cf7a44>] sock_alloc_send_pskb+0x269/0x2a0 [<000000004c0d50e4>] sock_alloc_send_skb+0x32/0x40 [<00000000a0656448>] llc_ui_sendmsg+0x10a/0x540 [<0000000051f5c371>] sock_sendmsg+0x54/0x70 [<00000000e8c4c8ba>] __sys_sendto+0x148/0x1f0 [<0000000024a04acf>] __x64_sys_sendto+0x2a/0x30 [<000000004b1b582c>] do_syscall_64+0x73/0x1f0 [<0000000019a066cc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9