[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 79.127432][ T32] audit: type=1800 audit(1568320545.176:25): pid=11774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 79.150312][ T32] audit: type=1800 audit(1568320545.196:26): pid=11774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 79.185466][ T32] audit: type=1800 audit(1568320545.226:27): pid=11774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.62' (ECDSA) to the list of known hosts. 2019/09/12 20:35:59 fuzzer started 2019/09/12 20:36:03 dialing manager at 10.128.0.26:34915 2019/09/12 20:36:03 syscalls: 2376 2019/09/12 20:36:03 code coverage: enabled 2019/09/12 20:36:03 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/12 20:36:03 extra coverage: enabled 2019/09/12 20:36:03 setuid sandbox: enabled 2019/09/12 20:36:03 namespace sandbox: enabled 2019/09/12 20:36:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/12 20:36:03 fault injection: enabled 2019/09/12 20:36:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/12 20:36:03 net packet injection: enabled 2019/09/12 20:36:03 net device setup: enabled 20:38:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, 0x0, 0x0, 0x10400003) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0xc00) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(0x0) fcntl$getown(r2, 0x9) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e40004000400000025000000ffffffff03000f0bf6d5029cc3956bc47830827a1f0eb475a0dd2da7d90d07b99f4f1ea7e80b0d463611b53db80bc0660a4aec996e9b1f01f886406c3836295834debfd50312076ca7b84ce07be86660229b4fb23153f5d7a23eb085ea68516812b6308eedc87c4398a4d19ed282851352bd07288cab1288aaa6effb555d42fb2d2c99886408f28442688736343762cad0b8c32152ea60da9a59084358e0c1e033bee0d359e3ee213e8defb66b47edd50db7c908a0b42c438964bacf5944ab1dfaeee054aeb8cb11528984d1da393fa7732b694d9d802eab87f6ffffff00"/505], 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syzkaller login: [ 252.804079][T11939] IPVS: ftp: loaded support on port[0] = 21 [ 252.941962][T11939] chnl_net:caif_netlink_parms(): no params data found [ 252.996232][T11939] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.003539][T11939] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.012249][T11939] device bridge_slave_0 entered promiscuous mode [ 253.022460][T11939] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.029637][T11939] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.038496][T11939] device bridge_slave_1 entered promiscuous mode [ 253.071560][T11939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.084185][T11939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.115983][T11939] team0: Port device team_slave_0 added [ 253.125644][T11939] team0: Port device team_slave_1 added [ 253.236642][T11939] device hsr_slave_0 entered promiscuous mode [ 253.353001][T11939] device hsr_slave_1 entered promiscuous mode [ 253.492420][T11939] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.499640][T11939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.509425][T11939] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.516674][T11939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.595118][T11939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.614280][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.626254][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.636708][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.648966][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 253.668419][T11939] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.686416][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.695915][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.703232][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.757793][T11939] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 253.768280][T11939] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 