[ 27.833684][ T26] audit: type=1400 audit(1579688693.256:37): avc: denied { watch } for pid=7133 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 27.860253][ T26] audit: type=1400 audit(1579688693.256:38): avc: denied { watch } for pid=7133 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.105874][ T26] audit: type=1800 audit(1579688693.536:39): pid=7042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.127568][ T26] audit: type=1800 audit(1579688693.536:40): pid=7042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.970451][ T26] audit: type=1400 audit(1579688697.396:41): avc: denied { map } for pid=7225 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.139' (ECDSA) to the list of known hosts. [ 54.461389][ T26] audit: type=1400 audit(1579688719.886:42): avc: denied { map } for pid=7240 comm="syz-executor512" path="/root/syz-executor512351557" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 61.200663][ T7241] IPVS: ftp: loaded support on port[0] = 21 [ 61.218397][ T7241] chnl_net:caif_netlink_parms(): no params data found [ 61.230272][ T7241] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.237346][ T7241] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.244640][ T7241] device bridge_slave_0 entered promiscuous mode [ 61.251401][ T7241] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.258551][ T7241] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.265882][ T7241] device bridge_slave_1 entered promiscuous mode [ 61.274969][ T7241] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.284551][ T7241] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.296466][ T7241] team0: Port device team_slave_0 added [ 61.302599][ T7241] team0: Port device team_slave_1 added [ 61.310543][ T7241] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.317546][ T7241] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.343397][ T7241] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.354299][ T7241] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.361216][ T7241] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.387082][ T7241] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.474415][ T7241] device hsr_slave_0 entered promiscuous mode [ 61.523935][ T7241] device hsr_slave_1 entered promiscuous mode [ 61.579794][ T26] audit: type=1400 audit(1579688727.006:43): avc: denied { create } for pid=7241 comm="syz-executor512" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 61.579924][ T7241] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.607294][ T26] audit: type=1400 audit(1579688727.006:44): avc: denied { write } for pid=7241 comm="syz-executor512" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 61.635798][ T26] audit: type=1400 audit(1579688727.006:45): avc: denied { read } for pid=7241 comm="syz-executor512" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 61.644951][ T7241] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.704600][ T7241] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.744597][ T7241] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.806810][ T7241] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.813904][ T7241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.821095][ T7241] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.828163][ T7241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.843675][ T7241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.852325][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.869991][ T16] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.888167][ T16] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.895552][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.904143][ T7241] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.912033][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.920235][ T3549] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.927305][ T3549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.935772][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.944238][ T16] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.951247][ T16] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.963888][ T7241] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.974527][ T7241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.986215][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.994617][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.002690][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.011014][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.018917][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.026196][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.037297][ T7241] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.044571][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 62.051884][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 62.062182][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.074336][ T7241] device veth0_vlan entered promiscuous mode [ 62.081758][ T7241] device veth1_vlan entered promiscuous mode [ 62.088170][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.096052][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.103389][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.111041][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 62.122705][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 62.130655][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.139772][ T7241] device veth0_macvtap entered promiscuous mode [ 62.147226][ T7241] device veth1_macvtap entered promiscuous mode executing program [ 62.156651][ T7241] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 62.163886][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.172331][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 62.181031][ T7241] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 62.188498][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.200102][ T26] audit: type=1400 audit(1579688727.626:46): avc: denied { create } for pid=7247 comm="syz-executor512" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 62.202779][ T7247] FAULT_INJECTION: forcing a failure. [ 62.202779][ T7247] name failslab, interval 1, probability 0, space 0, times 1 [ 62.225500][ T26] audit: type=1400 audit(1579688727.626:47): avc: denied { write } for pid=7247 comm="syz-executor512" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 62.238276][ T7247] CPU: 1 PID: 7247 Comm: syz-executor512 Not tainted 5.5.0-rc7-syzkaller #0 [ 62.271443][ T7247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.281481][ T7247] Call Trace: [ 62.284746][ T7247] dump_stack+0xbc/0xe6 [ 62.288887][ T7247] should_fail.cold+0x3c/0x49 [ 62.293543][ T7247] __should_failslab+0x65/0xa0 [ 62.298279][ T7247] should_failslab+0x9/0x14 [ 62.302773][ T7247] __kmalloc+0x54/0x300 [ 62.306904][ T7247] ? nla_strcmp+0x65/0x80 [ 62.311252][ T7247] ? kzalloc+0x1e/0x30 [ 62.315309][ T7247] kzalloc+0x1e/0x30 [ 62.319194][ T7247] nf_tables_newflowtable+0x1de/0x930 [ 62.324549][ T7247] ? __nla_parse+0x43/0x60 [ 62.328943][ T7247] ? nf_tables_newobj+0x670/0x670 [ 62.333949][ T7247] nfnetlink_rcv_batch+0x662/0x8c0 [ 62.339037][ T7247] ? __nla_validate_parse+0x7b/0xab0 [ 62.344307][ T7247] ? security_capable+0x5d/0x80 [ 62.349153][ T7247] ? __nla_parse+0x43/0x60 [ 62.353551][ T7247] nfnetlink_rcv+0x189/0x1c0 [ 62.358124][ T7247] ? netlink_deliver_tap+0x50/0x270 [ 62.363305][ T7247] netlink_unicast+0x223/0x310 [ 62.368054][ T7247] netlink_sendmsg+0x2c0/0x570 [ 62.372987][ T7247] sock_sendmsg+0x54/0x70 [ 62.377314][ T7247] ____sys_sendmsg+0x2d0/0x300 [ 62.382064][ T7247] ___sys_sendmsg+0x8a/0xd0 [ 62.386596][ T7247] ? kstrtouint+0x76/0xa0 [ 62.390905][ T7247] ? kstrtouint_from_user+0x7f/0xb0 [ 62.396090][ T7247] ? __fget_light+0x70/0xb0 [ 62.400626][ T7247] ? __fdget+0x1b/0x20 [ 62.404735][ T7247] ? sockfd_lookup_light+0x6c/0xb0 [ 62.409830][ T7247] __sys_sendmsg+0x80/0xf0 [ 62.414229][ T7247] __x64_sys_sendmsg+0x23/0x30 [ 62.418975][ T7247] do_syscall_64+0x73/0x220 [ 62.423460][ T7247] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.429329][ T7247] RIP: 0033:0x443639 [ 62.433317][ T7247] Code: e8 8c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 62.452897][ T7247] RSP: 002b:00007ffdceedc898 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 62.461276][ T7247] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443639 [ 62.469226][ T7247] RDX: 0000000000000000 RSI: 0000000020003e00 RDI: 0000000000000003 [ 62.477177][ T7247] RBP: ffffffffffffffff R08: 0000000000000002 R09: 00007ffdceedc910 [ 62.485139][ T7247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 62.493084][ T7247] R13: 00007ffdceedc910 R14: 0000000000000000 R15: 0000000000000000 executing program [ 67.658503][ T7248] FAULT_INJECTION: forcing a failure. [ 67.658503][ T7248] name failslab, interval 1, probability 0, space 0, times 0 [ 67.671344][ T7248] CPU: 0 PID: 7248 Comm: syz-executor512 Not tainted 5.5.0-rc7-syzkaller #0 [ 67.680005][ T7248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.690047][ T7248] Call Trace: [ 67.693312][ T7248] dump_stack+0xbc/0xe6 [ 67.697550][ T7248] should_fail.cold+0x3c/0x49 [ 67.702204][ T7248] __should_failslab+0x65/0xa0 [ 67.706948][ T7248] should_failslab+0x9/0x14 [ 67.711477][ T7248] kmem_cache_alloc_node_trace+0x3c/0x2f0 [ 67.717257][ T7248] ? on_each_cpu+0x96/0xc0 [ 67.721680][ T7248] __kmalloc_node+0x38/0x50 [ 67.726171][ T7248] kvmalloc_node+0x4a/0xd0 [ 67.730561][ T7248] allocate_hook_entries_size+0x3b/0x60 [ 67.736097][ T7248] nf_hook_entries_grow+0x232/0x270 [ 67.741293][ T7248] ? nf_flow_table_offload_setup+0x1ac/0x230 [ 67.747265][ T7248] ? __this_cpu_preempt_check+0x29/0xb0 [ 67.752785][ T7248] __nf_register_net_hook+0x9a/0x170 [ 67.758081][ T7248] nf_register_net_hook+0x34/0xc0 [ 67.763096][ T7248] nf_tables_newflowtable+0x724/0x930 [ 67.768447][ T7248] ? nf_tables_newobj+0x670/0x670 [ 67.773454][ T7248] nfnetlink_rcv_batch+0x662/0x8c0 [ 67.778550][ T7248] ? __nla_validate_parse+0x7b/0xab0 [ 67.783818][ T7248] ? security_capable+0x5d/0x80 [ 67.788640][ T7248] ? __nla_parse+0x43/0x60 [ 67.793025][ T7248] nfnetlink_rcv+0x189/0x1c0 [ 67.797705][ T7248] ? netlink_deliver_tap+0x50/0x270 [ 67.802876][ T7248] netlink_unicast+0x223/0x310 [ 67.807661][ T7248] netlink_sendmsg+0x2c0/0x570 [ 67.812413][ T7248] sock_sendmsg+0x54/0x70 [ 67.816722][ T7248] ____sys_sendmsg+0x2d0/0x300 [ 67.821464][ T7248] ___sys_sendmsg+0x8a/0xd0 [ 67.825953][ T7248] ? kstrtouint+0x76/0xa0 [ 67.830264][ T7248] ? kstrtouint_from_user+0x7f/0xb0 [ 67.835553][ T7248] ? __fget_light+0x70/0xb0 [ 67.840045][ T7248] ? __fdget+0x1b/0x20 [ 67.844100][ T7248] ? sockfd_lookup_light+0x6c/0xb0 [ 67.849198][ T7248] __sys_sendmsg+0x80/0xf0 [ 67.853725][ T7248] __x64_sys_sendmsg+0x23/0x30 [ 67.858480][ T7248] do_syscall_64+0x73/0x220 [ 67.862981][ T7248] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.868855][ T7248] RIP: 0033:0x443639 [ 67.872731][ T7248] Code: e8 8c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.892314][ T7248] RSP: 002b:00007ffdceedc898 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 67.900704][ T7248] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443639 [ 67.908659][ T7248] RDX: 0000000000000000 RSI: 0000000020003e00 RDI: 0000000000000003 [ 67.916611][ T7248] RBP: ffffffffffffffff R08: 0000000000000002 R09: 00007ffdceedc910 [ 67.924567][ T7248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 67.932566][ T7248] R13: 00007ffdceedc910 R14: 0000000000000000 R15: 0000000000000000 [ 71.743927][ T0] NOHZ: local_softirq_pending 08 executing program [ 73.102879][ T7249] FAULT_INJECTION: