Warning: Permanently added '10.128.0.2' (ECDSA) to the list of known hosts. syzkaller login: [ 43.907396][ T25] audit: type=1400 audit(1589557980.441:8): avc: denied { execmem } for pid=6624 comm="syz-executor177" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 63.857319][ T6624] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 66.476227][ T6624] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811b827d00 (size 32): comm "syz-executor177", pid 6625, jiffies 4294942459 (age 14.700s) hex dump (first 32 bytes): c0 a8 64 84 ff ff ff ff 00 a1 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<0000000066204f66>] genl_rcv_msg+0x360/0x520 [<00000000e449c460>] netlink_rcv_skb+0x5a/0x180 [<00000000944bf5b5>] genl_rcv+0x24/0x40 [<00000000551a0acd>] netlink_unicast+0x20a/0x2f0 [<00000000f830e36d>] netlink_sendmsg+0x2b5/0x560 [<00000000ace4993e>] sock_sendmsg+0x4c/0x60 [<00000000cadff2a6>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000b1378cd7>] ___sys_sendmsg+0x8a/0xd0 [<0000000014bf3113>] __sys_sendmsg+0x77/0xe0 [<00000000b8875f23>] do_syscall_64+0x6e/0x220 [<00000000f774baf2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c598ac0 (size 32): comm "syz-executor177", pid 6626, jiffies 4294943068 (age 8.610s) hex dump (first 32 bytes): c0 a8 64 84 ff ff ff ff 00 a1 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 ff ff ........_t:s0... backtrace: [<0000000066204f66>] genl_rcv_msg+0x360/0x520 [<00000000e449c460>] netlink_rcv_skb+0x5a/0x180 [<00000000944bf5b5>] genl_rcv+0x24/0x40 [<00000000551a0acd>] netlink_unicast+0x20a/0x2f0 [<00000000f830e36d>] netlink_sendmsg+0x2b5/0x560 [<00000000ace4993e>] sock_sendmsg+0x4c/0x60 [<00000000cadff2a6>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000b1378cd7>] ___sys_sendmsg+0x8a/0xd0 [<0000000014bf3113>] __sys_sendmsg+0x77/0xe0 [<00000000b8875f23>] do_syscall_64+0x6e/0x220 [<00000000f774baf2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9