Warning: Permanently added '10.128.0.2' (ECDSA) to the list of known hosts. syzkaller login: [ 64.614390][ T24] audit: type=1400 audit(1598391164.154:8): avc: denied { execmem } for pid=6483 comm="syz-executor763" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 79.082271][ T6483] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811979db00 (size 224): comm "syz-executor763", pid 6484, jiffies 4294944519 (age 12.940s) hex dump (first 32 bytes): a0 14 a7 18 81 88 ff ff a0 14 a7 18 81 88 ff ff ................ 00 40 d6 19 81 88 ff ff 00 00 00 00 00 00 00 00 .@.............. backtrace: [<000000000a20945d>] __build_skb+0x1f/0x100 [<00000000ea4b233e>] __napi_alloc_skb+0xe5/0x140 [<00000000b8b63e5b>] napi_get_frags+0x3a/0x70 [<0000000070fab16d>] tun_get_user+0xa43/0x1660 [<00000000683e5d4c>] tun_chr_write_iter+0x66/0xa0 [<000000005c1bb210>] new_sync_write+0x173/0x210 [<00000000279772e7>] __kernel_write+0x140/0x1f0 [<00000000c0fff569>] write_pipe_buf+0x61/0x80 [<00000000fade64b4>] __splice_from_pipe+0x154/0x290 [<00000000f81ad189>] do_splice+0x772/0x8d0 [<00000000a08a2dbd>] __x64_sys_splice+0xaa/0x110 [<00000000a57bb725>] do_syscall_64+0x2d/0x70 [<00000000967f7d09>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118194800 (size 1024): comm "syz-executor763", pid 6484, jiffies 4294944519 (age 12.940s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ea70c5dd>] pskb_expand_head+0x8e/0x480 [<0000000097172e29>] tun_get_user+0xd71/0x1660 [<00000000683e5d4c>] tun_chr_write_iter+0x66/0xa0 [<000000005c1bb210>] new_sync_write+0x173/0x210 [<00000000279772e7>] __kernel_write+0x140/0x1f0 [<00000000c0fff569>] write_pipe_buf+0x61/0x80 [<00000000fade64b4>] __splice_from_pipe+0x154/0x290 [<00000000f81ad189>] do_splice+0x772/0x8d0 [<00000000a08a2dbd>] __x64_sys_splice+0xaa/0x110 [<00000000a57bb725>] do_syscall_64+0x2d/0x70 [<00000000967f7d09>] entry_SYSCALL_64_after_hwframe+0x44/0xa9