Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. syzkaller login: [ 54.403272][ T25] audit: type=1400 audit(1589112326.786:8): avc: denied { execmem } for pid=6597 comm="syz-executor034" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 61.767309][ T6600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor034'. executing program [ 67.354889][ T6603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor034'. executing program [ 72.942601][ T6606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor034'. [ 74.180167][ T6597] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118b8c060 (size 32): comm "syz-executor034", pid 6603, jiffies 4294944007 (age 13.250s) hex dump (first 32 bytes): 80 a8 64 84 ff ff ff ff 48 9f b4 83 ff ff ff ff ..d.....H....... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<000000005453aa3b>] genl_rcv_msg+0x360/0x520 [<000000002b141c29>] netlink_rcv_skb+0x5a/0x180 [<00000000a1798a9d>] genl_rcv+0x24/0x40 [<0000000037046af4>] netlink_unicast+0x20a/0x2f0 [<000000000bc75237>] netlink_sendmsg+0x2b5/0x560 [<00000000221b5e0c>] sock_sendmsg+0x4c/0x60 [<000000002c83362e>] sock_no_sendpage+0x8c/0xb0 [<00000000c8053753>] kernel_sendpage+0x45/0x80 [<00000000f9c61cf8>] sock_sendpage+0x40/0x50 [<00000000f20a466f>] pipe_to_sendpage+0x87/0xe0 [<00000000c1fda592>] __splice_from_pipe+0x14a/0x250 [<00000000839cb1ea>] splice_from_pipe+0x70/0xb0 [<00000000b5149aab>] do_splice+0x38b/0x780 [<000000008505c561>] __x64_sys_splice+0xaa/0x110 [<00000000e545db57>] do_syscall_64+0x6e/0x220 [<0000000082efd6d0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9