udit: type=1400 audit(1573921864.587:42): avc:  denied  { map } for  pid=6955 comm="syz-executor402" path="/root/syz-executor402139955" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
executing program
BUG: memory leak
unreferenced object 0xffff88810cb29640 (size 1376):
  comm "syz-executor402", pid 6957, jiffies 4294941620 (age 13.360s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  +..@............
  backtrace:
    [<000000000f0828a4>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline]
    [<000000000f0828a4>] slab_post_alloc_hook mm/slab.h:586 [inline]
    [<000000000f0828a4>] slab_alloc mm/slab.c:3319 [inline]
    [<000000000f0828a4>] kmem_cache_alloc+0x13f/0x2c0 mm/slab.c:3483
    [<00000000f15a9170>] sk_prot_alloc+0x41/0x170 net/core/sock.c:1599
    [<000000000e6d05a0>] sk_alloc+0x35/0x2f0 net/core/sock.c:1659
    [<00000000dfcf460c>] smc_sock_alloc+0x4a/0x1a0 net/smc/af_smc.c:222
    [<0000000089d1bd2a>] smc_create+0x6b/0x160 net/smc/af_smc.c:1979
    [<000000009b2a18ae>] __sock_create+0x164/0x250 net/socket.c:1418
    [<00000000c4e3cef3>] sock_create net/socket.c:1469 [inline]
    [<00000000c4e3cef3>] __sys_socket+0x69/0x110 net/socket.c:1511
    [<000000003df89266>] __do_sys_socket net/socket.c:1520 [inline]
    [<000000003df89266>] __se_sys_socket net/socket.c:1518 [inline]
    [<000000003df89266>] __x64_sys_socket+0x1e/0x30 net/socket.c:1518
    [<0000000071f57cad>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290
    [<00000000e15397c2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9