[ 56.878727] audit: type=1800 audit(1538641565.911:27): pid=5976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.433600] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 62.027066] random: sshd: uninitialized urandom read (32 bytes read) [ 62.481139] random: sshd: uninitialized urandom read (32 bytes read) [ 64.074554] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. [ 69.793854] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/04 08:26:20 fuzzer started [ 74.432732] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/04 08:26:25 dialing manager at 10.128.0.26:36867 2018/10/04 08:26:25 syscalls: 1 2018/10/04 08:26:25 code coverage: enabled 2018/10/04 08:26:25 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/04 08:26:25 setuid sandbox: enabled 2018/10/04 08:26:25 namespace sandbox: enabled 2018/10/04 08:26:25 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/04 08:26:25 fault injection: enabled 2018/10/04 08:26:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/04 08:26:25 net packed injection: enabled 2018/10/04 08:26:25 net device setup: enabled [ 80.815407] random: crng init done 08:28:28 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) tkill(r0, 0xc) [ 200.016027] IPVS: ftp: loaded support on port[0] = 21 [ 202.336623] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.343179] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.351709] device bridge_slave_0 entered promiscuous mode [ 202.493912] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.500384] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.508845] device bridge_slave_1 entered promiscuous mode [ 202.644350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.782198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.204068] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.343478] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:28:32 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getsig(0x4202, r1, 0x0, &(0x7f0000000040)) [ 203.797676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.804843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.158539] IPVS: ftp: loaded support on port[0] = 21 [ 204.401938] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.410024] team0: Port device team_slave_0 added [ 204.643531] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.651811] team0: Port device team_slave_1 added [ 204.797962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 204.805086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.814253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.034143] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.041163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.050311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.343492] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.351058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.360567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.502029] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.509735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.518898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.803069] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.809627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.816696] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.823244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.832135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.003968] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.010436] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.018924] device bridge_slave_0 entered promiscuous mode [ 208.202592] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.209094] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.217828] device bridge_slave_1 entered promiscuous mode [ 208.454546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.697273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.822624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.384490] bond0: Enslaving bond_slave_0 as an active interface with an up link 08:28:38 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)="2f02726f052f9199aa53f0ac5cf7b64cb7336b650264b1f144ac0b1fc9399668f301b3668ad22b47dd439d3f1bceff3b4f5a2745f500d60000000000000010000000", 0x2761, 0x0) [ 209.552536] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.139295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.146513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.377136] IPVS: ftp: loaded support on port[0] = 21 [ 211.196144] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.204457] team0: Port device team_slave_0 added [ 211.480385] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.488569] team0: Port device team_slave_1 added [ 211.799591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.811373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.820327] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.076953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.084190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.093078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.328259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.336044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.345268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.653172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.660782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.669902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.044634] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.051116] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.059683] device bridge_slave_0 entered promiscuous mode [ 215.389265] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.395913] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.404361] device bridge_slave_1 entered promiscuous mode [ 