DUID 00:04:1f:3a:56:02:d8:56:c9:ed:da:f3:fa:b7:9a:42:79:f6 forked to background, child pid 4655 [ 12.693848][ T4656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 12.695643][ T4656] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 69.947311][ T26] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts. executing program [ 91.041537][ T4995] netlink: 28 bytes leftover after parsing attributes in process `syz-executor409'. [ 91.050932][ T4995] netlink: 28 bytes leftover after parsing attributes in process `syz-executor409'. [ 91.060319][ T4995] netlink: 16 bytes leftover after parsing attributes in process `syz-executor409'. [ 92.138317][ T4992] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) executing program [ 96.301072][ T4998] netlink: 28 bytes leftover after parsing attributes in process `syz-executor409'. [ 96.311396][ T4998] netlink: 28 bytes leftover after parsing attributes in process `syz-executor409'. [ 96.320850][ T4998] netlink: 16 bytes leftover after parsing attributes in process `syz-executor409'. executing program [ 101.539064][ T5000] netlink: 28 bytes leftover after parsing attributes in process `syz-executor409'. [ 101.548453][ T5000] netlink: 28 bytes leftover after parsing attributes in process `syz-executor409'. [ 101.557912][ T5000] netlink: 16 bytes leftover after parsing attributes in process `syz-executor409'. [ 106.703313][ T4992] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810f80be00 (size 512): comm "syz-executor409", pid 4995, jiffies 4294946368 (age 17.790s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x4a/0x120 [] tcf_pedit_init+0x33b/0xa20 [] tcf_action_init_1+0x266/0x390 [] tcf_action_init+0x300/0x430 [] tcf_action_add+0x9b/0x270 [] tc_ctl_action+0x1b3/0x240 [] rtnetlink_rcv_msg+0x220/0x5d0 [] netlink_rcv_skb+0x91/0x1e0 [] netlink_unicast+0x39b/0x4d0 [] netlink_sendmsg+0x39a/0x720 [] sock_sendmsg+0x58/0xb0 [] ____sys_sendmsg+0x397/0x430 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x8c/0x100 [] do_syscall_64+0x39/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881097c2200 (size 512): comm "syz-executor409", pid 5000, jiffies 4294947418 (age 7.290s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x4a/0x120 [] tcf_pedit_init+0x33b/0xa20 [] tcf_action_init_1+0x266/0x390 [] tcf_action_init+0x300/0x430 [] tcf_action_add+0x9b/0x270 [] tc_ctl_action+0x1b3/0x240 [] rtnetlink_rcv_msg+0x220/0x5d0 [] netlink_rcv_skb+0x91/0x1e0 [] netlink_unicast+0x39b/0x4d0 [] netlink_sendmsg+0x39a/0x720 [] sock_sendmsg+0x58/0xb0 [] ____sys_sendmsg+0x397/0x430 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x8c/0x100 [] do_syscall_64+0x39/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd