udit: type=1400 audit(1573921864.587:42): avc: denied { map } for pid=6955 comm="syz-executor402" path="/root/syz-executor402139955" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program BUG: memory leak unreferenced object 0xffff88810cb29640 (size 1376): comm "syz-executor402", pid 6957, jiffies 4294941620 (age 13.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [<000000000f0828a4>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000000f0828a4>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000000f0828a4>] slab_alloc mm/slab.c:3319 [inline] [<000000000f0828a4>] kmem_cache_alloc+0x13f/0x2c0 mm/slab.c:3483 [<00000000f15a9170>] sk_prot_alloc+0x41/0x170 net/core/sock.c:1599 [<000000000e6d05a0>] sk_alloc+0x35/0x2f0 net/core/sock.c:1659 [<00000000dfcf460c>] smc_sock_alloc+0x4a/0x1a0 net/smc/af_smc.c:222 [<0000000089d1bd2a>] smc_create+0x6b/0x160 net/smc/af_smc.c:1979 [<000000009b2a18ae>] __sock_create+0x164/0x250 net/socket.c:1418 [<00000000c4e3cef3>] sock_create net/socket.c:1469 [inline] [<00000000c4e3cef3>] __sys_socket+0x69/0x110 net/socket.c:1511 [<000000003df89266>] __do_sys_socket net/socket.c:1520 [inline] [<000000003df89266>] __se_sys_socket net/socket.c:1518 [inline] [<000000003df89266>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518 [<0000000071f57cad>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000e15397c2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9