forked to background, child pid 3179 [ 11.503680][ T3180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 11.505798][ T3180] eql: remember to turn off Van-Jacobson compression on your slave devices [ 11.603717][ T3264] ssh-keygen (3264) used greatest stack depth: 10704 bytes left Starting sshd: OK syzkaller syzkaller login: [ 69.865136][ T140] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.1.12' (ECDSA) to the list of known hosts. executing program [ 126.166085][ T3612] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 126.199884][ T3613] syz-executor676 uses obsolete (PF_INET,SOCK_PACKET) [ 126.206998][ T3613] device syzkaller1 entered promiscuous mode executing program [ 131.511295][ T3617] device syzkaller1 entered promiscuous mode executing program [ 136.871895][ T3623] device syzkaller1 entered promiscuous mode executing program [ 142.194298][ T3628] device syzkaller1 entered promiscuous mode executing program [ 147.555086][ T3673] device syzkaller1 entered promiscuous mode executing program [ 152.875318][ T3679] device syzkaller1 entered promiscuous mode [ 158.113581][ T3612] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810f285900 (size 240): comm "sshd", pid 3389, jiffies 4294939275 (age 140.250s) hex dump (first 32 bytes): e0 e4 34 06 81 88 ff ff e0 e4 34 06 81 88 ff ff ..4.......4..... 00 00 01 13 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1f9/0x270 [] __tcp_send_ack.part.0+0x3a/0x1d0 [] tcp_send_ack+0x32/0x40 [] __tcp_cleanup_rbuf+0x15d/0x1b0 [] tcp_recvmsg_locked+0x3c5/0xfc0 [] tcp_recvmsg+0x9a/0x320 [] inet_recvmsg+0x78/0x180 [] sock_read_iter+0x15f/0x1b0 [] vfs_read+0x3b1/0x400 [] ksys_read+0x12b/0x160 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd