[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 107.070167][ T32] audit: type=1800 audit(1565116791.111:25): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 107.095082][ T32] audit: type=1800 audit(1565116791.141:26): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 107.131926][ T32] audit: type=1800 audit(1565116791.171:27): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. 2019/08/06 18:40:07 fuzzer started 2019/08/06 18:40:13 dialing manager at 10.128.0.26:44947 2019/08/06 18:40:14 syscalls: 2367 2019/08/06 18:40:14 code coverage: enabled 2019/08/06 18:40:14 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/08/06 18:40:14 extra coverage: enabled 2019/08/06 18:40:14 setuid sandbox: enabled 2019/08/06 18:40:14 namespace sandbox: enabled 2019/08/06 18:40:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/06 18:40:14 fault injection: enabled 2019/08/06 18:40:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/06 18:40:14 net packet injection: enabled 2019/08/06 18:40:14 net device setup: enabled 18:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000008c0)={0x0, 0xfffffffffffffea5, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/252, 0xfc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x3e7}], 0x100000000000000b, 0x0, 0x191}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2d79, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) accept4$unix(r1, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) syzkaller login: [ 332.951050][T12209] IPVS: ftp: loaded support on port[0] = 21 [ 333.130525][T12209] chnl_net:caif_netlink_parms(): no params data found [ 333.199105][T12209] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.206453][T12209] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.215673][T12209] device bridge_slave_0 entered promiscuous mode [ 333.226454][T12209] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.233777][T12209] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.242945][T12209] device bridge_slave_1 entered promiscuous mode [ 333.282412][T12209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.296664][T12209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.336467][T12209] team0: Port device team_slave_0 added [ 333.346874][T12209] team0: Port device team_slave_1 added [ 333.447952][T12209] device hsr_slave_0 entered promiscuous mode [ 333.632736][T12209] device hsr_slave_1 entered promiscuous mode [ 333.919182][T12209] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.926523][T12209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.934514][T12209] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.941820][T12209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.047217][T12209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 334.076160][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.089409][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.101334][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.116250][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 334.138798][T12209] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.160538][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.170322][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.179953][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.187201][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.251133][T12209] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 334.262225][T12209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 334.278436][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.288557][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.297900][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.305152][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.313861][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 334.324338][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 334.334882][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 334.345226][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.355145][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 334.365467][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 