[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.56' (ECDSA) to the list of known hosts. syzkaller login: [ 142.391163][ T8222] IPVS: ftp: loaded support on port[0] = 21 [ 142.556896][ T8222] chnl_net:caif_netlink_parms(): no params data found [ 142.645977][ T8222] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.653440][ T8222] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.662917][ T8222] device bridge_slave_0 entered promiscuous mode [ 142.673543][ T8222] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.681753][ T8222] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.691068][ T8222] device bridge_slave_1 entered promiscuous mode [ 142.725951][ T8222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 142.739519][ T8222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.773978][ T8222] team0: Port device team_slave_0 added [ 142.783268][ T8222] team0: Port device team_slave_1 added [ 142.812587][ T8222] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 142.819722][ T8222] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.846830][ T8222] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 142.860396][ T8222] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 142.867636][ T8222] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.894345][ T8222] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 142.935849][ T8222] device hsr_slave_0 entered promiscuous mode [ 142.943512][ T8222] device hsr_slave_1 entered promiscuous mode [ 143.120722][ T8222] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 143.132623][ T8222] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 143.149250][ T8222] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 143.166663][ T8222] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 143.256642][ T8222] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.264117][ T8222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.271712][ T8222] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.279531][ T8222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.358389][ T8222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.380318][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.391809][ T56] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.402517][ T56] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.414781][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 143.432576][ T8222] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.450503][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.459939][ T4672] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.467890][ T4672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.484686][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.494329][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.502070][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.534562][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.546529][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.556369][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.566941][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.579233][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.594173][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.604841][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.626264][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.638340][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.656482][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.666568][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.681443][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.712779][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 143.721071][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 143.742574][ T8222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 143.777983][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 143.787449][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.819707][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.830488][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.844548][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.853203][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.867696][ T8222] device veth0_vlan entered promiscuous mode [ 143.887912][ T8222] device veth1_vlan entered promiscuous mode [ 143.928937][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 143.938645][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 143.948230][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.958113][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.973300][ T8222] device veth0_macvtap entered promiscuous mode [ 143.988970][ T8222] device veth1_macvtap entered