[ 58.122685] audit: type=1800 audit(1539246422.152:28): pid=5990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 59.562903] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 61.304208] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.846660] random: sshd: uninitialized urandom read (32 bytes read) [ 64.388089] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. [ 70.314784] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 08:27:16 fuzzer started [ 74.953506] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 08:27:21 dialing manager at 10.128.0.26:39089 2018/10/11 08:27:21 syscalls: 1 2018/10/11 08:27:21 code coverage: enabled 2018/10/11 08:27:21 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 08:27:21 setuid sandbox: enabled 2018/10/11 08:27:21 namespace sandbox: enabled 2018/10/11 08:27:21 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 08:27:21 fault injection: enabled 2018/10/11 08:27:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 08:27:21 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 08:27:21 net device setup: enabled [ 80.514791] random: crng init done 08:29:26 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00', 0x18}, 0x2c) [ 203.229826] IPVS: ftp: loaded support on port[0] = 21 [ 204.624332] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.630867] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.639768] device bridge_slave_0 entered promiscuous mode [ 204.788489] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.795077] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.803962] device bridge_slave_1 entered promiscuous mode [ 204.950142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.095205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.546929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.699546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.987809] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.995123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:29:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x54000a04, &(0x7f000007e000/0x3000)=nil) [ 206.511510] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.519936] team0: Port device team_slave_0 added [ 206.802417] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.810784] team0: Port device team_slave_1 added [ 207.038577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.045823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.055083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.253156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.260295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.269537] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.422856] IPVS: ftp: loaded support on port[0] = 21 [ 207.436013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.443859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.452867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.706810] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.714682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.724318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.797127] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.803792] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.812548] device bridge_slave_0 entered promiscuous mode [ 210.035540] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.042112] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.050753] device bridge_slave_1 entered promiscuous mode [ 210.222802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.327133] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.333761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.340806] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.347575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.356782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.466874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.062542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.205235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.387710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.536299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.544026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.745603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.753084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:29:36 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x1b9, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) [ 212.648495] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.656903] team0: Port device team_slave_0 added [ 212.949010] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.957521] team0: Port device team_slave_1 added [ 213.261483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.268761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.277600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.364924] IPVS: ftp: loaded support on port[0] = 21 [ 213.533138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.540226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.549388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.837912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.845826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.855117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.163903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.171733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.180931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.166942] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.173577] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.182711] device bridge_slave_0 entered promiscuous mode [ 216.520124] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.526779] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.535709] device bridge_slave_1 entered promiscuous mode [ 216.773093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.985038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.259134] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.265764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.272975] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.280097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.289498] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.296525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.897683] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.203859] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.480905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 218.488172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.839518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.846785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.686885] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.695438] team0: Port device team_slave_0 added [ 219.981106] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.989682] team0: Port device team_slave_1 added [ 220.316747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.330462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.339889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 08:29:44 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$sock_inet_SIOCRTMSG(r0, 0x80045505, &(0x7f00000000c0)={0x1000000, {0x2, 0x0, @dev}, {}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='ip6gre0\x00'}) [ 220.683348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.690526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.699810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.096437] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.104308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.113539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.493375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.501089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.510515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.225272] IPVS: ftp: loaded support on port[0] = 21 [ 222.457702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.820226] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.348370] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.354991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.363379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.605653] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.612256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.619226] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.625866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.634859] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.698241] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.705870] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.714606] device bridge_slave_0 entered promiscuous mode [ 225.891976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.089935] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.096740] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.105424] device bridge_slave_1 entered promiscuous mode [ 226.485558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.848572] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.874280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.029189] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.380247] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.764941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.772296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.116892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.124222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.213064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.221349] team0: Port device team_slave_0 added [ 230.607130] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.615557] team0: Port device team_slave_1 added [ 230.978930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.986271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.995459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 08:29:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000000)=""/174) [ 231.394142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.401271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.410436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.816540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.824374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.833303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.033202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.242617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.250283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.259423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.075053] IPVS: ftp: loaded support on port[0] = 21 [ 233.796957] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.313229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.320191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.328780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.673857] syz-executor0: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 236.685210] syz-executor0 cpuset=syz0 mems_allowed=0 [ 236.690515] CPU: 0 PID: 6815 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 [ 236.697780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.707249] Call Trace: [ 236.709969] dump_stack+0x306/0x460 [ 236.713686] warn_alloc+0x4c1/0x6f0 [ 236.717424] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 236.723038] __vmalloc_node_range+0xd9b/0x1280 [ 236.727720] ? task_kmsan_context_state+0x6b/0x120 [ 236.732771] ? task_kmsan_context_state+0x6b/0x120 [ 236.737841] __vmalloc_node_flags_caller+0x12b/0x140 [ 236.743074] ? xt_alloc_entry_offsets+0xb1/0xe0 [ 236.747868] ? xt_alloc_entry_offsets+0xb1/0xe0 [ 236.752637] kvmalloc_node+0xd1/0x1a0 [ 236.756592] xt_alloc_entry_offsets+0xb1/0xe0 [ 236.761225] translate_table+0x1e6/0x3400 [ 236.765460] ? task_kmsan_context_state+0x6b/0x120 [ 236.770508] ? task_kmsan_context_state+0x6b/0x120 [ 236.775662] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 236.781121] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 236.786629] ? vmalloc_to_page+0x57d/0x6b0 [ 236.791018] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 236.796502] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 236.802044] do_arpt_set_ctl+0x672/0xca0 [ 236.806254] ? INIT_S64+0xd/0x30 [ 236.809750] ? mutex_unlock+0x1f2/0x2d0 [ 236.813861] ? arpt_unregister_table+0x5d0/0x5d0 [ 236.818730] nf_setsockopt+0x47c/0x4e0 [ 236.822715] ip_setsockopt+0x24b/0x2b0 [ 236.826717] ? ipv4_pktinfo_prepare+0x6d0/0x6d0 [ 236.831513] tcp_setsockopt+0x1c0/0x1f0 [ 236.835614] ? tcp_disconnect+0x19c0/0x19c0 [ 236.840060] sock_common_setsockopt+0x13b/0x170 [ 236.844835] ? sock_common_recvmsg+0x290/0x290 [ 236.849564] __sys_setsockopt+0x496/0x540 [ 236.853876] __se_sys_setsockopt+0xdd/0x100 [ 236.858329] __x64_sys_setsockopt+0x62/0x80 [ 236.862734] do_syscall_64+0xbe/0x100 [ 236.866621] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 236.871879] RIP: 0033:0x457519 [ 236.875136] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.894106] RSP: 002b:00007f06834cac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 236.901917] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457519 [ 236.909254] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000003 [ 236.916589] RBP: 000000000072bf00 R08: 000000000000002c R09: 0000000000000000 [ 236.923926] R10: 0000000020000080 R11: 0000000000000246 R12: 00007f06834cb6d4 [ 236.928030] ip (6818) used greatest stack depth: 53040 bytes left [ 236.931261] R13: 00000000004c3a3e R14: 00000000004d5af0 R15: 00000000ffffffff [ 236.945111] Mem-Info: [ 236.947679] active_anon:60192 inactive_anon:113 isolated_anon:0 [ 236.947679] active_file:7280 inactive_file:33480 isolated_file:0 [ 236.947679] unevictable:0 dirty:32 writeback:0 unstable:0 [ 236.947679] slab_reclaimable:3710 slab_unreclaimable:9052 [ 236.947679] mapped:46759 shmem:119 pagetables:742 bounce:0 [ 236.947679] free:1038984 free_pcp:936 free_cma:0 [ 236.981454] Node 0 active_anon:240768kB inactive_anon:452kB active_file:29120kB inactive_file:133920kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:187036kB dirty:128kB writeback:0kB shmem:476kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 167936kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 237.009919] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 237.036341] lowmem_reserve[]: 0 2803 7229 7229 [ 237.041065] Node 0 DMA32 free:2873792kB min:26148kB low:32684kB high:39220kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2875232kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1440kB local_pcp:80kB free_cma:0kB [ 237.069071] lowmem_reserve[]: 0 0 4425 4425 [ 237.073643] Node 0 Normal free:1266628kB min:41284kB low:51604kB high:61924kB active_anon:240672kB inactive_anon:452kB active_file:29120kB inactive_file:134064kB unevictable:0kB writepending:152kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:11328kB pagetables:2904kB bounce:0kB free_pcp:1360kB local_pcp:1108kB free_cma:0kB [ 237.104061] lowmem_reserve[]: 0 0 0 0 [ 237.107985] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 237.121719] Node 0 DMA32: 2*4kB (M) 1*8kB (M) 1*16kB (M) 1*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 1*512kB (M) 3*1024kB (M) 3*2048kB (M) 699*4096kB (M) = 2873792kB [ 237.132476] syz-executor0: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 237.137547] Node 0 Normal: 2*4kB (ME) 1*8kB (M) [ 237.148408] syz-executor0 cpuset= [ 237.148445] 2*16kB [ 237.153338] syz0 [ 237.156808] (ME) [ 237.159064] mems_allowed=0 [ 237.161046] 1*32kB [ 237.163258] CPU: 1 PID: 6816 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 [ 237.166170] (E) [ 237.168424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.175751] 2*64kB [ 237.177601] Call Trace: [ 237.187096] (ME) [ 237.189270] dump_stack+0x306/0x460 [ 237.191919] 5*128kB [ 237.193920] warn_alloc+0x4c1/0x6f0 [ 237.197518] (UE) [ 237.199907] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 237.203658] 1*256kB [ 237.205677] __vmalloc_node_range+0xd9b/0x1280 [ 237.211064] (U) [ 237.213476] ? task_kmsan_context_state+0x6b/0x120 [ 237.213532] __vmalloc_node_flags_caller+0x12b/0x140 [ 237.213624] ? xt_alloc_entry_offsets+0xb1/0xe0 [ 237.218170] 1*512kB [ 237.220224] ? xt_alloc_entry_offsets+0xb1/0xe0 [ 237.225221] (E) [ 237.230246] kvmalloc_node+0xd1/0x1a0 [ 237.235054] 4*1024kB [ 237.237293] xt_alloc_entry_offsets+0xb1/0xe0 [ 237.242036] (UME) [ 237.243977] translate_table+0x1e6/0x3400 [ 237.247716] 3*2048kB [ 237.250163] ? task_kmsan_context_state+0x6b/0x120 [ 237.254771] (UME) [ 237.256818] ? task_kmsan_context_state+0x6b/0x120 [ 237.260951] 306*4096kB [ 237.263421] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 237.263461] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 237.263512] ? vmalloc_to_page+0x57d/0x6b0 [ 237.263591] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 237.268505] (M) [ 237.270696] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 237.275739] = 1265232kB [ 237.278274] do_arpt_set_ctl+0x672/0xca0 [ 237.283714] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 237.289033] ? INIT_S64+0xd/0x30 [ 237.293369] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 237.298658] ? mutex_unlock+0x1f2/0x2d0 [ 237.300575] 40957 total pagecache pages [ 237.306010] ? arpt_unregister_table+0x5d0/0x5d0 [ 237.306082] nf_setsockopt+0x47c/0x4e0 [ 237.306137] ip_setsockopt+0x24b/0x2b0 [ 237.308706] 0 pages in swap cache [ 237.312836] ? ipv4_pktinfo_prepare+0x6d0/0x6d0 [ 237.312898] tcp_setsockopt+0x1c0/0x1f0 [ 237.312969] ? tcp_disconnect+0x19c0/0x19c0 [ 237.321926] Swap cache stats: add 0, delete 0, find 0/0 [ 237.325248] sock_common_setsockopt+0x13b/0x170 [ 237.334003] Free swap = 0kB [ 237.337897] ? sock_common_recvmsg+0x290/0x290 [ 237.341978] Total swap = 0kB [ 237.346651] __sys_setsockopt+0x496/0x540 [ 237.350527] 1965979 pages RAM [ 237.354497] __se_sys_setsockopt+0xdd/0x100 [ 237.354582] __x64_sys_setsockopt+0x62/0x80 [ 237.354629] do_syscall_64+0xbe/0x100 [ 237.358074] 0 pages HighMem/MovableOnly [ 237.362772] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 237.362803] RIP: 0033:0x457519 [ 237.362837] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.362859] RSP: 002b:00007f06834cac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 237.366870] 110157 pages reserved [ 237.371210] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457519 [ 237.376710] 0 pages cma reserved [ 237.381260] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000005 [ 237.472224] RBP: 000000000072bf00 R08: 000000000000002c R09: 0000000000000000 [ 237.479568] R10: 0000000020000080 R11: 0000000000000246 R12: 00007f06834cb6d4 [ 237.486900] R13: 00000000004c3a3e R14: 00000000004d5af0 R15: 00000000ffffffff [ 237.688383] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.695574] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.704221] device bridge_slave_0 entered promiscuous mode [ 237.728338] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.772686] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.779265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.786403] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.792999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.801512] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.002234] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.008742] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.017692] device bridge_slave_1 entered promiscuous mode [ 238.267351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.422930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:30:02 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 238.723045] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 08:30:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lgetxattr(&(0x7f0000000800)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'group_id'}, &(0x7f0000000780)=""/74, 0xffffffffffffff3e) lseek(r0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f0004000000000000000000000000"], 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) [ 239.943736] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.414129] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:30:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lgetxattr(&(0x7f0000000800)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'group_id'}, &(0x7f0000000780)=""/74, 0xffffffffffffff3e) lseek(r0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f0004000000000000000000000000"], 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) [ 240.905763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.912963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:30:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x5, 0x4, 0x1000}, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x40286608, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) [ 241.299195] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 241.307162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:30:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x5, 0x4, 0x1000}, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x40286608, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) 08:30:06 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x4000000000002d0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x1f0, 0x4) 08:30:06 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x4000000000002d0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x1f0, 0x4) [ 242.622253] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.630501] team0: Port device team_slave_0 added 08:30:07 executing program 5: r0 = shmget(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/215) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x200, 0x400000) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000140)) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x0) close(r1) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000180)={{0x1, 0x2, 0x3ff, 0x3, 0x7fff}, 0xbf1, 0x681, 'id1\x00', 'timer0\x00', 0x0, 0xeb3, 0x3, 0x2, 0x91}) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x6) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1f, 0x285c7cf3, 0x0, 0x2, 0x0, r1, 0x1ca61770800000}, 0x2c) r3 = openat$cgroup(r1, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) fremovexattr(r2, &(0x7f0000000300)=@random={'security.', ')[selinux-security}\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000340)={0x10, 0x7, {0x57, 0x100000000, 0x1000, {0x5, 0xf4e2}, {0x7f, 0x5}, @ramp={0x6, 0x80000001, {0x7fff, 0x80000001, 0x8, 0x8}}}, {0x54, 0x101, 0x10001, {0x2e, 0x5a26}, {0x1, 0x3}, @rumble={0x20, 0x100000000}}}) fsetxattr(r3, &(0x7f00000003c0)=@random={'btrfs.', 'security.'