334.375378][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.384833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.394909][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.404370][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.424106][T12212] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 334.433467][T12212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 334.469198][T12209] 8021q: adding VLAN 0 to HW filter on device batadv0 18:43:38 executing program 0: r0 = msgget$private(0x0, 0x20) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) r1 = creat(&(0x7f0000001000)='./file0\x00', 0x6) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000001040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000001080)=0x10) r2 = open$dir(&(0x7f00000010c0)='./file0\x00', 0x80, 0x20) arch_prctl$ARCH_SET_CPUID(0x1012, 0x802) truncate(&(0x7f0000001180)='./file0\x00', 0xb9fd) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000011c0)=""/126) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001fc0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000020c0)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002340)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002480)={{{@in=@remote, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000002580)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000002680)={0x0, @local, @multicast1}, &(0x7f00000026c0)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002700)={'bond_slave_1\x00', r3}) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000001280)={@dev={0xfe, 0x80, [], 0xe}, r4}, 0x14) execve(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001340)=[&(0x7f0000001300)='\x00'], &(0x7f0000001440)=[&(0x7f0000001380)='em1!-\x00', &(0x7f00000013c0)='md5sum\x00', &(0x7f0000001400)='com.apple.FinderInfo\x00']) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000001480)=""/170) lgetxattr(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580)=@known='trusted.overlay.metacopy\x00', &(0x7f00000015c0)=""/21, 0x15) fchmodat(r2, &(0x7f0000001100)='./file0\x00', 0x90) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000001640), &(0x7f0000001680)=0x4) r5 = open(&(0x7f00000016c0)='./file0/../file0/file0\x00', 0x0, 0x156) r6 = socket$inet6(0xa, 0x800, 0x3) getsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000001700)=""/67, &(0x7f0000001780)=0x43) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000017c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001800)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r7, 0x10, &(0x7f0000001840)={0x10001}) shmctl$SHM_UNLOCK(r0, 0xc) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000001880)='/dev/zero\x00', 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f00000018c0), 0x4) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000001900)='bond_slave_1\x00', 0x10) write$binfmt_elf32(r1, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], 0x531) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xd) 18:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/244, 0xf4}, {0x0}], 0x2}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfffffea4, 0x0, 0x0, 0x800e00552) shutdown(r2, 0x0) r4 = dup(r3) recvfrom$inet(r3, 0x0, 0x5680, 0x0, 0x0, 0x800e00545) shutdown(r4, 0x0) recvfrom$inet(r0, 0x0, 0x100000007, 0x2, 0x0, 0x800e00522) shutdown(r0, 0x0) 18:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, &(0x7f0000000040)=""/239, 0xef, 0x42, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5ccc6270, 0x0, 0x0, 0x800e00601) shutdown(r0, 0x0) r2 = dup(r1) recvmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/124, 0x7c}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) shutdown(r2, 0x0) 18:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, &(0x7f0000000040)=""/239, 0xef, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5ccc6270, 0x0, 0x0, 0x800e00601) shutdown(r0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/111, 0x6f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x0) r2 = dup(r1) shutdown(r2, 0x0) 18:43:39 executing program 0: r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000008c0)={{0x12, 0x1, 0x0, 0xcc, 0xa0, 0xed, 0x8, 0x424, 0x7500, 0x8212, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xba, 0x0, 0x2, 0xf2, 0x23, 0x6b, 0x0, [], [{{0x9, 0x5, 0x1, 0x2}}, {{0x9, 0x5, 0x8a, 0x2}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000014c0)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000001bc0)={0xcc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f00000003c0)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000d40)={0xcc, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 336.202097][ T12] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 336.461965][ T12] usb 1-1: Using ep0 maxpacket: 8 18:43:40 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) recvfrom$unix(r0, &(0x7f0000000080)=""/234, 0xea, 0x12023, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000200)={0x8, 0x6, 0x0, 0x20000000000, 'syz1\x00', 0x8}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000240)={0x890, 0x2, 0xb8, 0x1880, 0x1, 0x5b, 0x8}) pwritev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)="2be9cd03156ecd7d4f59cde56a8cc60a9627cf48bce725cc48afcc1065a1840d90ad11c8514e75963046685ad13eeda9d09c4eb3fa929aa299105d59df382fcdf49bb29391a42447ab97f142bbaaf62ce4fdf35d117670f9b55e659ecd2a2e653fed3920a2f344ec684266b995d9f7b837cc78ec4763746f1dcbc2edffbee9769909a5d27d79c53bfba9ce3bfbfb96d32b9dffbbd8f9b9b1ee92b85583e3a35e50d4abb86fbea216857365fbaf6889908e487c1e8c5fd44831e4be1dc66de300f5e7", 0xc2}, {&(0x7f0000000380)="0b46690f3e0baa42c7", 0x9}, {&(0x7f00000003c0)="d23c12b49ea9a98574b8f661270d25340d4b5cf4ae80e112e7bac29fd8d69f9aec8f64feb4677881d9ca552ba18601b659f5490ab10247d99b91d193fe4e383ac42b0e0c3cda6f20fc474814ba31ce680f66638a7ae5f52720eec073c7b23818b0bfa6ad6f943ea429f31c4bb078cffa", 0x70}], 0x3, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000480)=0x9b16, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000004c0)={0x7fff, 0x0, 0x8000}, 0x4) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000500)="aa8dc37c0b9dc3ca5b3f45193bb32eac83e11efc365af7d93856f46b2126bb75b7b31eed8c6681807ee607d5d6dd1ea03bf145a736ad41a395cc51d73a4f8a35731ee786940e96b5869372a48697ca7c08864d9f970bc0adf6a9ce83843c957e22b46ebfc9eb196957d4e7e99cbaa3faa90c4a2dd5a1a116d1f5a870731b7d54b5c94b433aeda7f61dcb149ba6a6bd18f6a94c8fd03d0236f8b6d6b69d0d943b60e889a6d23e84d08e1c7001d5a7fbdeb3f01a812112e3148a59856d543d6887e0b20e870aa924eafd6de414f646ae65504294cddd446eed927f1f113bc477ae5207251117e70590bf01e7c34afa6d") ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000600)={{0x0, 0x0, 0xffff, 0x2, 0x100000000, 0x101}, 0x773, 0xf6, 0x7fffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000640)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000680)=0xc00001c) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f00000006c0)=0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000a40)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a00)={&(0x7f0000000780)={0x260, r1, 0x400, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2f2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1a44000000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe32e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff8ed5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2825}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x26}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x49}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x33fa}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x6b6aec73, @rand_addr="6630deb460ce3dbc03e9c540655cc6b6", 0x200}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3, @empty, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x7}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @remote, 0x8}}}}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x14}, 0x4000800) mknod(&(0x7f0000000a80)='./file0\x00', 0x0, 0x10000) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000ac0)='trusted.overlay.origin\x00', &(0x7f0000000b00)='y\x00', 0x2, 0x6e978d8e60c65e97) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000b40)={0x0, 0x7}, &(0x7f0000000b80)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000bc0)=@assoc_id=r2, 0x4) socket$rds(0x15, 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000c00)={0x8001, 0x10, [0x3, 0x0, 0x1ff, 0x82a]}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000c40)={0x77, 0x6, 