forcing a failure. [ 73.102879][ T7249] name failslab, interval 1, probability 0, space 0, times 0 [ 73.115538][ T7249] CPU: 1 PID: 7249 Comm: syz-executor512 Not tainted 5.5.0-rc7-syzkaller #0 [ 73.124192][ T7249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.134231][ T7249] Call Trace: [ 73.137498][ T7249] dump_stack+0xbc/0xe6 [ 73.141627][ T7249] should_fail.cold+0x3c/0x49 [ 73.146292][ T7249] __should_failslab+0x65/0xa0 [ 73.151024][ T7249] should_failslab+0x9/0x14 [ 73.155498][ T7249] kmem_cache_alloc_node_trace+0x3c/0x2f0 [ 73.161202][ T7249] ? on_each_cpu+0x96/0xc0 [ 73.165601][ T7249] __kmalloc_node+0x38/0x50 [ 73.170076][ T7249] kvmalloc_node+0x4a/0xd0 [ 73.174479][ T7249] allocate_hook_entries_size+0x3b/0x60 [ 73.180095][ T7249] nf_hook_entries_grow+0x232/0x270 [ 73.185286][ T7249] ? nf_flow_table_offload_setup+0x1ac/0x230 [ 73.191240][ T7249] ? __this_cpu_preempt_check+0x29/0xb0 [ 73.196763][ T7249] __nf_register_net_hook+0x9a/0x170 [ 73.202048][ T7249] nf_register_net_hook+0x34/0xc0 [ 73.207047][ T7249] nf_tables_newflowtable+0x724/0x930 [ 73.212389][ T7249] ? nf_tables_newobj+0x670/0x670 [ 73.217382][ T7249] nfnetlink_rcv_batch+0x662/0x8c0 [ 73.222490][ T7249] ? __nla_validate_parse+0x7b/0xab0 [ 73.227751][ T7249] ? security_capable+0x5d/0x80 [ 73.232568][ T7249] ? __nla_parse+0x43/0x60 [ 73.236963][ T7249] nfnetlink_rcv+0x189/0x1c0 [ 73.241530][ T7249] ? netlink_deliver_tap+0x50/0x270 [ 73.246701][ T7249] netlink_unicast+0x223/0x310 [ 73.251434][ T7249] netlink_sendmsg+0x2c0/0x570 [ 73.256171][ T7249] sock_sendmsg+0x54/0x70 [ 73.260472][ T7249] ____sys_sendmsg+0x2d0/0x300 [ 73.265205][ T7249] ___sys_sendmsg+0x8a/0xd0 [ 73.269679][ T7249] ? kstrtouint+0x76/0xa0 [ 73.274037][ T7249] ? kstrtouint_from_user+0x7f/0xb0 [ 73.279207][ T7249] ? __fget_light+0x70/0xb0 [ 73.283679][ T7249] ? __fdget+0x1b/0x20 [ 73.287845][ T7249] ? sockfd_lookup_light+0x6c/0xb0 [ 73.292942][ T7249] __sys_sendmsg+0x80/0xf0 [ 73.297400][ T7249] __x64_sys_sendmsg+0x23/0x30 [ 73.302313][ T7249] do_syscall_64+0x73/0x220 [ 73.306790][ T7249] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.312657][ T7249] RIP: 0033:0x443639 [ 73.316521][ T7249] Code: e8 8c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 73.336158][ T7249] RSP: 002b:00007ffdceedc898 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 73.344544][ T7249] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443639 [ 73.352487][ T7249] RDX: 0000000000000000 RSI: 0000000020003e00 RDI: 0000000000000003 [ 73.360430][ T7249] RBP: ffffffffffffffff R08: 0000000000000002 R09: 00007ffdceedc910 [ 73.368523][ T7249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 73.376465][ T7249] R13: 00007ffdceedc910 R14: 0000000000000000 R15: 0000000000000000 [ 74.428189][ T7241] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881218a8d00 (size 96): comm "syz-executor512", pid 7248, jiffies 4294944039 (age 12.900s) hex dump (first 32 bytes): 40 f4 b5 21 81 88 ff ff 40 f4 b5 21 81 88 ff ff @..!....@..!.... 60 64 c3 82 ff ff ff ff 00 70 88 21 81 88 ff ff `d.......p.!.... backtrace: [<00000000ca3c9952>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000009c36747e>] nft_netdev_hook_alloc+0x3f/0xd0 [<000000005f13eef2>] nf_tables_parse_netdev_hooks+0xaa/0x220 [<00000000e501f4e4>] nf_tables_newflowtable+0x41e/0x930 [<000000003d3a9b7a>] nfnetlink_rcv_batch+0x662/0x8c0 [<00000000b835e582>] nfnetlink_rcv+0x189/0x1c0 [<00000000059f6ccc>] netlink_unicast+0x223/0x310 [<00000000f03634c4>] netlink_sendmsg+0x2c0/0x570 [<000000003120c8b4>] sock_sendmsg+0x54/0x70 [<000000002416926f>] ____sys_sendmsg+0x2d0/0x300 [<00000000714650b7>] ___sys_sendmsg+0x8a/0xd0 [<000000008e737a1f>] __sys_sendmsg+0x80/0xf0 [<000000009a4a7988>] __x64_sys_sendmsg+0x23/0x30 [<00000000a37143ae>] do_syscall_64+0x73/0x220 [<000000007e9134a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9