}, &(0x7f0000000400)='/dev/admmidi#\x00', 0xe, 0x2) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000440)="c9bcb3eb7fb4079c50485ae25bb5ba0a6aeac6b9986d95c4a9063847cba810a4d3867ead564b5884f4fd894a70b7c37802e95bb91abeba2e7544d127d810908d13df01dc27266e64d6a1") flock(r1, 0x1) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000004c0)={0x7, 0x47}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e22, 0x7, @mcast2, 0x10e3}}, 0x4, 0x300000000000000, 0x0, 0x40, 0x80}, &(0x7f00000005c0)=0x98) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)={r4, 0x7, 0x3, [0x3, 0x8, 0x5]}, 0xe) r5 = accept$packet(r1, 0x0, &(0x7f0000000640)) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000680)=""/204) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000780)={0x5, 0x8000, 0x800, 0x1ff0000, 0x9}) unshare(0x6010000) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000007c0)) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000800)={'bpq0\x00', {0x2, 0x4e20, @rand_addr=0x7fff}}) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000840)={0x0, 0x1, 0x7e, 0x600}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000880)={{0x0, 0x3, 0x1, 0x0, 0x9}, 0x7ff, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x6, 0x3, 0x20, 0x9}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000980)={0x1, 0x7ff, 0x6, @broadcast, 'dummy0\x00'}) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$KVM_SET_XSAVE(r5, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) [ 243.155883] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.164218] team0: Port device team_slave_1 added [ 243.196999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.530437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.537663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.546694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.933263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.940381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.949446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.277953] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.285872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.294892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.587871] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.737671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.745445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.754527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.814354] IPVS: ftp: loaded support on port[0] = 21 [ 245.882804] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.889248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.897326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:30:11 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}, {}], 0x2, &(0x7f00000000c0)={0x0, r1+30000000}, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 247.360838] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.473011] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.479505] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.488389] device bridge_slave_0 entered promiscuous mode [ 248.536439] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.543000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.549965] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.556597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.565238] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.861189] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.867819] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.876559] device bridge_slave_1 entered promiscuous mode [ 248.982228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.199108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 249.491400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.389681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.708911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.970475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 250.978635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.280829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.288184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.172690] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.180950] team0: Port device team_slave_0 added [ 252.423945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.486405] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.495079] team0: Port device team_slave_1 added [ 252.670746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.678037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.687245] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.981322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.988649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.997944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.291503] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.299282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.308773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.503212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.510914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.520550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.709384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.796578] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.803182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.811120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.910390] 8021q: adding VLAN 0 to HW filter on device team0 08:30:20 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x200000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r1, r0, &(0x7f0000000180), 0x10013c93e) [ 256.818645] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.825818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.833249] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.839753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.849398] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 256.856506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.086718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.938831] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.122076] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor3' sets config #16777216 [ 262.161786] usb usb3: usbfs: interface 0 claimed by hub while 'syz-executor3' sets config #16777216 08:30:26 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x200000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r1, r0, &(0x7f0000000180), 0x10013c93e) [ 