Warning: Permanently added '10.128.1.123' (ECDSA) to the list of known hosts. executing program executing program executing program syzkaller login: [ 174.110353][ T8398] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810df06400 (size 232): comm "syz-executor148", pid 8409, jiffies 4294954039 (age 12.680s) hex dump (first 32 bytes): 10 81 32 0f 81 88 ff ff 10 81 32 0f 81 88 ff ff ..2.......2..... 00 00 00 00 00 00 00 00 40 80 32 0f 81 88 ff ff ........@.2..... backtrace: [<000000008d80adad>] __alloc_skb+0x20f/0x280 [<000000009cd227ec>] __pskb_copy_fclone+0x73/0x330 [<00000000645c2fc5>] hwsim_hw_xmit+0xd3/0x140 [<000000000bffeb79>] ieee802154_tx+0xc7/0x190 [<000000003fb19a3c>] ieee802154_subif_start_xmit+0x58/0x70 [<00000000c52c11e8>] dev_hard_start_xmit+0xe1/0x330 [<00000000f3382202>] sch_direct_xmit+0x1c5/0x500 [<00000000f04bac60>] __qdisc_run+0x201/0x810 [<00000000ad862aa6>] __dev_queue_xmit+0xb9f/0xf60 [<00000000a84d115c>] dgram_sendmsg+0x40c/0x4d0 [<000000005e7c0389>] sock_sendmsg+0x56/0x80 [<00000000fcd3c30a>] ____sys_sendmsg+0x36c/0x390 [<000000002c8516e7>] ___sys_sendmsg+0x8b/0xd0 [<000000009f5d6cb8>] __sys_sendmsg+0x88/0x100 [<00000000d9567134>] do_syscall_64+0x2d/0x70 [<00000000d88c172d>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810deedc00 (size 512): comm "syz-executor148", pid 8409, jiffies 4294954039 (age 12.680s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bf39752f>] __alloc_skb+0xdf/0x280 [<000000009cd227ec>] __pskb_copy_fclone+0x73/0x330 [<00000000645c2fc5>] hwsim_hw_xmit+0xd3/0x140 [<000000000bffeb79>] ieee802154_tx+0xc7/0x190 [<000000003fb19a3c>] ieee802154_subif_start_xmit+0x58/0x70 [<00000000c52c11e8>] dev_hard_start_xmit+0xe1/0x330 [<00000000f3382202>] sch_direct_xmit+0x1c5/0x500 [<00000000f04bac60>] __qdisc_run+0x201/0x810 [<00000000ad862aa6>] __dev_queue_xmit+0xb9f/0xf60 [<00000000a84d115c>] dgram_sendmsg+0x40c/0x4d0 [<000000005e7c0389>] sock_sendmsg+0x56/0x80 [<00000000fcd3c30a>] ____sys_sendmsg+0x36c/0x390 [<000000002c8516e7>] ___sys_sendmsg+0x8b/0xd0 [<000000009f5d6cb8>] __sys_sendmsg+0x88/0x100 [<00000000d9567134>] do_syscall_64+0x2d/0x70 [<00000000d88c172d>] entry_SYSCALL_64_after_hwframe+0x44/0xae