253.785736][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.795486][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.802713][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.813234][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.823306][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.832928][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.842451][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.853150][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.861383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.896598][T11939] 8021q: adding VLAN 0 to HW filter on device batadv0 20:38:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000000)) 20:38:40 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x42, 0x0) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 20:38:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001404001a0012000200040001000a002500"/57, 0x39}], 0x1) 20:38:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup(r1) getsockname$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) [ 255.108627][T11957] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.0'. 20:38:41 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff26, &(0x7f0000000040)={0x0, 0x166}}, 0x0) r0 = socket(0x6000000000010, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="3100000013000900690006342fc56aef40be44081000000046000107000000540d0003c0256465a3000000002075702e1a", 0x31}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492540, 0x0) [ 255.297262][T11965] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.0'. 20:38:41 executing program 0: unshare(0x20000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x39f) 20:38:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) 20:38:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000040)) 20:38:42 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) connect$tipc(r0, &(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x3}}, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x200000) write$smack_current(r1, &(0x7f00000000c0)='/dev/snapshot\x00', 0xe) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f0000000200)) r4 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x4, 0x404000) openat$cgroup_subtree(r4, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000002c0), 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x148840, 0x0) r5 = accept4$inet(r2, 0x0, &(0x7f0000000340), 0x80c00) recvmsg(r5, &(0x7f0000000780)={&(0x7f0000000380)=@ax25={{}, [@rose, @rose, @rose, @null, @remote, @null, @remote, @null]}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/59, 0x3b}, {&(0x7f0000000440)=""/148, 0x94}, {&(0x7f0000000500)=""/27, 0x1b}, {&(0x7f0000000540)=""/135, 0x87}, {&(0x7f0000000600)=""/217, 0xd9}], 0x5}, 0x20) pipe2(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bind$can_raw(r6, &(0x7f0000000800), 0x10) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000840), 0x4) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:autofs_device_t:s0\x00', 0x25, 0x2) r8 = syz_open_dev$vcsa(&(0x7f0000000940)='/dev/vcsa#\x00', 0x81, 0x20080) ioctl$IMSETDEVNAME(r8, 0x80184947, &(0x7f0000000980)={0x1f, 'syz1\x00'}) openat$vimc0(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/video0\x00', 0x2, 0x0) r9 = syz_open_dev$media(&(0x7f0000000a00)='/dev/media#\x00', 0x3, 0x2000) ioctl$VIDIOC_ENUM_FRAMESIZES(r9, 0xc02c564a, &(0x7f0000000a40)={0x400, 0x119628f3ac76ee9f, 0x0, @stepwise={0x40, 0x10000, 0x1, 0x1ff, 0x8, 0x78b}}) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/audio\x00', 0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000ac0)={@rand_addr, 0x0}, &(0x7f0000000b00)=0x14) bind$can_raw(r10, &(0x7f0000000b40)={0x1d, r11}, 0x10) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000b80)={[0x0, 0x0, 0x0, 0xa5a, 0x2, 0xa147, 0x2, 0xfff, 0x2, 0x20, 0x10001, 0x3ff, 0x1, 0x180000000000, 0x5, 0xac3], 0xbb7c55c79184537b, 0x280144}) 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) socket$inet6_sctp(0xa, 0x5, 0x84) socket$l2tp(0x18, 0x1, 0x1) 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) socket$inet6_sctp(0xa, 0x5, 0x84) 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="fb783f75d4daa3ee6a8fb16688072970"}]}, &(0x7f0000000180)=0x10) [ 256.770234][T12002] IPVS: ftp: loaded support on port[0] = 21 