[ 58.183983] audit: type=1800 audit(1538674751.214:27): pid=6060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 59.827109] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 60.686351] random: sshd: uninitialized urandom read (32 bytes read) [ 61.187341] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 63.613668] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.27' (ECDSA) to the list of known hosts. [ 69.340812] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/04 17:39:24 fuzzer started [ 74.125997] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/04 17:39:29 dialing manager at 10.128.0.26:36867 2018/10/04 17:39:29 syscalls: 1 2018/10/04 17:39:29 code coverage: enabled 2018/10/04 17:39:29 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/04 17:39:29 setuid sandbox: enabled 2018/10/04 17:39:29 namespace sandbox: enabled 2018/10/04 17:39:29 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/04 17:39:29 fault injection: enabled 2018/10/04 17:39:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/04 17:39:29 net packed injection: enabled 2018/10/04 17:39:29 net device setup: enabled [ 79.210355] random: crng init done 17:41:36 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) [ 204.271029] IPVS: ftp: loaded support on port[0] = 21 [ 206.443242] ip (6254) used greatest stack depth: 53056 bytes left [ 206.750503] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.757165] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.765939] device bridge_slave_0 entered promiscuous mode [ 206.911738] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.918604] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.927257] device bridge_slave_1 entered promiscuous mode [ 207.073632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.215845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 17:41:40 executing program 1: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) [ 207.661823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.958834] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.223375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 208.230488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.379472] IPVS: ftp: loaded support on port[0] = 21 [ 208.496785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.504067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.160729] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.169255] team0: Port device team_slave_0 added [ 209.360656] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.369202] team0: Port device team_slave_1 added [ 209.677569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.684931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.694205] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.945900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.953457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.962680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.138226] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.146164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.155674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.343472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.351219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.360583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.204983] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.211488] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.220167] device bridge_slave_0 entered promiscuous mode [ 212.517203] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.523921] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.532589] device bridge_slave_1 entered promiscuous mode [ 212.709004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.782192] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.788722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.795902] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.802488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.811697] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.965120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.265267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.502917] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.747679] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:41:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00\x00V'], 0x1}}, 0x0) semget(0x0, 0x1, 0x20) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000240)=""/112) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000080)=""/59) socketpair$inet6(0xa, 0x1, 0x2, &(0x7f0000000640)) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) read$FUSE(r2, &(0x7f0000001000), 0x1000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000340)={0x50}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) [ 213.957347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.966345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.276102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.283420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.909218] IPVS: ftp: loaded support on port[0] = 21 [ 215.210212] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.218579] team0: Port device team_slave_0 added [ 215.516613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.525107] team0: Port device team_slave_1 added [ 215.865049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.872224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.881198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.236962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.244961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.253993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.504524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.512464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.521755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.800157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.809809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.819357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.658160] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.665462] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.674112] device bridge_slave_0 entered promiscuous mode [ 220.028022] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.034691] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.043564] device bridge_slave_1 entered promiscuous mode [ 220.079526] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.086168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.093264] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.099750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.108790] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.182506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.375970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.619473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.498060] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.780204] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.064932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.074159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:41:55 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x0, &(0x7f0000000380)=""/84, &(0x7f0000000140)=""/5, &(0x7f0000000400)=""/162}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000005c0)=""/193, &(0x7f0000000540)=""/97, &(0x7f00000004c0)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f0000000180)) [ 222.405476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.412822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.597448] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.605936] team0: Port device team_slave_0 added [ 223.614342] IPVS: ftp: loaded support on port[0] = 21 [ 223.944005] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.952489] team0: Port device team_slave_1 added [ 