Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. syzkaller login: [ 37.016928][ T25] audit: type=1400 audit(1591362626.573:8): avc: denied { execmem } for pid=6419 comm="syz-executor189" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 44.444388][ T6422] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 50.021508][ T6423] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 55.551311][ T6424] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 61.082390][ T6425] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 66.650605][ T6426] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 72.784221][ T6427] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 78.384609][ T6428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 83.949606][ T6429] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. executing program [ 89.624266][ T6430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor189'. [ 95.014359][ T6419] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888127865f00 (size 32): comm "syz-executor189", pid 6429, jiffies 4294945662 (age 13.440s) hex dump (first 32 bytes): c0 f9 64 84 ff ff ff ff e0 37 b5 83 ff ff ff ff ..d......7...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a69cdeeb>] genl_rcv_msg+0x360/0x520 [<0000000034915870>] netlink_rcv_skb+0x5a/0x180 [<00000000529a9a81>] genl_rcv+0x24/0x40 [<000000008e52377f>] netlink_unicast+0x20a/0x2f0 [<00000000d45ec2a9>] netlink_sendmsg+0x2b5/0x560 [<000000001e439d2a>] sock_sendmsg+0x4c/0x60 [<00000000a89c270b>] ____sys_sendmsg+0x2c4/0x2f0 [<000000006e2ca3c8>] ___sys_sendmsg+0x8a/0xd0 [<00000000c4048b25>] __sys_sendmsg+0x77/0xe0 [<00000000a0909b0d>] do_syscall_64+0x6e/0x220 [<000000009b2f7390>] entry_SYSCALL_64_after_hwframe+0x44/0xa9