20:38:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000001) setsockopt$sock_int(r1, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) shutdown(r0, 0x0) 20:38:43 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) setsockopt$sock_int(r0, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=""/158, &(0x7f0000000000)=0x9e) [ 257.010352][T12002] chnl_net:caif_netlink_parms(): no params data found 20:38:43 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) setsockopt$sock_int(r0, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, [], [{0x10000, 0x80, 0x2, 0xb2bf, 0x4, 0xffffffff}, {0xcf9, 0xff, 0x3, 0x98, 0xffffffff80000001, 0x2}], [[], []]}) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 257.118246][T12002] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.125572][T12002] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.134387][T12002] device bridge_slave_0 entered promiscuous mode [ 257.143693][T12002] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.151022][T12002] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.159782][T12002] device bridge_slave_1 entered promiscuous mode [ 257.205714][T12002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.219134][T12002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:38:43 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) setsockopt$sock_int(r0, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) fcntl$dupfd(r0, 0x0, r0) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 257.251855][T12002] team0: Port device team_slave_0 added [ 257.260965][T12002] team0: Port device team_slave_1 added [ 257.326312][T12002] device hsr_slave_0 entered promiscuous mode 20:38:43 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) setsockopt$sock_int(r0, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 257.372937][T12002] device hsr_slave_1 entered promiscuous mode [ 257.401960][T12002] debugfs: Directory 'hsr0' with parent '/' already present! 20:38:43 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) setsockopt$sock_int(r0, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 257.465142][T12002] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.472650][T12002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.480390][T12002] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.487676][T12002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.587412][T12002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.610343][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.623620][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.634948][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.647680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 257.668474][T12002] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.688498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.697892][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.705240][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.767412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.776858][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.784167][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.794733][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.804914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.814505][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.823679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.834353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.845820][T12002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.883214][T12002] 8021q: adding VLAN 0 to HW filter on device batadv0 20:38:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000080)={'gre0\x00', @ifru_flags}) 20:38:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0)=0x5, 0x252) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000590200000000000200000002"]) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000590200000000000200000002"]) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000004c0)) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) r10 = socket$inet(0xa, 0x801, 0x84) connect$inet(r10, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r10, 0x100000001) setsockopt$sock_int(r10, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r11 = accept4(r10, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r11, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r11, &(0x7f0000004300), 0x3a4, 0x0, 0x0) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x66, &(0x7f0000000040)={r13}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r11, 0x84, 0x7c, &(0x7f0000000000)={r13, 0x80000001, 0xffffffff00000001}, 0x8) ioctl$KVM_SET_MSRS(r9, 0x4008ae89, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000590200000000000200000002"]) ioctl$KVM_GET_FPU(r9, 0x81a0ae8c, &(0x7f0000000300)) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) [ 258.263911][T12034] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:38:44 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) setsockopt$sock_int(r0, 0x1, 0x40, &(0x7f0000000000)=0x7ff, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 258.973866][ C0] ================================================================== [ 258.982013][ C0] BUG: KMSAN: uninit-value in kmem_cache_alloc_node+0x5d0/0xe70 [ 258.989685][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.3.0-rc7+ #0 [ 258.996787][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.006854][ C0] Call Trace: [ 259.010138][ C0] [ 259.013083][ C0] dump_stack+0x191/0x1f0 [ 259.017434][ C0] kmsan_report+0x162/0x2d0 [ 259.021948][ C0] __msan_warning+0x75/0xe0 [ 259.026480][ C0] kmem_cache_alloc_node+0x5d0/0xe70 [ 259.031859][ C0] ? __alloc_skb+0x215/0xa10 [ 259.036480][ C0] ? kmsan_get_metadata_or_null+0x208/0x290 [ 259.042401][ C0] __alloc_skb+0x215/0xa10 [ 259.046857][ C0] aoecmd_cfg+0x205/0xa80 [ 259.051229][ C0] discover_timer+0x86/0xa0 [ 259.055746][ C0] call_timer_fn+0x232/0x530 [ 259.060349][ C0] ? skbfree+0x4a0/0x4a0 [ 259.064599][ C0] __run_timers+0xcdc/0x11a0 [ 259.069191][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 259.075439][ C0] ? skbfree+0x4a0/0x4a0 [ 259.079835][ C0] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 259.085841][ C0] run_timer_softirq+0x2d/0x50 [ 259.090615][ C0] ? timers_dead_cpu+0x9d0/0x9d0 [ 259.095617][ C0] __do_softirq+0x4a1/0x83a [ 259.100145][ C0] irq_exit+0x230/0x280 [ 259.104322][ C0] exiting_irq+0xe/0x10 [ 259.108484][ C0] smp_apic_timer_interrupt+0x48/0x70 [ 259.113889][ C0] apic_timer_interrupt+0x2e/0x40 [ 259.118996][ C0] [ 259.121937][ C0] RIP: 0010:default_idle+0x53/0x90 [ 259.127054][ C0] Code: 13 ee eb f2 44 8b 35 94 79 d2 01 48 c7 c7 78 d5 25 90 e8 d0 9a b1 f3 83 38 00 75 31 45 85 f6 7e 07 0f 00 2d 8f f3 4d 00 fb f4 <65> 8b 35 2e 57 af 71 c7 03 00 00 00 00 c7 43 08 00 00 00 00 bf ff [ 259.146849][ C0] RSP: 0018:ffffffff8f60fda0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 259.155394][ C0] RAX: ffff888217c47578 RBX: ffffffff8f638b60 RCX: ccccccccccccd000 [ 259.163371][ C0] RDX: ffff888207e40578 RSI: ffffea000a76d630 RDI: ffffffff9025d578 [ 259.171347][ C0] RBP: ffffffff8f60fdb0 R08: ffffea000000000f R09: ffff88812fffb000 [ 259.179322][ C0] R10: 0000000000000004 R11: ffffffff8e535bb0 R12: 0000000000000000 [ 259.187294][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff8f638b60 [ 259.195307][ C0] ? __cpuidle_text_start+0x8/0x8 [ 259.200362][ C0] ? __cpuidle_text_start+0x8/0x8 [ 259.205387][ C0] arch_cpu_idle+0x25/0x30 [ 259.209807][ C0] do_idle+0x1d7/0x790 [ 259.213883][ C0] cpu_startup_entry+0x45/0x50 [ 259.218660][ C0] rest_init+0x1be/0x1f0 [ 259.222939][ C0] arch_call_rest_init+0x13/0x15 [ 259.227883][ C0] start_kernel+0x991/0xb61 [ 259.232396][ C0] x86_64_start_reservations+0x18/0x2e [ 259.238000][ C0] x86_64_start_kernel+0x81/0x84 [ 259.242951][ C0] secondary_startup_64+0xa4/0xb0 [ 259.247981][ C0] [ 259.250308][ C0] Uninit was stored to memory at: [ 259.255338][ C0] kmsan_internal_chain_origin+0xcc/0x150 [ 259.261055][ C0] __msan_chain_origin+0x6b/0xe0 [ 259.265993][ C0] ___slab_alloc+0x1dbc/0x1fb0 [ 259.270754][ C0] kmem_cache_alloc_node+0x769/0xe70 [ 259.276041][ C0] __alloc_skb+0x215/0xa10 [ 259.280460][ C0] aoecmd_cfg+0x205/0xa80 [ 259.284789][ C0] discover_timer+0x86/0xa0 [ 259.289291][ C0] call_timer_fn+0x232/0x530 [ 259.293884][ C0] __run_timers+0xcdc/0x11a0 [ 