Warning: Permanently added '10.128.1.38' (ECDSA) to the list of known hosts. [ 59.314163][ T26] audit: type=1400 audit(1580968156.465:42): avc: denied { map } for pid=7260 comm="syz-executor317" path="/root/syz-executor317264064" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 59.341389][ T26] audit: type=1400 audit(1580968156.465:43): avc: denied { integrity } for pid=7260 comm="syz-executor317" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program executing program executing program executing program [ 84.944948][ T7260] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 91.879484][ T7260] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881188c5380 (size 64): comm "syz-executor317", pid 7263, jiffies 4294945078 (age 13.870s) hex dump (first 32 bytes): 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 10 42 08 00 c9 ff ff 00 00 00 00 00 00 00 00 ..B............. backtrace: [<0000000065375c92>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000063e2ce3>] snd_pcm_lib_malloc_pages+0x12b/0x200 [<000000007570b850>] snd_pcm_hw_params+0x720/0x830 [<00000000b73219eb>] snd_pcm_kernel_ioctl+0xb5/0x170 [<0000000052ef9624>] snd_pcm_oss_change_params_locked+0x745/0x1140 [<0000000085f0e124>] snd_pcm_oss_change_params+0x43/0x80 [<00000000e03394e9>] snd_pcm_oss_make_ready+0x55/0xc0 [<000000007040c7d7>] snd_pcm_oss_sync.isra.0+0xb8/0x310 [<00000000ce509083>] snd_pcm_oss_release+0xef/0x100 [<00000000571d4e73>] __fput+0xed/0x300 [<000000004233d05e>] ____fput+0x16/0x20 [<000000001e6ffb23>] task_work_run+0x9d/0xc0 [<0000000085feb841>] do_exit+0x3fa/0xe20 [<0000000033e0e614>] do_group_exit+0x4b/0xe0 [<00000000ebd36532>] __x64_sys_exit_group+0x1c/0x20 [<000000001d40b338>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff8881188c5300 (size 64): comm "syz-executor317", pid 7264, jiffies 4294945676 (age 7.890s) hex dump (first 32 bytes): 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 d0 ae 08 00 c9 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000065375c92>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000063e2ce3>] snd_pcm_lib_malloc_pages+0x12b/0x200 [<000000007570b850>] snd_pcm_hw_params+0x720/0x830 [<00000000b73219eb>] snd_pcm_kernel_ioctl+0xb5/0x170 [<0000000052ef9624>] snd_pcm_oss_change_params_locked+0x745/0x1140 [<0000000085f0e124>] snd_pcm_oss_change_params+0x43/0x80 [<00000000e03394e9>] snd_pcm_oss_make_ready+0x55/0xc0 [<000000007040c7d7>] snd_pcm_oss_sync.isra.0+0xb8/0x310 [<00000000ce509083>] snd_pcm_oss_release+0xef/0x100 [<00000000571d4e73>] __fput+0xed/0x300 [<000000004233d05e>] ____fput+0x16/0x20 [<000000001e6ffb23>] task_work_run+0x9d/0xc0 [<0000000085feb841>] do_exit+0x3fa/0xe20 [<0000000033e0e614>] do_group_exit+0x4b/0xe0 [<00000000ebd36532>] __x64_sys_exit_group+0x1c/0x20 [<000000001d40b338>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffffc90008aed000 (size 2097152): comm "syz-executor317", pid 7264, jiffies 4294945676 (age 7.890s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ee45b0e9>] __vmalloc_node_range+0x288/0x300 [<00000000a3480908>] __vmalloc+0x44/0x50 [<00000000bf7c9d21>] snd_dma_alloc_pages+0x137/0x1e0 [<0000000069589e81>] do_alloc_pages+0x63/0xc0 [<00000000dd98cf84>] snd_pcm_lib_malloc_pages+0x16d/0x200 [<000000007570b850>] snd_pcm_hw_params+0x720/0x830 [<00000000b73219eb>] snd_pcm_kernel_ioctl+0xb5/0x170 [<0000000052ef9624>] snd_pcm_oss_change_params_locked+0x745/0x1140 [<0000000085f0e124>] snd_pcm_oss_change_params+0x43/0x80 [<00000000e03394e9>] snd_pcm_oss_make_ready+0x55/0xc0 [<000000007040c7d7>] snd_pcm_oss_sync.isra.0+0xb8/0x310 [<00000000ce509083>] snd_pcm_oss_release+0xef/0x100 [<00000000571d4e73>] __fput+0xed/0x300 [<000000004233d05e>] ____fput+0x16/0x20 [<000000001e6ffb23>] task_work_run+0x9d/0xc0 [<0000000085feb841>] do_exit+0x3fa/0xe20