promiscuous mode [ 144.019333][ T8222] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 144.027188][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 144.036651][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.046171][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.056384][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.075984][ T8222] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.084133][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.094229][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.111586][ T8222] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.121056][ T8222] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.130458][ T8222] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.139749][ T8222] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 144.329137][ C1] ===================================================== [ 144.336143][ C1] BUG: KMSAN: uninit-value in ip_rcv_core+0xf4c/0x1480 [ 144.343042][ C1] CPU: 1 PID: 8433 Comm: syz-executor599 Not tainted 5.12.0-rc6-syzkaller #0 [ 144.351849][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.362494][ C1] Call Trace: [ 144.366122][ C1] [ 144.369084][ C1] dump_stack+0x24c/0x2e0 [ 144.373519][ C1] kmsan_report+0xfb/0x1e0 [ 144.377986][ C1] __msan_warning+0x5c/0xa0 [ 144.382836][ C1] ip_rcv_core+0xf4c/0x1480 [ 144.387386][ C1] ip_rcv+0xc7/0x820 [ 144.391300][ C1] ? kmsan_get_metadata+0x116/0x180 [ 144.396563][ C1] __netif_receive_skb+0x1ec/0x640 [ 144.401708][ C1] ? kmsan_set_origin_checked+0xa2/0x100 [ 144.407368][ C1] ? ip_local_deliver_finish+0x370/0x370 [ 144.413148][ C1] process_backlog+0x517/0xbd0 [ 144.418000][ C1] ? rps_trigger_softirq+0x4d0/0x4d0 [ 144.423475][ C1] __napi_poll+0x13e/0xca0 [ 144.428001][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 144.434094][ C1] net_rx_action+0x726/0x14a0 [ 144.438971][ C1] ? net_tx_action+0xd30/0xd30 [ 144.443792][ C1] __do_softirq+0x1b9/0x715 [ 144.448378][ C1] ? idle_cpu+0x9a/0x1d0 [ 144.453003][ C1] ? __irq_exit_rcu+0x83/0x280 [ 144.457896][ C1] do_softirq+0x123/0x1c0 [ 144.462258][ C1] [ 144.465308][ C1] __local_bh_enable_ip+0xa1/0xb0 [ 144.470340][ C1] local_bh_enable+0x36/0x40 [ 144.474955][ C1] __dev_queue_xmit+0x3b4a/0x4600 [ 144.479987][ C1] dev_queue_xmit+0x4b/0x60 [ 144.484499][ C1] ? netdev_core_pick_tx+0x5a0/0x5a0 [ 144.489946][ C1] packet_sendmsg+0x86ee/0x99d0 [ 144.494899][ C1] ? kmsan_get_metadata+0x116/0x180 [ 144.500140][ C1] ? kmsan_internal_set_origin+0x82/0xc0 [ 144.506032][ C1] ? process_slab+0x13a8/0x1b70 [ 144.510997][ C1] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 144.516816][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 144.523204][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 144.528089][ C1] ? packet_getsockopt+0x1120/0x1120 [ 144.533407][ C1] __sys_sendmmsg+0xa57/0x1010 [ 144.538522][ C1] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 144.544961][ C1] ? kmsan_get_metadata+0x116/0x180 [ 144.550195][ C1] ? kmsan_get_metadata+0x116/0x180 [ 144.555530][ C1] ? kmsan_set_origin_checked+0xa2/0x100 [ 144.561243][ C1] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 144.567499][ C1] ? __msan_instrument_asm_store+0x104/0x130 [ 144.573628][ C1] ? kmsan_get_metadata+0x116/0x180 [ 144.578956][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 144.583781][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 144.588741][ C1] do_syscall_64+0x9f/0x140 [ 144.593266][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.599277][ C1] RIP: 0033:0x443e09 [ 144.603276][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 144.623135][ C1] RSP: 002b:00007ffef0eb40b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 144.631919][ C1] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443e09 [ 144.639944][ C1] RDX: 0000000000000001 RSI: 0000000020002780 RDI: 0000000000000003 [ 144.648024][ C1] RBP: 0000000000000000 R08: 0000000000f0b5ff R09: 0000000000f0b5ff [ 144.656020][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef0eb40f0 [ 144.664117][ C1] R13: 00007ffef0eb40e0 R14: 00007ffef0eb40d0 R15: 0000000000000003 [ 144.672123][ C1] [ 144.674472][ C1] Uninit was stored to memory at: [ 144.679495][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 144.685402][ C1] __msan_chain_origin+0x54/0xa0 [ 144.690446][ C1] iptunnel_xmit+0xbd6/0xf20 [ 144.695069][ C1] udp_tunnel_xmit_skb+0x526/0x640 [ 144.700216][ C1] geneve_xmit+0x2139/0x3c40 [ 144.704878][ C1] xmit_one+0x2b6/0x760 [ 144.709085][ C1] __dev_queue_xmit+0x3432/0x4600 [ 144.714146][ C1] dev_queue_xmit+0x4b/0x60 [ 144.718924][ C1] packet_sendmsg+0x86ee/0x99d0 [ 144.723826][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 