Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 54.490310][ T8400] IPVS: ftp: loaded support on port[0] = 21 executing program [ 60.823759][ T8400] kmemleak: 52 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d8f3900 (size 256): comm "syz-executor332", pid 8421, jiffies 4294942719 (age 12.670s) hex dump (first 32 bytes): 00 60 2a 0e 81 88 ff ff 00 00 00 00 00 00 00 00 .`*............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ad74ce84>] tcindex_set_parms+0xa3/0xbc0 [<000000008cbe6892>] tcindex_change+0xe8/0x120 [<00000000e1adcf93>] tc_new_tfilter+0xa33/0x1030 [<000000000cd442a1>] rtnetlink_rcv_msg+0x422/0x520 [<00000000bec66633>] netlink_rcv_skb+0x87/0x1d0 [<00000000b28901c0>] netlink_unicast+0x392/0x4c0 [<000000001e10919d>] netlink_sendmsg+0x368/0x6a0 [<0000000039630702>] sock_sendmsg+0x56/0x80 [<00000000579f20d1>] ____sys_sendmsg+0x17a/0x390 [<000000001e67236d>] ___sys_sendmsg+0x8b/0xd0 [<000000009f9095d9>] __sys_sendmmsg+0xed/0x290 [<00000000e6f31457>] __x64_sys_sendmmsg+0x24/0x30 [<0000000070ca88ba>] do_syscall_64+0x2d/0x70 [<00000000316425bd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810e39ad00 (size 256): comm "syz-executor332", pid 8421, jiffies 4294942719 (age 12.670s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000dbcb1ed>] tcindex_alloc_perfect_hash+0x8f/0x140 [<00000000343cf669>] tcindex_set_parms+0xa60/0xbc0 [<000000008cbe6892>] tcindex_change+0xe8/0x120 [<00000000e1adcf93>] tc_new_tfilter+0xa33/0x1030 [<000000000cd442a1>] rtnetlink_rcv_msg+0x422/0x520 [<00000000bec66633>] netlink_rcv_skb+0x87/0x1d0 [<00000000b28901c0>] netlink_unicast+0x392/0x4c0 [<000000001e10919d>] netlink_sendmsg+0x368/0x6a0 [<0000000039630702>] sock_sendmsg+0x56/0x80 [<00000000579f20d1>] ____sys_sendmsg+0x17a/0x390 [<000000001e67236d>] ___sys_sendmsg+0x8b/0xd0 [<000000009f9095d9>] __sys_sendmmsg+0xed/0x290 [<00000000e6f31457>] __x64_sys_sendmmsg+0x24/0x30 [<0000000070ca88ba>] do_syscall_64+0x2d/0x70 [<00000000316425bd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810e39ab00 (size 256): comm "syz-executor332", pid 8421, jiffies 4294942719 (age 12.670s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000dbcb1ed>] tcindex_alloc_perfect_hash+0x8f/0x140 [<00000000343cf669>] tcindex_set_parms+0xa60/0xbc0 [<000000008cbe6892>] tcindex_change+0xe8/0x120 [<00000000e1adcf93>] tc_new_tfilter+0xa33/0x1030 [<000000000cd442a1>] rtnetlink_rcv_msg+0x422/0x520 [<00000000bec66633>] netlink_rcv_skb+0x87/0x1d0 [<00000000b28901c0>] netlink_unicast+0x392/0x4c0 [<000000001e10919d>] netlink_sendmsg+0x368/0x6a0 [<0000000039630702>] sock_sendmsg+0x56/0x80 [<00000000579f20d1>] ____sys_sendmsg+0x17a/0x390 [<000000001e67236d>] ___sys_sendmsg+0x8b/0xd0 [<000000009f9095d9>] __sys_sendmmsg+0xed/0x290 [<00000000e6f31457>] __x64_sys_sendmmsg+0x24/0x30 [<0000000070ca88ba>] do_syscall_64+0x2d/0x70 [<00000000316425bd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.109602][ T8400] kmemleak: 55 new suspected memory leaks (see /sys/kernel/debug/kmemleak)