Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. syzkaller login: [ 43.231270][ T26] audit: type=1400 audit(1591516486.099:8): avc: denied { execmem } for pid=6442 comm="syz-executor337" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 50.725398][ T6443] IPVS: ftp: loaded support on port[0] = 21 [ 50.746479][ T6443] chnl_net:caif_netlink_parms(): no params data found [ 50.800017][ T6443] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.807700][ T6443] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.815193][ T6443] device bridge_slave_0 entered promiscuous mode [ 50.822639][ T6443] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.829838][ T6443] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.837085][ T6443] device bridge_slave_1 entered promiscuous mode [ 50.846695][ T6443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.856687][ T6443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.869849][ T6443] team0: Port device team_slave_0 added [ 50.875831][ T6443] team0: Port device team_slave_1 added [ 50.884377][ T6443] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.891322][ T6443] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.917206][ T6443] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.928128][ T6443] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.935099][ T6443] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.960982][ T6443] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.999930][ T6443] device hsr_slave_0 entered promiscuous mode [ 51.059165][ T6443] device hsr_slave_1 entered promiscuous mode [ 51.138815][ T6443] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 51.199736][ T6443] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 51.229779][ T6443] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 51.259806][ T6443] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 51.303529][ T6443] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.310778][ T6443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.317994][ T6443] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.325019][ T6443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.341318][ T6443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.349999][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.357481][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.365761][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.373253][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.381811][ T6443] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.389875][ T6061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.398403][ T6061] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.405431][ T6061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.413708][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.422103][ T16] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.429260][ T16] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.439881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.448189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.456848][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.465918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.475094][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.483838][ T6443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.493787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 51.501350][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 51.510371][ T6443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.520393][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.532008][ T6443] device veth0_vlan entered promiscuous mode [ 51.538883][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.546759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.554353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.562832][ T6443] device veth1_vlan entered promiscuous mode [ 51.572748][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.580659][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.588365][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.597484][ T6443] device veth0_macvtap entered promiscuous mode executing program [ 51.605005][ T6443] device veth1_macvtap entered promiscuous mode [ 51.614294][ T6443] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.621778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.630212][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 51.638732][ T6443] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.646699][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 58.915111][ T6443] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 65.580570][ T6443] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811589cd80 (size 96): comm "syz-executor337", pid 6663, jiffies 4294942418 (age 13.980s) hex dump (first 32 bytes): 00 c9 89 15 81 88 ff ff 68 f9 ff 00 00 c9 ff ff ........h....... 00 cd 89 15 81 88 ff ff 60 52 c5 82 ff ff ff ff ........`R...... backtrace: [<00000000104a1f01>] nft_netdev_hook_alloc+0x3b/0xd0 [<000000003bc42f25>] nf_tables_parse_netdev_hooks+0x94/0x210 [<000000004b6a9590>] nft_flowtable_parse_hook+0x101/0x1d0 [<000000004204916e>] nf_tables_delflowtable+0x249/0x4a0 [<00000000fa0bd6d2>] nfnetlink_rcv_batch+0x2f3/0x810 [<000000004d4e8df7>] nfnetlink_rcv+0x183/0x1b0 [<000000001710060c>] netlink_unicast+0x20a/0x2f0 [<00000000bb814b80>] netlink_sendmsg+0x2b5/0x560 [<00000000eb7a00fe>] sock_sendmsg+0x4c/0x60 [<000000008cc37c52>] ____sys_sendmsg+0x2c4/0x2f0 [<00000000b882e46e>] ___sys_sendmsg+0x8a/0xd0 [<00000000870e7750>] __sys_sendmsg+0x77/0xe0 [<000000002b222e75>] do_syscall_64+0x6e/0x220 [<00000000356e1a8a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811589c900 (size 96): comm "syz-executor337", pid 6663, jiffies 4294942418 (age 13.980s) hex dump (first 32 bytes): 68 f9 ff 00 00 c9 ff ff 80 cd 89 15 81 88 ff ff h............... 00 00 00 00 00 00 00 00 60 52 c5 82 ff ff ff ff ........`R...... backtrace: [<00000000104a1f01>] nft_netdev_hook_alloc+0x3b/0xd0 [<000000003bc42f25>] nf_tables_parse_netdev_hooks+0x94/0x210 [<000000004b6a9590>] nft_flowtable_parse_hook+0x101/0x1d0 [<000000004204916e>] nf_tables_delflowtable+0x249/0x4a0 [<00000000fa0bd6d2>] nfnetlink_rcv_batch+0x2f3/0x810 [<000000004d4e8df7>] nfnetlink_rcv+0x183/0x1b0 [<000000001710060c>] netlink_unicast+0x20a/0x2f0 [<00000000bb814b80>] netlink_sendmsg+0x2b5/0x560 [<00000000eb7a00fe>] sock_sendmsg+0x4c/0x60 [<000000008cc37c52>] ____sys_sendmsg+0x2c4/0x2f0 [<00000000b882e46e>] ___sys_sendmsg+0x8a/0xd0 [<00000000870e7750>] __sys_sendmsg+0x77/0xe0 [<000000002b222e75>] do_syscall_64+0x6e/0x220 [<00000000356e1a8a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115961800 (size 96): comm "syz-executor337", pid 6664, jiffies 4294943010 (age 8.060s) hex dump (first 32 bytes): 00 19 96 15 81 88 ff ff 68 f9 ff 00 00 c9 ff ff ........h....... 00 00 00 00 00 00 00 00 60 52 c5 82 ff ff ff ff ........`R...... backtrace: [<00000000104a1f01>] nft_netdev_hook_alloc+0x3b/0xd0 [<000000003bc42f25>] nf_tables_parse_netdev_hooks+0x94/0x210 [<000000004b6a9590>] nft_flowtable_parse_hook+0x101/0x1d0 [<000000004204916e>] nf_tables_delflowtable+0x249/0x4a0 [<00000000fa0bd6d2>] nfnetlink_rcv_batch+0x2f3/0x810 [<000000004d4e8df7>] nfnetlink_rcv+0x183/0x1b0 [<000000001710060c>] netlink_unicast+0x20a/0x2f0 [<00000000bb814b80>] netlink_sendmsg+0x2b5/0x560 [<00000000eb7a00fe>] sock_sendmsg+0x4c/0x60 [<000000008cc37c52>] ____sys_sendmsg+0x2c4/0x2f0 [<00000000b882e46e>] ___sys_sendmsg+0x8a/0xd0 [<00000000870e7750>] __sys_sendmsg+0x77/0xe0 [<000000002b222e75>] do_syscall_64+0x6e/0x220 [<00000000356e1a8a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9