[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 97.987876] audit: type=1800 audit(1547174124.045:25): pid=10601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 98.007225] audit: type=1800 audit(1547174124.045:26): pid=10601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 98.026729] audit: type=1800 audit(1547174124.075:27): pid=10601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.35' (ECDSA) to the list of known hosts. 2019/01/11 02:35:40 fuzzer started 2019/01/11 02:35:46 dialing manager at 10.128.0.26:37813 2019/01/11 02:35:46 syscalls: 1 2019/01/11 02:35:46 code coverage: enabled 2019/01/11 02:35:46 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/01/11 02:35:46 setuid sandbox: enabled 2019/01/11 02:35:46 namespace sandbox: enabled 2019/01/11 02:35:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/11 02:35:46 fault injection: enabled 2019/01/11 02:35:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/11 02:35:46 net packet injection: enabled 2019/01/11 02:35:46 net device setup: enabled 02:36:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) syzkaller login: [ 189.877434] IPVS: ftp: loaded support on port[0] = 21 [ 190.046625] chnl_net:caif_netlink_parms(): no params data found [ 190.126171] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.132876] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.141381] device bridge_slave_0 entered promiscuous mode [ 190.151768] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.158278] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.166965] device bridge_slave_1 entered promiscuous mode [ 190.204637] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.216229] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.248978] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.258001] team0: Port device team_slave_0 added [ 190.264678] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.273549] team0: Port device team_slave_1 added [ 190.280162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.288818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.467875] device hsr_slave_0 entered promiscuous mode [ 190.722986] device hsr_slave_1 entered promiscuous mode [ 190.903722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 190.911550] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.944935] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.951544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.958919] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.965516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.042923] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.055311] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.095359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.110454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.127926] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.135221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.143644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.161330] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 191.167710] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.184232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 191.191529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.200824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.209596] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.216161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.234789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 191.248997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.258265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.267118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.275773] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.282317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.291128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.307266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 191.314456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.339229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 191.346493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.355979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.373912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.384230] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.392696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.402222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.418835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 191.426291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.435027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.454159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 191.464955] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.477562] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 191.483925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.493389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.502379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.535188] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 191.562012] 8021q: adding VLAN 0 to HW filter on device batadv0 02:36:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) 02:36:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) [ 193.454898] IPVS: ftp: loaded support on port[0] = 21 02:36:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) [ 193.653363] chnl_net:caif_netlink_parms(): no params data found [ 193.757374] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.764218] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.772860] device bridge_slave_0 entered promiscuous mode [ 193.787110] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.793801] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.802575] device bridge_slave_1 entered promiscuous mode [ 193.841840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.854897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.889758] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 193.898880] team0: Port device team_slave_0 added [ 193.906816] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 193.915963] team0: Port device team_slave_1 added [ 193.933139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 193.942362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 194.017581] device hsr_slave_0 entered promiscuous mode [ 194.063702] device hsr_slave_1 entered promiscuous mode [ 194.224376] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 194.232201] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 194.269928] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.276587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.283896] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.290489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.404925] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 194.411075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.427354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.442501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.454522] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.464007] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.477154] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 194.504893] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 194.511021] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.549267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.557829] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.564435] bridge0: port 1(bridge_slave_0) entered forwarding state 02:37:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) [ 194.618740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.627416] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.634037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.644470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.654250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.669657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.696451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 194.703494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.712315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.732861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 194.740021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.748764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.769732] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.776597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.806015] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.833753] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x5, 0xfffffffffffffffd, 0x7}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x8}) [ 195.624504] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 02:37:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x5, 0xfffffffffffffffd, 0x7}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x8}) 02:37:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) 02:37:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x5, 0xfffffffffffffffd, 0x7}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x8}) 02:37:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x5, 0xfffffffffffffffd, 0x7}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x8}) 02:37:02 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) 02:37:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x2, 0x0) 02:37:03 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) 02:37:03 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) 02:37:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000100009e369001b00810800000700fd9816000000450001070000001419001a0004000a000f000200000809c99183a8a50002000000", 0x39}], 0x1) 02:37:04 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) [ 198.379590] IPVS: ftp: loaded support on port[0] = 21 02:37:04 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) [ 198.611191] chnl_net:caif_netlink_parms(): no params data found [ 