0x9, "dd942dc4f34335f8aa8709791187f580cb72e8701ba51988af5264ef6632dd3c27dece6542aab8add90d6c37cc43688c2d825d123fe63e0ae583fee21b98ca388cbdc070a7f7bd1cd42e6c8bbb0ae9d17d615a007dcf0455e66906a20a3250e468441d9304ff548a01dbb8f1f9ea9accf87d2044f34496"}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000e00)=0xe8) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) socket$rxrpc(0x21, 0x2, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000f00)) connect$tipc(r0, &(0x7f0000000f40)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x1, 0x2}}, 0x10) mount(&(0x7f0000000f80)=@nullb='/dev/nullb0\x00', &(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)='pipefs\x00', 0x2010000, &(0x7f0000001040)='ib\x00') ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000001080)=""/1) [ 336.582751][ T12] usb 1-1: config 0 has an invalid interface number: 186 but max is 0 [ 336.591118][ T12] usb 1-1: config 0 has no interface number 0 [ 336.597432][ T12] usb 1-1: config 0 interface 186 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 336.607459][ T12] usb 1-1: config 0 interface 186 altsetting 0 bulk endpoint 0x8A has invalid maxpacket 0 [ 336.617565][ T12] usb 1-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=82.12 [ 336.627675][ T12] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 336.695659][ T12] usb 1-1: config 0 descriptor?? [ 336.735500][ T12] smsc75xx v1.0.0 [ 337.017452][T12254] IPVS: ftp: loaded support on port[0] = 21 [ 337.184884][ T12] ================================================================== [ 337.193012][ T12] BUG: KMSAN: uninit-value in smsc75xx_bind+0x541/0x12d0 [ 337.200061][ T12] CPU: 0 PID: 12 Comm: kworker/0:1 Not tainted 5.3.0-rc3+ #16 [ 337.207519][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.217595][ T12] Workqueue: usb_hub_wq hub_event [ 337.222629][ T12] Call Trace: [ 337.226026][ T12] dump_stack+0x191/0x1f0 [ 337.230393][ T12] kmsan_report+0x162/0x2d0 [ 337.234930][ T12] __msan_warning+0x75/0xe0 [ 337.239465][ T12] smsc75xx_bind+0x541/0x12d0 [ 337.244172][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.250193][ T12] ? smsc75xx_write_wuff+0x9e0/0x9e0 [ 337.255513][ T12] usbnet_probe+0x10ae/0x3960 [ 337.260263][ T12] ? usbnet_disconnect+0x660/0x660 [ 337.265404][ T12] usb_probe_interface+0xd19/0x1310 [ 337.270493][T12254] chnl_net:caif_netlink_parms(): no params data found [ 337.270639][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.283397][ T12] ? usb_register_driver+0x7d0/0x7d0 [ 337.288708][ T12] really_probe+0x1373/0x1dc0 [ 337.293426][ T12] driver_probe_device+0x1ba/0x510 [ 337.298574][ T12] __device_attach_driver+0x5b8/0x790 [ 337.303993][ T12] ? bus_for_each_drv+0x1d5/0x3b0 [ 337.309054][ T12] bus_for_each_drv+0x28e/0x3b0 [ 337.313926][ T12] ? deferred_probe_work_func+0x400/0x400 [ 337.319709][ T12] __device_attach+0x489/0x750 [ 337.324529][ T12] device_initial_probe+0x4a/0x60 [ 337.329584][ T12] bus_probe_device+0x131/0x390 [ 337.334472][ T12] device_add+0x25b5/0x2df0 [ 337.339033][ T12] ? usb_set_configuration+0x3036/0x3710 [ 337.344701][ T12] usb_set_configuration+0x309f/0x3710 [ 337.350253][ T12] generic_probe+0xe7/0x280 [ 337.354785][ T12] ? usb_probe_device+0x104/0x200 [ 337.359834][ T12] ? usb_choose_configuration+0xae0/0xae0 [ 337.365574][ T12] usb_probe_device+0x146/0x200 [ 337.370450][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.376465][ T12] ? usb_register_device_driver+0x470/0x470 [ 337.382379][ T12] really_probe+0x1373/0x1dc0 [ 337.387101][ T12] driver_probe_device+0x1ba/0x510 [ 337.392259][ T12] __device_attach_driver+0x5b8/0x790 [ 337.397666][ T12] ? bus_for_each_drv+0x1d5/0x3b0 [ 337.402717][ T12] bus_for_each_drv+0x28e/0x3b0 [ 337.407589][ T12] ? deferred_probe_work_func+0x400/0x400 [ 337.413344][ T12] __device_attach+0x489/0x750 [ 337.413561][T12254] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.418146][ T12] device_initial_probe+0x4a/0x60 [ 337.425424][T12254] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.430213][ T12] bus_probe_device+0x131/0x390 [ 337.439416][T12254] device bridge_slave_0 entered promiscuous mode [ 337.442075][ T12] device_add+0x25b5/0x2df0 [ 337.442142][ T12] usb_new_device+0x23e5/0x2fb0 [ 