224.304107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.311262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.320377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.654592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.661737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.671018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.009075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.017012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.026425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.377013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.384925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.394204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.621739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.104546] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.482928] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.489389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.498061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.634026] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.640528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.647753] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.654331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.664070] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.727922] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.734552] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.743312] device bridge_slave_0 entered promiscuous mode [ 229.944587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.010910] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.170908] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.177739] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.186514] device bridge_slave_1 entered promiscuous mode [ 230.596170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.891130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.983870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.333408] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.675557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 232.682816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.059518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 233.066838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:42:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600008000000a00000000000000000000000000000000000000000000000000000000000000080012000000020000000000000080001f000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xa0}}, 0x0) [ 234.243136] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.251235] team0: Port device team_slave_0 added [ 234.644518] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 234.652909] team0: Port device team_slave_1 added [ 234.990582] IPVS: ftp: loaded support on port[0] = 21 [ 235.081186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 235.088553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.097781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.177746] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.467677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 235.474957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.484362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.937291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.945811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.955130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.394331] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.403902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.413253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.769267] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.391141] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.397832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.406327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:42:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/if_inet6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "f295eab102fb041caeeca44d6859563adae70fa2"}, 0x15, 0x2) [ 240.139772] 8021q: adding VLAN 0 to HW filter on device team0 17:42:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/if_inet6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "f295eab102fb041caeeca44d6859563adae70fa2"}, 0x15, 0x2) 17:42:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffffffffffffd, @ipv4={[], [], @rand_addr=0xfffffffffffffff8}}, 0x11c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000040)={0xb0, 0xffffffffffffffda, 0x2, [{0x5, 0xa, 0x1, 0x6, '^'}, {0x6, 0x80, 0xe, 0xb3, '])-),selinux}#'}, {0x2, 0x5, 0x1e, 0x80, '[-vmnet1mime_type]proc/+loppp1'}, {0x3, 0x2, 0x4, 0x6, '[em1'}]}, 0xb0) 17:42:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000008c0)="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") fgetxattr(r0, &(0x7f0000000040)=@known='security.capability\x00', &(0x7f0000000200)=""/211, 0xfd3d) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}}) [ 241.394199] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.400708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.407916] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.414503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.423318] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.913886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 17:42:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000008c0)="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") fgetxattr(r0, &(0x7f0000000040)=@known='security.capability\x00', &(0x7f0000000200)=""/211, 0xfd3d) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}}) [ 242.336330] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.343647] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.352251] device bridge_slave_0 entered promiscuous mode 17:42:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000240)=[{0x10, 0x29, 0x4}], 0x10}}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000100)=""/238, 0xee}], 0x2, 0x0, 0x0, 0x1b}, 0x120) socket$bt_hidp(0x1f, 0x3, 0x6) [ 242.784690] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.791189] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.799991] device bridge_slave_1 entered promiscuous mode [ 243.285602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:42:16 executing program 0: r0 = socket$inet6(0xa, 0x8000000100000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x6}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x3, [@multicast2, @empty, @loopback]}, 0x1c) setsockopt$inet_mreqsrc(r3, 0x0, 0x25, &(0x7f00003fdff5)={@multicast2, @loopback, @dev}, 0xc) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 243.740685] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 17:42:17 executing program 0: r0 = socket$inet6(0xa, 0x8000000100000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x6}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x3, [@multicast2, @empty, @loopback]}, 0x1c) setsockopt$inet_mreqsrc(r3, 0x0, 0x25, &(0x7f00003fdff5)={@multicast2, @loopback, @dev}, 0xc) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 245.002439] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.379573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.737825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 245.745175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.087026] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 246.094395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.892650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.941804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.950038] team0: Port device team_slave_0 added [ 247.330942] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.339328] team0: Port device team_slave_1 added [ 247.607092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.614392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.623645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.909757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 247.917096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.925992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.963364] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.243876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.251554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.260763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.626000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.633798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.642906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.827020] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) [ 