Warning: Permanently added '10.128.0.85' (ECDSA) to the list of known hosts. [ 74.842532][ T24] audit: type=1400 audit(1560493320.202:36): avc: denied { map } for pid=7081 comm="syz-executor039" path="/root/syz-executor039037380" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program [ 110.834544][ T7081] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812b6d7500 (size 632): comm "syz-executor039", pid 7085, jiffies 4294947190 (age 13.680s) hex dump (first 32 bytes): 01 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 80 63 68 1f 81 88 ff ff 00 00 00 00 00 00 00 00 .ch............. backtrace: [<00000000641b7918>] kmem_cache_alloc+0x134/0x270 [<00000000fe350d52>] sock_alloc_inode+0x1d/0xe0 [<00000000ea78db1e>] alloc_inode+0x2c/0xe0 [<00000000184eac10>] new_inode_pseudo+0x18/0x70 [<00000000bdd1d992>] sock_alloc+0x1c/0x90 [<00000000196f922a>] __sock_create+0x8f/0x250 [<00000000e37ca23f>] sock_create_kern+0x3b/0x50 [<00000000523a460e>] io_uring_setup+0x4ea/0x990 [<000000001ee0ffc6>] __x64_sys_io_uring_setup+0x1a/0x20 [<000000003aa1028e>] do_syscall_64+0x76/0x1a0 [<0000000013c6e12c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811f686380 (size 64): comm "syz-executor039", pid 7085, jiffies 4294947190 (age 13.680s) hex dump (first 32 bytes): 00 00 00 00 81 88 ff ff 88 63 68 1f 81 88 ff ff .........ch..... 88 63 68 1f 81 88 ff ff 00 00 00 00 00 00 00 00 .ch............. backtrace: [<000000004f66df28>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000f758ff52>] sock_alloc_inode+0x44/0xe0 [<00000000ea78db1e>] alloc_inode+0x2c/0xe0 [<00000000184eac10>] new_inode_pseudo+0x18/0x70 [<00000000bdd1d992>] sock_alloc+0x1c/0x90 [<00000000196f922a>] __sock_create+0x8f/0x250 [<00000000e37ca23f>] sock_create_kern+0x3b/0x50 [<00000000523a460e>] io_uring_setup+0x4ea/0x990 [<000000001ee0ffc6>] __x64_sys_io_uring_setup+0x1a/0x20 [<000000003aa1028e>] do_syscall_64+0x76/0x1a0 [<0000000013c6e12c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811efe6a80 (size 56): comm "syz-executor039", pid 7085, jiffies 4294947190 (age 13.680s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 30 75 6d 2b 81 88 ff ff 98 6a fe 1e 81 88 ff ff 0um+.....j...... backtrace: [<00000000641b7918>] kmem_cache_alloc+0x134/0x270 [<00000000df02d9be>] security_inode_alloc+0x33/0xb0 [<0000000051fe93d3>] inode_init_always+0x108/0x200 [<0000000038c1a632>] alloc_inode+0x49/0xe0 [<00000000184eac10>] new_inode_pseudo+0x18/0x70 [<00000000bdd1d992>] sock_alloc+0x1c/0x90 [<00000000196f922a>] __sock_create+0x8f/0x250 [<00000000e37ca23f>] sock_create_kern+0x3b/0x50 [<00000000523a460e>] io_uring_setup+0x4ea/0x990 [<000000001ee0ffc6>] __x64_sys_io_uring_setup+0x1a/0x20 [<000000003aa1028e>] do_syscall_64+0x76/0x1a0 [<0000000013c6e12c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9