215.614394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.864574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.268660] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.275257] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.282344] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.288815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.297695] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.654840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.827743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.947206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.213217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.220382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.504618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.511858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:28:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080), 0x0) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x1ff, 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) rt_sigprocmask(0x0, &(0x7f000078b000)={0xfffffffffffffffa}, 0x0, 0x8) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) ptrace$cont(0x1f, r0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000a80), 0x0) [ 218.539088] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.547183] team0: Port device team_slave_0 added [ 218.858204] IPVS: ftp: loaded support on port[0] = 21 [ 218.881433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.889686] team0: Port device team_slave_1 added [ 219.185477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.192779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.202864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.539807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.546988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.555944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.634598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.863786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.871387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.880705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.162166] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.169734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.179174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.065419] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.337435] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.344181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.352537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.729514] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.336624] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.343239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.350230] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.356873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.366282] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.374200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.929470] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.936140] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.945527] device bridge_slave_0 entered promiscuous mode [ 225.240404] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.246977] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.255590] device bridge_slave_1 entered promiscuous mode [ 225.695278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.055361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.072677] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.361083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.857539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.864812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.286282] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.293545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:28:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271", 0x3}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="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", 0x2b7}], 0x1, &(0x7f0000000e00)}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1, &(0x7f0000003b40)}, 0x0) [ 229.615397] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.623795] team0: Port device team_slave_0 added [ 229.826261] IPVS: ftp: loaded support on port[0] = 21 [ 230.098104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.106497] team0: Port device team_slave_1 added [ 230.601822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.608947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.618012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.824145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.030830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.038060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.047080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.479809] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.487936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.497073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.864625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.872380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.881512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.422369] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 08:29:02 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) tkill(r0, 0xc) [ 232.909500] ptrace attach of ""[6818] was attempted by "/root/syz-executor0"[6820] [ 233.304695] ptrace attach of ""[6832] was attempted by "/root/syz-executor0"[6834] 08:29:02 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) tkill(r0, 0xc) [ 233.965075] ptrace attach of ""[6851] was attempted by "/root/syz-executor0"[6855] 08:29:03 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) tkill(r0, 0xc) [ 234.164902] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.171289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.179245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.433097] ptrace attach of ""[6866] was attempted by "/root/syz-executor0"[6869] 08:29:03 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) tkill(r0, 0xc) [ 234.904240] ptrace attach of ""[6883] was attempted by "/root/syz-executor0"[6884] 08:29:04 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) [ 235.680221] 8021q: adding VLAN 0 to HW filter on device team0 08:29:05 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) [ 236.741773] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.748337] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.756876] device bridge_slave_0 entered promiscuous mode 08:29:06 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) [ 