248.938355] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.945102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.953111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:42:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x22, &(0x7f0000000140)=""/106, &(0x7f00000001c0)=0x6a) [ 249.929497] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.507960] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.514562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.521555] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.528240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.536764] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.543670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.694592] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.554123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.967245] hrtimer: interrupt took 45120 ns [ 255.449347] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.457879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.466032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.719131] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.146452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.355162] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:42:36 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="20000000000000008400000002000000f50459000202000000060000000000007a4b34970f2413b1f63ffd5ecb0ee345ce7d66fdc194636fb448eca3f4040e81a92e6ccd2b1517eac7baea855ec20d39c15a05ac7ae20a1520cf70a8c48f106dd034ac9caeddc2f4e158d98cba5ee4797e910d78dbf8526ff189ab4ce1cbffada0ad7128aa3251c251c3fc6b29a5cc18d2e4d290210b46f8e9d3d47236964d0c1fd2f02bd46a919da5fae80100a88d425358371260bd47250000000000000000000000000000f66743ce68e0e68b1c7486a5b2df777ac8ff0d653acf991c172f3555ee2b7fcd77abdca67640c5a2d25f6eefb3d844b8e9f31eac746e5f4c60a3728d2e227706e8951abca2654038b5df69798ba28e77f620a5f9b20011e178ec8cf3ca97bf8689b9f0aefc113441cc285b302bee6f99f05bbc94f37f961ede68d2420d046d544ad74946b507c0"], 0x14d}, 0x0) 17:42:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000a5e000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000080)="0f21e066baf80cb89ce89b85ef66bafc0cb8329c0000efb9800000c00f3235000400000f300f0766baf80cb88014c580ef66bafc0cb8f7ff0000ef66baf80cb8ff57098cef66bafc0cb076eef30f07f2f3670f01390faf6fb6660f388224a3", 0x5f}], 0x1, 0x0, &(0x7f0000000100), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 264.171685] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 264.228205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.234713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.242935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.250806] ================================================================== [ 264.258227] BUG: KMSAN: uninit-value in __vmx_flush_tlb+0x755/0x790 [ 264.264663] CPU: 1 PID: 7505 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #63 [ 264.271875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.281259] Call Trace: [ 264.284161] dump_stack+0x306/0x460 [ 264.287824] ? __vmx_flush_tlb+0x755/0x790 [ 264.292126] kmsan_report+0x1a3/0x2d0 [ 264.295977] __msan_warning+0x7c/0xe0 [ 264.299825] __vmx_flush_tlb+0x755/0x790 [ 264.303951] vmx_flush_tlb+0x94/0xb0 [ 264.307710] ? vmx_set_rflags+0x740/0x740 [ 264.311898] kvm_mmu_load+0x1656/0x3460 [ 264.315923] ? vmx_set_cr0+0x3510/0x3510 [ 264.320027] kvm_arch_vcpu_ioctl_run+0x879e/0x10a20 [ 264.325212] ? task_kmsan_context_state+0x6b/0x120 [ 264.330189] ? task_kmsan_context_state+0x6b/0x120 [ 264.335174] ? __msan_get_context_state+0x9/0x30 [ 264.340136] ? INIT_INT+0xc/0x30 [ 264.343543] ? task_kmsan_context_state+0x6b/0x120 [ 264.348528] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 264.354236] ? kmsan_set_origin_inline+0x6b/0x120 [ 264.359146] ? __msan_poison_alloca+0x17a/0x210 [ 264.364315] ? put_pid+0x71/0x410 [ 264.368342] ? kvm_vcpu_ioctl+0x20a4/0x20b0 [ 264.373060] ? put_pid+0x1a9/0x410 [ 264.376911] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 264.382326] ? get_task_pid+0x17b/0x270 [ 264.386357] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 264.390648] ? do_vfs_ioctl+0x18a/0x2810 [ 264.394751] ? __se_sys_ioctl+0x1da/0x270 [ 264.399717] ? kvm_vm_release+0x90/0x90 [ 264.403725] do_vfs_ioctl+0xcf3/0x2810 [ 264.407671] ? security_file_ioctl+0x92/0x200 [ 264.412215] __se_sys_ioctl+0x1da/0x270 [ 264.416234] __x64_sys_ioctl+0x4a/0x70 [ 264.420153] do_syscall_64+0xbe/0x100 [ 264.423989] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 264.429461] RIP: 0033:0x457579 [ 264.432680] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.451614] RSP: 002b:00007f49f9d70c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.459440] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 264.466732] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 264.474025] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.481332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49f9d716d4 [ 264.488633] R13: 00000000004c003b R14: 00000000004d0108 R15: 00000000ffffffff [ 264.496214] [ 264.497874] Local variable description: ----error.i.i.i@__vmx_flush_tlb [ 264.504643] Variable was created at: [ 264.508406] __vmx_flush_tlb+0x103/0x790 [ 264.512497] vmx_flush_tlb+0x94/0xb0 [ 264.516227] ================================================================== [ 264.523612] Disabling lock debugging due to kernel taint [ 264.529084] Kernel panic - not syncing: panic_on_warn set ... [ 264.529084] [ 264.536509] CPU: 1 PID: 7505 Comm: syz-executor3 Tainted: G B 4.19.0-rc4+ #63 [ 264.545104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.554472] Call Trace: [ 264.557113] dump_stack+0x306/0x460 [ 264.561226] panic+0x54c/0xafa [ 264.565097] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 264.571103] kmsan_report+0x2cd/0x2d0 [ 264.574948] __msan_warning+0x7c/0xe0 [ 264.578790] __vmx_flush_tlb+0x755/0x790 [ 264.582909] vmx_flush_tlb+0x94/0xb0 [ 264.586661] ? vmx_set_rflags+0x740/0x740 [ 264.590861] kvm_mmu_load+0x1656/0x3460 [ 264.594892] ? vmx_set_cr0+0x3510/0x3510 [ 264.599004] kvm_arch_vcpu_ioctl_run+0x879e/0x10a20 [ 264.604190] ? task_kmsan_context_state+0x6b/0x120 [ 264.609155] ? task_kmsan_context_state+0x6b/0x120 [ 264.614128] ? __msan_get_context_state+0x9/0x30 [ 264.619088] ? INIT_INT+0xc/0x30 [ 264.622662] ? task_kmsan_context_state+0x6b/0x120 [ 264.627635] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 264.633487] ? kmsan_set_origin_inline+0x6b/0x120 [ 264.638369] ? __msan_poison_alloca+0x17a/0x210 [ 264.643095] ? put_pid+0x71/0x410 [ 264.646576] ? kvm_vcpu_ioctl+0x20a4/0x20b0 [ 264.650937] ? put_pid+0x1a9/0x410 [ 264.654511] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 264.659903] ? get_task_pid+0x17b/0x270 [ 264.664891] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 264.669700] ? do_vfs_ioctl+0x18a/0x2810 [ 264.673798] ? __se_sys_ioctl+0x1da/0x270 [ 264.678427] ? kvm_vm_release+0x90/0x90 [ 264.682613] do_vfs_ioctl+0xcf3/0x2810 [ 264.686908] ? security_file_ioctl+0x92/0x200 [ 264.691454] __se_sys_ioctl+0x1da/0x270 [ 264.695475] __x64_sys_ioctl+0x4a/0x70 [ 264.699390] do_syscall_64+0xbe/0x100 [ 264.703226] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 264.708576] RIP: 0033:0x457579 [ 264.712326] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.733433] RSP: 002b:00007f49f9d70c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.741182] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 264.748505] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 264.755805] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.763119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49f9d716d4 [ 264.770957] R13: 00000000004c003b R14: 00000000004d0108 R15: 00000000ffffffff [ 264.775178] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.785425] Kernel Offset: disabled [ 264.789065] Rebooting in 86400 seconds..