262.855342] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.862040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.870089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.768560] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.004797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.573531] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.101896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 267.108178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.116202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:30:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000000)=""/174) 08:30:31 executing program 0: r0 = socket$packet(0x11, 0x80000000000002, 0x300) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000380)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x1, 0x0) 08:30:31 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x200000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r1, r0, &(0x7f0000000180), 0x10013c93e) 08:30:31 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}, {}], 0x2, &(0x7f00000000c0)={0x0, r1+30000000}, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 08:30:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="c4e375189cf3162a0000000f07b9800000c00f3235004000000f309a7cd1b3c60d01c4c15dde80000000000f20e035200000000f22e00f35c7442400ffffffffc744240206000000c7442406000000000f011c2466b860008ed8c4c239bdbb0c000000", 0x63}], 0x1, 0x0, &(0x7f00000001c0), 0x0) socketpair$unix(0x1, 0x1000000000002, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x77, 0x0, [0x4b564d03, 0x1, 0xc0010141]}) [ 267.634207] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 267.716724] ================================================================== [ 267.724163] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 267.731900] CPU: 1 PID: 7611 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #66 [ 267.739111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.748486] Call Trace: [ 267.751120] dump_stack+0x306/0x460 [ 267.754788] ? vmx_set_constant_host_state+0x1778/0x1830 [ 267.760286] kmsan_report+0x1a2/0x2e0 [ 267.764145] __msan_warning+0x7c/0xe0 [ 267.767991] vmx_set_constant_host_state+0x1778/0x1830 [ 267.773322] vmx_create_vcpu+0x3e6f/0x7870 [ 267.777608] ? kmsan_set_origin_inline+0x6b/0x120 [ 267.782488] ? __msan_poison_alloca+0x17a/0x210 [ 267.787204] ? vmx_vm_init+0x340/0x340 [ 267.791134] kvm_arch_vcpu_create+0x25d/0x2f0 [ 267.795674] kvm_vm_ioctl+0x13fd/0x33d0 [ 267.799693] ? __msan_poison_alloca+0x17a/0x210 [ 267.804413] ? do_vfs_ioctl+0x18a/0x2810 [ 267.808506] ? __se_sys_ioctl+0x1da/0x270 [ 267.812700] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 267.817589] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 267.822476] do_vfs_ioctl+0xcf3/0x2810 [ 267.826421] ? security_file_ioctl+0x92/0x200 [ 267.830963] __se_sys_ioctl+0x1da/0x270 [ 267.834981] __x64_sys_ioctl+0x4a/0x70 [ 267.838917] do_syscall_64+0xbe/0x100 [ 267.842757] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 267.847971] RIP: 0033:0x457519 [ 267.851186] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.870127] RSP: 002b:00007fe92d1f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.877894] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 267.885191] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 267.892481] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 267.899778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe92d1f96d4 [ 267.907070] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 267.914388] [ 267.916033] Local variable description: ----dt@vmx_set_constant_host_state [ 267.923059] Variable was created at: [ 267.926817] vmx_set_constant_host_state+0x2b0/0x1830 [ 267.932040] vmx_create_vcpu+0x3e6f/0x7870 [ 267.936291] ================================================================== [ 267.943666] Disabling lock debugging due to kernel taint [ 267.949137] Kernel panic - not syncing: panic_on_warn set ... [ 267.949137] [ 267.956556] CPU: 1 PID: 7611 Comm: syz-executor3 Tainted: G B 4.19.0-rc4+ #66 [ 267.965153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.974520] Call Trace: [ 267.977151] dump_stack+0x306/0x460 [ 267.980834] panic+0x54c/0xafa [ 267.984115] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 267.989623] kmsan_report+0x2d3/0x2e0 [ 267.993467] __msan_warning+0x7c/0xe0 [ 267.997311] vmx_set_constant_host_state+0x1778/0x1830 [ 268.002640] vmx_create_vcpu+0x3e6f/0x7870 [ 268.006913] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.011795] ? __msan_poison_alloca+0x17a/0x210 [ 268.016510] ? vmx_vm_init+0x340/0x340 [ 268.020446] kvm_arch_vcpu_create+0x25d/0x2f0 [ 268.024989] kvm_vm_ioctl+0x13fd/0x33d0 [ 268.029011] ? __msan_poison_alloca+0x17a/0x210 [ 268.033721] ? do_vfs_ioctl+0x18a/0x2810 [ 268.037992] ? __se_sys_ioctl+0x1da/0x270 [ 268.042177] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 268.047054] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 268.051931] do_vfs_ioctl+0xcf3/0x2810 [ 268.055876] ? security_file_ioctl+0x92/0x200 [ 268.060424] __se_sys_ioctl+0x1da/0x270 [ 268.064443] __x64_sys_ioctl+0x4a/0x70 [ 268.068363] do_syscall_64+0xbe/0x100 [ 268.072201] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.077412] RIP: 0033:0x457519 [ 268.080631] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.099566] RSP: 002b:00007fe92d1f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.107310] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 268.114683] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 268.121977] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.129272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe92d1f96d4 [ 268.136571] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 268.144916] Kernel Offset: disabled [ 268.148567] Rebooting in 86400 seconds..