337.457842][ T12] hub_event+0x581d/0x72f0 [ 337.462367][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.468371][ T12] ? led_work+0x720/0x720 [ 337.472717][ T12] ? led_work+0x720/0x720 [ 337.477065][ T12] process_one_work+0x1572/0x1ef0 [ 337.481418][T12254] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.482140][ T12] worker_thread+0x111b/0x2460 [ 337.482203][ T12] kthread+0x4b5/0x4f0 [ 337.482254][ T12] ? process_one_work+0x1ef0/0x1ef0 [ 337.489393][T12254] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.494036][ T12] ? kthread_blkcg+0xf0/0xf0 [ 337.494123][ T12] ret_from_fork+0x35/0x40 [ 337.494156][ T12] [ 337.500096][T12254] device bridge_slave_1 entered promiscuous mode [ 337.503419][ T12] Local variable description: ----buf.i93@smsc75xx_bind [ 337.503425][ T12] Variable was created at: [ 337.503448][ T12] smsc75xx_bind+0x44c/0x12d0 [ 337.503467][ T12] usbnet_probe+0x10ae/0x3960 [ 337.503474][ T12] ================================================================== [ 337.503481][ T12] Disabling lock debugging due to kernel taint [ 337.503491][ T12] Kernel panic - not syncing: panic_on_warn set ... [ 337.503513][ T12] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G B 5.3.0-rc3+ #16 [ 337.503551][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.588592][ T12] Workqueue: usb_hub_wq hub_event [ 337.593633][ T12] Call Trace: [ 337.596949][ T12] dump_stack+0x191/0x1f0 [ 337.600790][T12254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 337.601324][ T12] panic+0x3c9/0xc1e [ 337.614284][ T12] kmsan_report+0x2ca/0x2d0 [ 337.618818][ T12] __msan_warning+0x75/0xe0 [ 337.623354][ T12] smsc75xx_bind+0x541/0x12d0 [ 337.628057][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.634062][ T12] ? smsc75xx_write_wuff+0x9e0/0x9e0 [ 337.634580][T12254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 337.639391][ T12] usbnet_probe+0x10ae/0x3960 [ 337.653223][ T12] ? usbnet_disconnect+0x660/0x660 [ 337.658361][ T12] usb_probe_interface+0xd19/0x1310 [ 337.663600][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.670063][ T12] ? usb_register_driver+0x7d0/0x7d0 [ 337.675382][ T12] really_probe+0x1373/0x1dc0 [ 337.680104][ T12] driver_probe_device+0x1ba/0x510 [ 337.685262][ T12] __device_attach_driver+0x5b8/0x790 [ 337.690671][ T12] ? bus_for_each_drv+0x1d5/0x3b0 [ 337.695743][ T12] bus_for_each_drv+0x28e/0x3b0 [ 337.700607][ T12] ? deferred_probe_work_func+0x400/0x400 [ 337.706357][ T12] __device_attach+0x489/0x750 [ 337.711164][ T12] device_initial_probe+0x4a/0x60 [ 337.716221][ T12] bus_probe_device+0x131/0x390 [ 337.721098][ T12] device_add+0x25b5/0x2df0 [ 337.725641][ T12] ? usb_set_configuration+0x3036/0x3710 [ 337.731293][ T12] usb_set_configuration+0x309f/0x3710 [ 337.736835][ T12] generic_probe+0xe7/0x280 [ 337.741348][ T12] ? usb_probe_device+0x104/0x200 [ 337.746389][ T12] ? usb_choose_configuration+0xae0/0xae0 [ 337.752147][ T12] usb_probe_device+0x146/0x200 [ 337.757021][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.763019][ T12] ? usb_register_device_driver+0x470/0x470 [ 337.768927][ T12] really_probe+0x1373/0x1dc0 [ 337.773638][ T12] driver_probe_device+0x1ba/0x510 [ 337.778775][ T12] __device_attach_driver+0x5b8/0x790 [ 337.784166][ T12] ? bus_for_each_drv+0x1d5/0x3b0 [ 337.789235][ T12] bus_for_each_drv+0x28e/0x3b0 [ 337.794093][ T12] ? deferred_probe_work_func+0x400/0x400 [ 337.799840][ T12] __device_attach+0x489/0x750 [ 337.804645][ T12] device_initial_probe+0x4a/0x60 [ 337.809691][ T12] bus_probe_device+0x131/0x390 [ 337.814568][ T12] device_add+0x25b5/0x2df0 [ 337.819121][ T12] usb_new_device+0x23e5/0x2fb0 [ 337.824021][ T12] hub_event+0x581d/0x72f0 [ 337.828526][ T12] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 337.834514][ T12] ? led_work+0x720/0x720 [ 337.838850][ T12] ? led_work+0x720/0x720 [ 337.843194][ T12] process_one_work+0x1572/0x1ef0 [ 337.848273][ T12] worker_thread+0x111b/0x2460 [ 337.853091][ T12] kthread+0x4b5/0x4f0 [ 337.857169][ T12] ? process_one_work+0x1ef0/0x1ef0 [ 337.862388][ T12] ? kthread_blkcg+0xf0/0xf0 [ 337.866992][ T12] ret_from_fork+0x35/0x40 [ 337.872432][ T12] Kernel Offset: disabled [ 337.877374][ T12] Rebooting in 86400 seconds..