udit: type=1400 audit(1573315703.232:42): avc: denied { map } for pid=6929 comm="syz-executor652" path="/root/syz-executor652726164" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program BUG: memory leak unreferenced object 0xffff88811466b640 (size 1376): comm "syz-executor652", pid 6930, jiffies 4294943402 (age 13.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [<00000000c2e7086e>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000c2e7086e>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000c2e7086e>] slab_alloc mm/slab.c:3319 [inline] [<00000000c2e7086e>] kmem_cache_alloc+0x13f/0x2c0 mm/slab.c:3483 [<000000009756f308>] sk_prot_alloc+0x41/0x170 net/core/sock.c:1599 [<00000000a6b02edc>] sk_alloc+0x35/0x2f0 net/core/sock.c:1659 [<0000000098e69b54>] smc_sock_alloc+0x4a/0x1a0 net/smc/af_smc.c:222 [<00000000ac6fd0fe>] smc_create+0x6b/0x160 net/smc/af_smc.c:1979 [<000000005c668205>] __sock_create+0x164/0x250 net/socket.c:1418 [<0000000046ae7530>] sock_create net/socket.c:1469 [inline] [<0000000046ae7530>] __sys_socket+0x69/0x110 net/socket.c:1511 [<00000000880f6a7e>] __do_sys_socket net/socket.c:1520 [inline] [<00000000880f6a7e>] __se_sys_socket net/socket.c:1518 [inline] [<00000000880f6a7e>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518 [<000000007a69ca08>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000eb803a42>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881233d04c0 (size 32): comm "syz-executor652", pid 6930, jiffies 4294943402 (age 13.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<00000000e2565438>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000e2565438>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000e2565438>] slab_alloc mm/slab.c:3319 [inline] [<00000000e2565438>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000833d1028>] kmalloc include/linux/slab.h:556 [inline] [<00000000833d1028>] kzalloc include/linux/slab.h:690 [inline] [<00000000833d1028>] selinux_sk_alloc_security+0x48/0xb0 security/selinux/hooks.c:5119 [<000000001d7a11eb>] security_sk_alloc+0x49/0x70 security/security.c:2069 [<00000000f99f4ac6>] sk_prot_alloc+0xa1/0x170 net/core/sock.c:1608 [<00000000a6b02edc>] sk_alloc+0x35/0x2f0 net/core/sock.c:1659 [<0000000098e69b54>] smc_sock_alloc+0x4a/0x1a0 net/smc/af_smc.c:222 [<00000000ac6fd0fe>] smc_create+0x6b/0x160 net/smc/af_smc.c:1979 [<000000005c668205>] __sock_create+0x164/0x250 net/socket.c:1418 [<0000000046ae7530>] sock_create net/socket.c:1469 [inline] [<0000000046ae7530>] __sys_socket+0x69/0x110 net/socket.c:1511 [<00000000880f6a7e>] __do_sys_socket net/socket.c:1520 [inline] [<00000000880f6a7e>] __se_sys_socket net/socket.c:1518 [inline] [<00000000880f6a7e>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518 [<000000007a69ca08>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000eb803a42>] entry_SYSCALL_64_after_hwframe+0x44/0xa9