237.024881] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.031458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.038578] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.045129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.053606] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.109129] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.115971] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.124397] device bridge_slave_1 entered promiscuous mode [ 237.222535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.492806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.856824] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 08:29:06 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) ptrace(0x10, r0) tkill(r0, 0xc) [ 239.033085] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.409442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.771430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 239.778857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.204977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 240.212192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.088291] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.140715] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 241.149048] team0: Port device team_slave_0 added [ 241.498189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 241.506966] team0: Port device team_slave_1 added [ 241.796298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 241.803539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.812734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.143070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 242.150398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.159143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.271938] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.391354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 242.399061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.408376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.636985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 242.644641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.653962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.395944] ptrace attach of "/root/syz-executor1"[6196] was attempted by "/root/syz-executor1"[7109] 08:29:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1068) [ 243.659106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 243.665789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.673958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.639503] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.504564] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.511071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.518195] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.524855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.533710] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.540477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.660483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.381372] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.075277] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.081820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.089561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:29:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) fallocate(r0, 0x0, 0x0, 0x400) [ 250.805052] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.998608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.550866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.120438] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.127030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.135027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:29:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) fallocate(r0, 0x10, 0x0, 0x400) [ 254.655630] 8021q: adding VLAN 0 to HW filter on device team0 08:29:25 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) 08:29:25 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) ptrace(0x10, r0) tkill(r0, 0xc) 08:29:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$inet6(0xa, 0x7, 0x2, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2, 0x2000000088) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 08:29:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)}], 0x1) r1 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r2 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) ptrace(0x10, r1) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff9c}) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 08:29:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xfffffffffffffffe, 0x0, @local}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x80000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000044c0), 0x0, &(0x7f00000029c0)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8f7951abf89f4cf62c589e1e7231"], 0xe) chdir(&(0x7f0000000180)='./file0\x00') r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) bind$xdp(r3, &(0x7f0000000300), 0x10) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000640)={0xfffffffffffffffc, 0x7, 0x2000}, 0x4) 08:29:25 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000780)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 08:29:25 executing program 2: [ 256.735606] hrtimer: interrupt took 55809 ns 08:29:26 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) ptrace(0x10, r0) tkill(r0, 0xc) 08:29:26 executing program 2: 08:29:26 executing program 4: 08:29:26 executing program 0: clone(0x8000000ff7c, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x10, r0) tkill(r0, 0xc) 08:29:26 executing program 2: 08:29:26 executing program 4: 08:29:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xfffffffffffffffe, 0x0, @local}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x80000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000044c0), 0x0, &(0x7f00000029c0)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8f7951abf89f4cf62c589e1e7231"], 0xe) chdir(&(0x7f0000000180)='./file0\x00') r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) bind$xdp(r3, &(0x7f0000000300), 0x10) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000640)={0xfffffffffffffffc, 0x7, 0x2000}, 0x4) [ 258.370249] IPVS: ftp: loaded support