Warning: Permanently added '10.128.0.206' (ECDSA) to the list of known hosts. [ 33.805738][ T25] audit: type=1400 audit(1568956290.453:55): avc: denied { map } for pid=6881 comm="syz-executor515" path="/root/syz-executor515603806" dev="sda1" ino=16498 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 51.164381][ T6881] kmemleak: 357 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811bffc100 (size 224): comm "syz-executor515", pid 6884, jiffies 4294941320 (age 12.790s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 c0 ef 2a 81 88 ff ff 00 30 63 1e 81 88 ff ff ...*.....0c..... backtrace: [<0000000070b3b342>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000251e2fec>] __alloc_skb+0x6e/0x210 [<000000004ede5746>] alloc_skb_with_frags+0x5f/0x250 [<00000000ae142853>] sock_alloc_send_pskb+0x269/0x2a0 [<000000005950c28f>] sock_alloc_send_skb+0x32/0x40 [<00000000e19ce391>] llc_ui_sendmsg+0x10a/0x540 [<000000003254999c>] sock_sendmsg+0x54/0x70 [<00000000e77a3339>] ___sys_sendmsg+0x194/0x3c0 [<000000000b54f246>] __sys_sendmmsg+0xf4/0x270 [<0000000039822605>] __x64_sys_sendmmsg+0x28/0x30 [<00000000f677a8f0>] do_syscall_64+0x73/0x1f0 [<000000005c85302e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811fffca00 (size 512): comm "syz-executor515", pid 6884, jiffies 4294941320 (age 12.790s) hex dump (first 32 bytes): 71 0f 00 00 00 00 00 00 69 63 65 73 2f 76 69 72 q.......ices/vir 74 75 61 6c 2f 6e 65 74 2f 62 6f 6e 64 30 00 41 tual/net/bond0.A backtrace: [<00000000b35e137f>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000587069e1>] __kmalloc_node_track_caller+0x38/0x50 [<0000000046b17b16>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000a4e0ebaf>] __alloc_skb+0xa0/0x210 [<000000004ede5746>] alloc_skb_with_frags+0x5f/0x250 [<00000000ae142853>] sock_alloc_send_pskb+0x269/0x2a0 [<000000005950c28f>] sock_alloc_send_skb+0x32/0x40 [<00000000e19ce391>] llc_ui_sendmsg+0x10a/0x540 [<000000003254999c>] sock_sendmsg+0x54/0x70 [<00000000e77a3339>] ___sys_sendmsg+0x194/0x3c0 [<000000000b54f246>] __sys_sendmmsg+0xf4/0x270 [<0000000039822605>] __x64_sys_sendmmsg+0x28/0x30 [<00000000f677a8f0>] do_syscall_64+0x73/0x1f0 [<000000005c85302e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811bffcd00 (size 224): comm "syz-executor515", pid 6884, jiffies 4294941320 (age 12.790s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 c0 ef 2a 81 88 ff ff 00 30 63 1e 81 88 ff ff ...*.....0c..... backtrace: [<0000000070b3b342>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000251e2fec>] __alloc_skb+0x6e/0x210 [<000000004ede5746>] alloc_skb_with_frags+0x5f/0x250 [<00000000ae142853>] sock_alloc_send_pskb+0x269/0x2a0 [<000000005950c28f>] sock_alloc_send_skb+0x32/0x40 [<00000000e19ce391>] llc_ui_sendmsg+0x10a/0x540 [<000000003254999c>] sock_sendmsg+0x54/0x70 [<00000000e77a3339>] ___sys_sendmsg+0x194/0x3c0 [<000000000b54f246>] __sys_sendmmsg+0xf4/0x270 [<0000000039822605>] __x64_sys_sendmmsg+0x28/0x30 [<00000000f677a8f0>] do_syscall_64+0x73/0x1f0 [<000000005c85302e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e458600 (size 512): comm "syz-executor515", pid 6884, jiffies 4294941320 (age 12.790s) hex dump (first 32 bytes): 01 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b35e137f>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000587069e1>] __kmalloc_node_track_caller+0x38/0x50 [<0000000046b17b16>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000a4e0ebaf>] __alloc_skb+0xa0/0x210 [<000000004ede5746>] alloc_skb_with_frags+0x5f/0x250 [<00000000ae142853>] sock_alloc_send_pskb+0x269/0x2a0 [<000000005950c28f>] sock_alloc_send_skb+0x32/0x40 [<00000000e19ce391>] llc_ui_sendmsg+0x10a/0x540 [<000000003254999c>] sock_sendmsg+0x54/0x70 [<00000000e77a3339>] ___sys_sendmsg+0x194/0x3c0 [<000000000b54f246>] __sys_sendmmsg+0xf4/0x270 [<0000000039822605>] __x64_sys_sendmmsg+0x28/0x30 [<00000000f677a8f0>] do_syscall_64+0x73/0x1f0 [<000000005c85302e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9