144.728920][ C1] __sys_sendmmsg+0xa57/0x1010 [ 144.733817][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 144.738631][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 144.743486][ C1] do_syscall_64+0x9f/0x140 [ 144.747994][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.753941][ C1] [ 144.756364][ C1] Uninit was created at: [ 144.760610][ C1] kmsan_internal_poison_shadow+0x66/0xd0 [ 144.766548][ C1] kmsan_slab_alloc+0x8e/0xe0 [ 144.771555][ C1] __kmalloc_node_track_caller+0xa4f/0x1470 [ 144.777462][ C1] __alloc_skb+0x4dd/0xe90 [ 144.781941][ C1] alloc_skb_with_frags+0x1f3/0xc10 [ 144.787173][ C1] sock_alloc_send_pskb+0xdc1/0xf90 [ 144.792386][ C1] packet_sendmsg+0x6a12/0x99d0 [ 144.797356][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 144.802215][ C1] __sys_sendmmsg+0xa57/0x1010 [ 144.806989][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 144.811994][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 144.816883][ C1] do_syscall_64+0x9f/0x140 [ 144.821490][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.827437][ C1] ===================================================== [ 144.834419][ C1] Disabling lock debugging due to kernel taint [ 144.840677][ C1] Kernel panic - not syncing: panic_on_kmsan set ... [ 144.847474][ C1] CPU: 1 PID: 8433 Comm: syz-executor599 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 144.857877][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.868079][ C1] Call Trace: [ 144.871382][ C1] [ 144.874232][ C1] dump_stack+0x24c/0x2e0 [ 144.878620][ C1] panic+0x4c6/0xea7 [ 144.882526][ C1] ? add_taint+0x17c/0x210 [ 144.886965][ C1] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 144.893171][ C1] kmsan_report+0x1de/0x1e0 [ 144.897768][ C1] __msan_warning+0x5c/0xa0 [ 144.902296][ C1] ip_rcv_core+0xf4c/0x1480 [ 144.906903][ C1] ip_rcv+0xc7/0x820 [ 144.910969][ C1] ? kmsan_get_metadata+0x116/0x180 [ 144.916191][ C1] __netif_receive_skb+0x1ec/0x640 [ 144.921464][ C1] ? kmsan_set_origin_checked+0xa2/0x100 [ 144.927130][ C1] ? ip_local_deliver_finish+0x370/0x370 [ 144.932801][ C1] process_backlog+0x517/0xbd0 [ 144.937582][ C1] ? rps_trigger_softirq+0x4d0/0x4d0 [ 144.942884][ C1] __napi_poll+0x13e/0xca0 [ 144.947432][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 144.953507][ C1] net_rx_action+0x726/0x14a0 [ 144.958381][ C1] ? net_tx_action+0xd30/0xd30 [ 144.963422][ C1] __do_softirq+0x1b9/0x715 [ 144.967979][ C1] ? idle_cpu+0x9a/0x1d0 [ 144.972250][ C1] ? __irq_exit_rcu+0x83/0x280 [ 144.977147][ C1] do_softirq+0x123/0x1c0 [ 144.981515][ C1] [ 144.984442][ C1] __local_bh_enable_ip+0xa1/0xb0 [ 144.989530][ C1] local_bh_enable+0x36/0x40 [ 144.994192][ C1] __dev_queue_xmit+0x3b4a/0x4600 [ 144.999261][ C1] dev_queue_xmit+0x4b/0x60 [ 145.003766][ C1] ? netdev_core_pick_tx+0x5a0/0x5a0 [ 145.009209][ C1] packet_sendmsg+0x86ee/0x99d0 [ 145.014285][ C1] ? kmsan_get_metadata+0x116/0x180 [ 145.019518][ C1] ? kmsan_internal_set_origin+0x82/0xc0 [ 145.025210][ C1] ? process_slab+0x13a8/0x1b70 [ 145.030073][ C1] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 145.035954][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 145.042271][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 145.047234][ C1] ? packet_getsockopt+0x1120/0x1120 [ 145.052566][ C1] __sys_sendmmsg+0xa57/0x1010 [ 145.057395][ C1] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 145.063663][ C1] ? kmsan_get_metadata+0x116/0x180 [ 145.068896][ C1] ? kmsan_get_metadata+0x116/0x180 [ 145.074126][ C1] ? kmsan_set_origin_checked+0xa2/0x100 [ 145.079788][ C1] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 145.086176][ C1] ? __msan_instrument_asm_store+0x104/0x130 [ 145.092167][ C1] ? kmsan_get_metadata+0x116/0x180 [ 145.097400][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 145.102308][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 145.107368][ C1] do_syscall_64+0x9f/0x140 [ 145.111878][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.117854][ C1] RIP: 0033:0x443e09 [ 145.121836][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 145.141532][ C1] RSP: 002b:00007ffef0eb40b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 145.150459][ C1] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443e09 [ 145.158586][ C1] RDX: 0000000000000001 RSI: 0000000020002780 RDI: 0000000000000003 [ 145.166564][ C1] RBP: 0000000000000000 R08: 0000000000f0b5ff R09: 0000000000f0b5ff [ 145.174717][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef0eb40f0 [ 145.182828][ C1] R13: 00007ffef0eb40e0 R14: 00007ffef0eb40d0 R15: 0000000000000003 [ 145.192405][ C1] Kernel Offset: disabled [ 145.196876][ C1] Rebooting in 86400 seconds..