259.298475][ C0] run_timer_softirq+0x2d/0x50 [ 259.303239][ C0] __do_softirq+0x4a1/0x83a [ 259.307738][ C0] irq_exit+0x230/0x280 [ 259.311898][ C0] exiting_irq+0xe/0x10 [ 259.316058][ C0] smp_apic_timer_interrupt+0x48/0x70 [ 259.321434][ C0] apic_timer_interrupt+0x2e/0x40 [ 259.326455][ C0] default_idle+0x53/0x90 [ 259.330788][ C0] arch_cpu_idle+0x25/0x30 [ 259.335201][ C0] do_idle+0x1d7/0x790 [ 259.339263][ C0] cpu_startup_entry+0x45/0x50 [ 259.344024][ C0] rest_init+0x1be/0x1f0 [ 259.348263][ C0] arch_call_rest_init+0x13/0x15 [ 259.353194][ C0] start_kernel+0x991/0xb61 [ 259.357693][ C0] x86_64_start_reservations+0x18/0x2e [ 259.363151][ C0] x86_64_start_kernel+0x81/0x84 [ 259.368088][ C0] secondary_startup_64+0xa4/0xb0 [ 259.373099][ C0] [ 259.375417][ C0] Uninit was created at: [ 259.379659][ C0] kmsan_internal_poison_shadow+0x58/0xb0 [ 259.385375][ C0] kmsan_slab_free+0x8d/0x100 [ 259.390054][ C0] kmem_cache_free_bulk+0x3ad9/0x3f50 [ 259.395420][ C0] __kfree_skb_flush+0xb0/0x100 [ 259.400347][ C0] net_rx_action+0x1908/0x1950 [ 259.405112][ C0] __do_softirq+0x4a1/0x83a [ 259.409611][ C0] irq_exit+0x230/0x280 [ 259.413785][ C0] do_IRQ+0x20d/0x3a0 [ 259.417766][ C0] ret_from_intr+0x0/0x33 [ 259.422260][ C0] ================================================================== [ 259.430319][ C0] Disabling lock debugging due to kernel taint [ 259.436468][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 259.443056][ C0] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B 5.3.0-rc7+ #0 [ 259.451543][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.461736][ C0] Call Trace: [ 259.465030][ C0] [ 259.467915][ C0] dump_stack+0x191/0x1f0 [ 259.472260][ C0] panic+0x3c9/0xc1e [ 259.476204][ C0] kmsan_report+0x2ca/0x2d0 [ 259.480721][ C0] __msan_warning+0x75/0xe0 [ 259.485238][ C0] kmem_cache_alloc_node+0x5d0/0xe70 [ 259.490531][ C0] ? __alloc_skb+0x215/0xa10 [ 259.495126][ C0] ? kmsan_get_metadata_or_null+0x208/0x290 [ 259.501039][ C0] __alloc_skb+0x215/0xa10 [ 259.505490][ C0] aoecmd_cfg+0x205/0xa80 [ 259.509841][ C0] discover_timer+0x86/0xa0 [ 259.514354][ C0] call_timer_fn+0x232/0x530 [ 259.518946][ C0] ? skbfree+0x4a0/0x4a0 [ 259.523196][ C0] __run_timers+0xcdc/0x11a0 [ 259.527791][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 259.533861][ C0] ? skbfree+0x4a0/0x4a0 [ 259.538265][ C0] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 259.544257][ C0] run_timer_softirq+0x2d/0x50 [ 259.549028][ C0] ? timers_dead_cpu+0x9d0/0x9d0 [ 259.553973][ C0] __do_softirq+0x4a1/0x83a [ 259.558495][ C0] irq_exit+0x230/0x280 [ 259.562656][ C0] exiting_irq+0xe/0x10 [ 259.566820][ C0] smp_apic_timer_interrupt+0x48/0x70 [ 259.572198][ C0] apic_timer_interrupt+0x2e/0x40 [ 259.577211][ C0] [ 259.580149][ C0] RIP: 0010:default_idle+0x53/0x90 [ 259.585259][ C0] Code: 13 ee eb f2 44 8b 35 94 79 d2 01 48 c7 c7 78 d5 25 90 e8 d0 9a b1 f3 83 38 00 75 31 45 85 f6 7e 07 0f 00 2d 8f f3 4d 00 fb f4 <65> 8b 35 2e 57 af 71 c7 03 00 00 00 00 c7 43 08 00 00 00 00 bf ff [ 259.604869][ C0] RSP: 0018:ffffffff8f60fda0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 259.613374][ C0] RAX: ffff888217c47578 RBX: ffffffff8f638b60 RCX: ccccccccccccd000 [ 259.621433][ C0] RDX: ffff888207e40578 RSI: ffffea000a76d630 RDI: ffffffff9025d578 [ 259.629420][ C0] RBP: ffffffff8f60fdb0 R08: ffffea000000000f R09: ffff88812fffb000 [ 259.637402][ C0] R10: 0000000000000004 R11: ffffffff8e535bb0 R12: 0000000000000000 [ 259.645389][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff8f638b60 [ 259.653507][ C0] ? __cpuidle_text_start+0x8/0x8 [ 259.658547][ C0] ? __cpuidle_text_start+0x8/0x8 [ 259.663574][ C0] arch_cpu_idle+0x25/0x30 [ 259.667992][ C0] do_idle+0x1d7/0x790 [ 259.672094][ C0] cpu_startup_entry+0x45/0x50 [ 259.676857][ C0] rest_init+0x1be/0x1f0 [ 259.681101][ C0] arch_call_rest_init+0x13/0x15 [ 259.686036][ C0] start_kernel+0x991/0xb61 [ 259.690547][ C0] x86_64_start_reservations+0x18/0x2e [ 259.696007][ C0] x86_64_start_kernel+0x81/0x84 [ 259.700954][ C0] secondary_startup_64+0xa4/0xb0 [ 259.707333][ C0] Kernel Offset: disabled [ 259.711662][ C0] Rebooting in 86400 seconds..