198.703781] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.710440] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.719156] device bridge_slave_0 entered promiscuous mode [ 198.741118] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.747906] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.756745] device bridge_slave_1 entered promiscuous mode [ 198.802894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.817188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.855703] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 198.864732] team0: Port device team_slave_0 added [ 198.871965] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.880974] team0: Port device team_slave_1 added [ 198.890288] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 198.899520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 198.999730] device hsr_slave_0 entered promiscuous mode 02:37:05 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) [ 199.162467] device hsr_slave_1 entered promiscuous mode [ 199.233548] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 199.241314] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 199.279369] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.286006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.293295] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.299857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.415338] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 199.421491] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.438752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 199.454399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.465156] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.473895] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.486595] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 199.510348] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 199.517126] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.537224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.545906] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.552497] bridge0: port 1(bridge_slave_0) entered forwarding state 02:37:05 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0xfffffffffffffffe) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) [ 199.586084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.594573] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.601080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.640339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 199.667820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.678782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.690328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.699752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.717650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 199.737116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 199.752155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 199.761047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.770363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.779949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.789101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.797754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.806392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.815070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.828449] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 199.834703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.863240] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 199.889396] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 02:37:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000100009e369001b00810800000700fd9816000000450001070000001419001a0004000a000f000200000809c99183a8a50002000000", 0x39}], 0x1) 02:37:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 02:37:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000100009e369001b00810800000700fd9816000000450001070000001419001a0004000a000f000200000809c99183a8a50002000000", 0x39}], 0x1) 02:37:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 02:37:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000100009e369001b00810800000700fd9816000000450001070000001419001a0004000a000f000200000809c99183a8a50002000000", 0x39}], 0x1) 02:37:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 02:37:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 02:37:06 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000080)) ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) 02:37:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000340)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xe0}) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)=0xfffffffffffffff8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000000)={0x7e, 0x80000000, 0x9, 0x100}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000140)=""/92) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) dup(r3) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, &(0x7f00000000c0), 0x79) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000000)=""/174) 02:37:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$setown(r1, 0x8, r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f000002a000/0x4000)=nil, 0x4000, 0x1000002, 0x10, r4, 0x0) close(r3) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) unshare(0x20400) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000001e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:37:07 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() waitid(0x3, r0, &(0x7f0000000140), 0x9, &(0x7f0000000500)) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x202, &(0x7f0000000000)={&(0x7f00000001c0)="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", 0x340}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000005c0)=0x6, &(0x7f0000000600)=0x1) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x9) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000003500)={0x0}) 02:37:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$setown(r1, 0x8, r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f000002a000/0x4000)=nil, 0x4000, 0x1000002, 0x10, r4, 0x0) close(r3) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) unshare(0x20400) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000001e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 201.261114] ================================================================== [ 201.268566] BUG: KMSAN: uninit-value in __se_sys_waitid+0x329/0xb20 [ 201.274995] CPU: 0 PID: 10906 Comm: syz-executor2 Not tainted 5.0.0-rc1+ #7 [ 201.282115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.291518] Call Trace: [ 201.294151] dump_stack+0x173/0x1d0 [ 201.297817] kmsan_report+0x12e/0x2a0 [ 201.301668] kmsan_internal_check_memory+0x9e4/0xb10 [ 201.306830] kmsan_check_memory+0xd/0x10 [ 201.310953] __se_sys_waitid+0x329/0xb20 [ 201.315066] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 201.320573] ? prepare_exit_to_usermode+0x114/0x420 [ 201.325617] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 201.330854] ? syscall_return_slowpath+0xb2/0x650 [ 201.335768] __x64_sys_waitid+0x62/0x80 [ 201.339779] do_syscall_64+0xbc/0xf0 [ 201.343523] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 201.348736] RIP: 0033:0x457ec9 [ 201.351942] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.370877] RSP: 002b:00007f4d1b1f4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 201.378602] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457ec9 [ 201.385899] RDX: 0000000020000140 RSI: 000000000000000f RDI: 0000000000000003 [ 201.393191] RBP: 000000000073bf00 R08: 0000000020000500 R09: 0000000000000000 [ 201.400499] R10: 0000000000000009 R11: 0000000000000246 R12: 00007f4d1b1f56d4 [ 201.407822] R13: 00000000004c6b10 R14: 00000000004dbef0 R15: 00000000ffffffff [ 201.415231] [ 201.416878] Local variable description: ----__pu_val120.i@__se_sys_waitid [ 201.423810] Variable was created at: [ 201.427552] __se_sys_waitid+0x18c/0xb20 [ 201.431624] __x64_sys_waitid+0x62/0x80 [ 201.435600] [ 201.437233] Bytes 0-3 of 4 are uninitialized [ 201.441647] Memory access of size 4 starts at ffff88806351fe78 [ 201.447621] ================================================================== [ 201.454992] Disabling lock debugging due to kernel taint [ 201.460462] Kernel panic - not syncing: panic_on_warn set ... [ 201.466371] CPU: 0 PID: 10906 Comm: syz-executor2 Tainted: G B 5.0.0-rc1+ #7 [ 201.474883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.484257] Call Trace: [ 201.486885] dump_stack+0x173/0x1d0 [ 201.490547] panic+0x3d1/0xb01 [ 201.493810] kmsan_report+0x293/0x2a0 [ 201.497658] kmsan_internal_check_memory+0x9e4/0xb10 [ 201.502822] kmsan_check_memory+0xd/0x10 [ 201.506915] __se_sys_waitid+0x329/0xb20 [ 201.511030] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 201.516505] ? prepare_exit_to_usermode+0x114/0x420 [ 201.521544] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 201.526771] ? syscall_return_slowpath+0xb2/0x650 [ 201.531653] __x64_sys_waitid+0x62/0x80 [ 201.535665] do_syscall_64+0xbc/0xf0 [ 201.539409] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 201.544623] RIP: 0033:0x457ec9 [ 201.547840] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.566770] RSP: 002b:00007f4d1b1f4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 201.574503] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457ec9 [ 201.581792] RDX: 0000000020000140 RSI: 000000000000000f RDI: 0000000000000003 [ 201.589075] RBP: 000000000073bf00 R08: 0000000020000500 R09: 0000000000000000 [ 201.596373] R10: 0000000000000009 R11: 0000000000000246 R12: 00007f4d1b1f56d4 [ 201.603662] R13: 00000000004c6b10 R14: 00000000004dbef0 R15: 00000000ffffffff [ 201.612017] Kernel Offset: disabled [ 201.615650] Rebooting in 86400 seconds..