Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. [ 79.471096][ T24] audit: type=1400 audit(1558426084.256:36): avc: denied { map } for pid=7150 comm="syz-executor017" path="/root/syz-executor017511823" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program [ 121.284031][ T7150] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812aeca8c0 (size 1088): comm "syz-executor017", pid 7155, jiffies 4294948247 (age 13.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 7b d7 2f 1b 00 00 00 00 ........{./..... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000569898f2>] kmem_cache_alloc+0x134/0x270 [<00000000d078209c>] sk_prot_alloc+0x41/0x170 [<00000000b906069c>] sk_alloc+0x35/0x2f0 [<00000000f68ebd71>] inet_create+0x11c/0x470 [<000000007229d654>] __sock_create+0x164/0x250 [<0000000071a202ab>] __sys_socket+0x69/0x110 [<00000000aa732207>] __x64_sys_socket+0x1e/0x30 [<000000004e2cca9d>] do_syscall_64+0x76/0x1a0 [<000000001320fd43>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881135fa100 (size 224): comm "syz-executor017", pid 7155, jiffies 4294948247 (age 13.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 c0 a8 ec 2a 81 88 ff ff ...........*.... backtrace: [<00000000a300585f>] kmem_cache_alloc_node+0x153/0x2a0 [<00000000abae7c86>] __alloc_skb+0x6e/0x210 [<000000007de2d3cd>] sock_omalloc+0x4e/0x90 [<00000000b14ebe05>] sock_zerocopy_alloc+0x3c/0xf0 [<000000004adc8585>] sock_zerocopy_realloc+0x7d/0x100 [<000000008438dc7e>] __ip_append_data.isra.0+0x6c3/0xe30 [<00000000b4baebc6>] ip_append_data.part.0+0x9a/0x100 [<00000000b11060fb>] ip_append_data+0x5b/0x80 [<00000000df144136>] udp_sendmsg+0x6f0/0xf60 [<0000000000504928>] inet_sendmsg+0x64/0x120 [<000000003354f594>] sock_sendmsg+0x54/0x70 [<00000000f766c229>] __sys_sendto+0x148/0x1f0 [<000000003878a0f8>] __x64_sys_sendto+0x2a/0x30 [<000000004e2cca9d>] do_syscall_64+0x76/0x1a0 [<000000001320fd43>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program