on port[0] = 21 [ 259.622189] ================================================================== [ 259.629668] BUG: KMSAN: uninit-value in _decode_session6+0x635/0x1630 [ 259.636283] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc4+ #63 [ 259.642881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.652273] Call Trace: [ 259.654873] [ 259.657050] dump_stack+0x306/0x460 [ 259.660691] ? _raw_spin_lock_irqsave+0x227/0x340 [ 259.665528] ? _decode_session6+0x635/0x1630 [ 259.669948] kmsan_report+0x1a3/0x2d0 [ 259.673758] __msan_warning+0x7c/0xe0 [ 259.677559] _decode_session6+0x635/0x1630 [ 259.681810] __xfrm_decode_session+0x156/0x200 [ 259.686399] ? xfrm6_get_saddr+0x520/0x520 [ 259.690639] icmp6_send+0x3037/0x3c50 [ 259.694488] ? icmpv6_param_prob+0xc0/0xc0 [ 259.698726] icmpv6_send+0xe5/0x110 [ 259.702355] ip6_link_failure+0x5c/0x310 [ 259.706421] ? ip6_negative_advice+0x3b0/0x3b0 [ 259.711004] ndisc_error_report+0x106/0x1a0 [ 259.715321] ? ndisc_solicit+0x6c0/0x6c0 [ 259.719379] neigh_invalidate+0x35a/0x900 [ 259.723533] neigh_timer_handler+0xca1/0x12a0 [ 259.728039] call_timer_fn+0x326/0x700 [ 259.731949] ? neigh_blackhole+0x60/0x60 [ 259.736012] __run_timers+0xe75/0x12e0 [ 259.739892] ? neigh_blackhole+0x60/0x60 [ 259.743958] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 259.749411] ? timers_dead_cpu+0xb00/0xb00 [ 259.753640] run_timer_softirq+0x2e/0x50 [ 259.757692] __do_softirq+0x601/0xa6d [ 259.761511] irq_exit+0x247/0x280 [ 259.764982] exiting_irq+0xe/0x10 [ 259.768441] smp_apic_timer_interrupt+0x64/0x90 [ 259.773106] apic_timer_interrupt+0xf/0x20 [ 259.777325] [ 259.779570] RIP: 0010:default_idle+0x2e/0x50 [ 259.783973] Code: 53 e8 a6 4b 56 f7 48 89 c3 65 8b 34 25 20 a1 02 00 c7 00 00 00 00 00 c7 40 08 00 00 00 00 bf 01 00 00 00 e8 c4 06 8f f6 fb f4 <65> 8b 34 25 20 a1 02 00 c7 03 00 00 00 00 c7 43 08 00 00 00 00 bf [ 259.802874] RSP: 0018:ffff8801d170fdf8 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13 [ 259.810579] RAX: 4b64f4e7eb05ef00 RBX: ffff8801d16ba788 RCX: 0000000000000001 [ 259.817853] RDX: ffff8801fc150e18 RSI: aaaaaaaaaaaab000 RDI: 0000000000000000 [ 259.825114] RBP: ffff8801d170fe00 R08: ffffffff7fffffff R09: 0000000000000002 [ 259.832394] R10: 0000000000000000 R11: ffffffff8ab079d0 R12: 0000000000000001 [ 259.839713] R13: ffff8801d16b9e00 R14: ffff8801d16ba788 R15: ffff8801d170fe58 [ 259.847005] ? __sched_text_end+0x1/0x1 [ 259.850987] ? default_idle+0x2c/0x50 [ 259.854784] ? __sched_text_end+0x1/0x1 [ 259.858751] arch_cpu_idle+0x26/0x30 [ 259.862461] do_idle+0x350/0x860 [ 259.865828] cpu_startup_entry+0x105/0x150 [ 259.870053] ? setup_APIC_timer+0x200/0x200 [ 259.874368] start_secondary+0x46e/0x590 [ 259.878433] secondary_startup_64+0xa4/0xb0 [ 259.882757] [ 259.884372] Uninit was created at: [ 259.887930] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 259.893026] kmsan_kmalloc+0xa4/0x120 [ 259.896818] kmsan_slab_alloc+0x10/0x20 [ 259.900799] __kmalloc_node_track_caller+0xb43/0x1400 [ 259.905986] __alloc_skb+0x422/0xe90 [ 259.909799] __ip6_append_data+0x3bf8/0x5170 [ 259.914196] ip6_append_data+0x3d8/0x670 [ 259.918251] rawv6_sendmsg+0x2694/0x53e0 [ 259.922307] inet_sendmsg+0x4d8/0x7f0 [ 259.926105] ___sys_sendmsg+0xe47/0x1200 [ 259.930155] __se_sys_sendmsg+0x307/0x460 [ 259.934292] __x64_sys_sendmsg+0x4a/0x70 [ 259.938343] do_syscall_64+0xbe/0x100 [ 259.942135] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 259.947315] ================================================================== [ 259.954677] Disabling lock debugging due to kernel taint [ 259.960113] Kernel panic - not syncing: panic_on_warn set ... [ 259.960113] [ 259.967470] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 4.19.0-rc4+ #63 [ 259.975472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.984912] Call Trace: [ 259.987482] [ 259.989627] dump_stack+0x306/0x460 [ 259.993264] panic+0x54c/0xafa [ 259.996485] kmsan_report+0x2cd/0x2d0 [ 260.000284] __msan_warning+0x7c/0xe0 [ 260.004086] _decode_session6+0x635/0x1630 [ 260.008355] __xfrm_decode_session+0x156/0x200 [ 260.012937] ? xfrm6_get_saddr+0x520/0x520 [ 260.017170] icmp6_send+0x3037/0x3c50 [ 260.021010] ? icmpv6_param_prob+0xc0/0xc0 [ 260.025261] icmpv6_send+0xe5/0x110 [ 260.028905] ip6_link_failure+0x5c/0x310 [ 260.032964] ? ip6_negative_advice+0x3b0/0x3b0 [ 260.037538] ndisc_error_report+0x106/0x1a0 [ 260.041853] ? ndisc_solicit+0x6c0/0x6c0 [ 260.045908] neigh_invalidate+0x35a/0x900 [ 260.050061] neigh_timer_handler+0xca1/0x12a0 [ 260.054567] call_timer_fn+0x326/0x700 [ 260.058447] ? neigh_blackhole+0x60/0x60 [ 260.062521] __run_timers+0xe75/0x12e0 [ 260.066444] ? neigh_blackhole+0x60/0x60 [ 260.070522] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 260.075982] ? timers_dead_cpu+0xb00/0xb00 [ 260.080223] run_timer_softirq+0x2e/0x50 [ 260.084281] __do_softirq+0x601/0xa6d [ 260.088089] irq_exit+0x247/0x280 [ 260.091559] exiting_irq+0xe/0x10 [ 260.095021] smp_apic_timer_interrupt+0x64/0x90 [ 260.099680] apic_timer_interrupt+0xf/0x20 [ 260.103899] [ 260.106150] RIP: 0010:default_idle+0x2e/0x50 [ 260.110551] Code: 53 e8 a6 4b 56 f7 48 89 c3 65 8b 34 25 20 a1 02 00 c7 00 00 00 00 00 c7 40 08 00 00 00 00 bf 01 00 00 00 e8 c4 06 8f f6 fb f4 <65> 8b 34 25 20 a1 02 00 c7 03 00 00 00 00 c7 43 08 00 00 00 00 bf [ 260.129464] RSP: 0018:ffff8801d170fdf8 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13 [ 260.137173] RAX: 4b64f4e7eb05ef00 RBX: ffff8801d16ba788 RCX: 0000000000000001 [ 260.144435] RDX: ffff8801fc150e18 RSI: aaaaaaaaaaaab000 RDI: 0000000000000000 [ 260.151695] RBP: ffff8801d170fe00 R08: ffffffff7fffffff R09: 0000000000000002 [ 260.158955] R10: 0000000000000000 R11: ffffffff8ab079d0 R12: 0000000000000001 [ 260.166218] R13: ffff8801d16b9e00 R14: ffff8801d16ba788 R15: ffff8801d170fe58 [ 260.173550] ? __sched_text_end+0x1/0x1 [ 260.177548] ? default_idle+0x2c/0x50 [ 260.181335] ? __sched_text_end+0x1/0x1 [ 260.185299] arch_cpu_idle+0x26/0x30 [ 260.189007] do_idle+0x350/0x860 [ 260.192372] cpu_startup_entry+0x105/0x150 [ 260.196597] ? setup_APIC_timer+0x200/0x200 [ 260.200908] start_secondary+0x46e/0x590 [ 260.204969] secondary_startup_64+0xa4/0xb0 [ 260.210253] Kernel Offset: disabled [ 260.213893] Rebooting in 86400 seconds..