udit: type=1400 audit(1570300494.772:64): avc: denied { map } for pid=6804 comm="syz-executor426" path="/root/syz-executor426152335" dev="sda1" ino=16498 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program BUG: memory leak unreferenced object 0xffff8881113d7300 (size 256): comm "syz-executor426", pid 6805, jiffies 4294942771 (age 13.320s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008a4d3108>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000008a4d3108>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000008a4d3108>] slab_alloc mm/slab.c:3319 [inline] [<000000008a4d3108>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<000000000aa4db8b>] kmalloc include/linux/slab.h:552 [inline] [<000000000aa4db8b>] kzalloc include/linux/slab.h:686 [inline] [<000000000aa4db8b>] gfs2_init_fs_context+0x25/0x90 fs/gfs2/ops_fstype.c:1543 [<00000000cd1128b2>] gfs2_meta_init_fs_context+0x17/0x40 fs/gfs2/ops_fstype.c:1608 [<00000000b685cd62>] alloc_fs_context+0x174/0x200 fs/fs_context.c:293 [<00000000a786c7cc>] fs_context_for_mount+0x25/0x30 fs/fs_context.c:307 [<00000000dab6a0b3>] do_new_mount fs/namespace.c:2808 [inline] [<00000000dab6a0b3>] do_mount+0x881/0xc60 fs/namespace.c:3143 [<0000000020f34e35>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000ba7e5d16>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000ba7e5d16>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000ba7e5d16>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000ace903e6>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000ff9b76bb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812089aa00 (size 256): comm "syz-executor426", pid 6806, jiffies 4294943345 (age 7.580s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008a4d3108>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000008a4d3108>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000008a4d3108>] slab_alloc mm/slab.c:3319 [inline] [<000000008a4d3108>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<000000000aa4db8b>] kmalloc include/linux/slab.h:552 [inline] [<000000000aa4db8b>] kzalloc include/linux/slab.h:686 [inline] [<000000000aa4db8b>] gfs2_init_fs_context+0x25/0x90 fs/gfs2/ops_fstype.c:1543 [<00000000cd1128b2>] gfs2_meta_init_fs_context+0x17/0x40 fs/gfs2/ops_fstype.c:1608 [<00000000b685cd62>] alloc_fs_context+0x174/0x200 fs/fs_context.c:293 [<00000000a786c7cc>] fs_context_for_mount+0x25/0x30 fs/fs_context.c:307 [<00000000dab6a0b3>] do_new_mount fs/namespace.c:2808 [inline] [<00000000dab6a0b3>] do_mount+0x881/0xc60 fs/namespace.c:3143 [<0000000020f34e35>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000ba7e5d16>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000ba7e5d16>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000ba7e5d16>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000ace903e6>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000ff9b76bb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9