[ 53.458908] audit: type=1800 audit(1542493851.486:27): pid=6509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 53.478588] audit: type=1800 audit(1542493851.506:28): pid=6509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.034500] audit: type=1800 audit(1542493853.086:29): pid=6509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 55.053872] audit: type=1800 audit(1542493853.086:30): pid=6509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2018/11/17 22:31:05 fuzzer started 2018/11/17 22:31:09 dialing manager at 10.128.0.26:38057 2018/11/17 22:31:09 syscalls: 1 2018/11/17 22:31:09 code coverage: enabled 2018/11/17 22:31:09 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/17 22:31:09 setuid sandbox: enabled 2018/11/17 22:31:09 namespace sandbox: enabled 2018/11/17 22:31:09 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/17 22:31:09 fault injection: enabled 2018/11/17 22:31:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/17 22:31:09 net packed injection: enabled 2018/11/17 22:31:09 net device setup: enabled 22:33:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x2000010070}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000300)='K'}, 0x20) syzkaller login: [ 193.187158] IPVS: ftp: loaded support on port[0] = 21 [ 194.984758] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.991297] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.999549] device bridge_slave_0 entered promiscuous mode [ 195.105967] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.112552] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.120610] device bridge_slave_1 entered promiscuous mode [ 195.222070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.324155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.645670] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.762263] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.869568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 195.878039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:33:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb34, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0xc}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000740)}, 0x20004040) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x707000) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 196.462834] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.470654] team0: Port device team_slave_0 added [ 196.520902] IPVS: ftp: loaded support on port[0] = 21 [ 196.683232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.691078] team0: Port device team_slave_1 added [ 196.908889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 196.916187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.924905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.071018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.078095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.086723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.277473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.285052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.293923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.495354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.503043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.511864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.300060] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.306668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.313682] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.320185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.328535] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.404821] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.411385] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.420209] device bridge_slave_0 entered promiscuous mode [ 199.543840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.639522] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.646247] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.654523] device bridge_slave_1 entered promiscuous mode [ 199.759677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.954072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 22:33:18 executing program 2: socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000640)) recvmsg(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000a40)=@can, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/56, 0x38}], 0x1, &(0x7f0000000d40)=""/53, 0x35, 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000e00)={0x0, 0x70, 0x401, 0x0, 0xfffffffffffffff7, 0xb889, 0x0, 0x401, 0x800, 0x4, 0x0, 0x0, 0x10000, 0x81, 0x0, 0x2, 0xffff, 0x800, 0x0, 0x637, 0x0, 0x0, 0x3f, 0xfff, 0x0, 0x201, 0x8, 0x8, 0x1, 0xc10f, 0x6, 0x3ff, 0x4, 0xfffffffffffffffa, 0xf69, 0x4, 0x7fffffff, 0x1, 0x0, 0x80000001, 0x6, @perf_bp={&(0x7f0000000dc0)}, 0x6000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x1ff}, r1, 0xb, r0, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0xd, 0x0, 0x0, 0x5, 0x1, r0, 0x9}, 0x2c) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000f00)) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28}, {0x16, 0x0, 0x4}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x20000000000000, 0x20000000000003d0, &(0x7f0000001240)=ANY=[], &(0x7f0000000f80)='GPL\x00', 0x3, 0xfffffffffffffeed, &(0x7f0000002bc0)=""/4096, 0x41100}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000b00)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r2, &(0x7f00000004c0), &(0x7f0000001080)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000200)=""/144}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r2, 0x28, &(0x7f0000000540)}, 0x10) openat$cgroup(r2, &(0x7f0000000600)='syz1\x00', 0x200002, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000f40)=0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x1b4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={r4, 0x0, 0x10}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000002b00)={&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000900)=""/194, 0xc2}, {&(0x7f00000015c0)=""/197, 0xc5}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/242, 0xf2}, {&(0x7f00000027c0)=""/215, 0xd7}], 0x6, &(0x7f0000002a00)=""/216, 0xd8, 0x3}, 0x0) socket$kcm(0x29, 0x0, 0x0) [ 200.423349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.657649] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.838814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 200.845985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.037625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.045174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.085451] IPVS: ftp: loaded support on port[0] = 21 [ 201.765818] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.773920] team0: Port device team_slave_0 added [ 202.051193] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.059266] team0: Port device team_slave_1 added [ 202.264762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.271990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.280372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.489898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.497294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.505803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.737422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.745020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.753871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.944879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.952695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.961163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.765103] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.771550] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.779658] device bridge_slave_0 entered promiscuous mode [ 204.997840] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.004415] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.012490] device bridge_slave_1 entered promiscuous mode [ 205.168329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.214944] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.221478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.228388] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.234860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.243366] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.388090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.703379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.108882] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.323548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.508854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.519150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:33:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x2000010070}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000300)}, 0x20) [ 207.351068] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.359018] team0: Port device team_slave_0 added [ 207.581008] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.588832] team0: Port device team_slave_1 added [ 207.899082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.906270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.914687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.143828] IPVS: ftp: loaded support on port[0] = 21 [ 208.223171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 208.230268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.238914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.265197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.416715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.424982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.433707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.641342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.649095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.658071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.264624] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.201069] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.207568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.215343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.234185] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.632898] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.639440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.646355] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.652833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.660993] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.221944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.527361] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.534161] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.542257] device bridge_slave_0 entered promiscuous mode [ 212.780338] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.786898] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.795127] device bridge_slave_1 entered promiscuous mode [ 213.015445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.278188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.140336] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.462312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.721172] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.728417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.966461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.973760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.495699] not chained 10000 origins [ 215.499549] CPU: 0 PID: 7274 Comm: ip Not tainted 4.20.0-rc2+ #88 [ 215.505777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.515302] Call Trace: [ 215.517894] dump_stack+0x32d/0x480 [ 215.521527] ? save_stack_trace+0xc6/0x110 [ 215.525769] kmsan_internal_chain_origin+0x222/0x240 [ 215.530881] ? kmsan_internal_chain_origin+0x136/0x240 [ 215.536160] ? __msan_chain_origin+0x6d/0xb0 [ 215.540578] ? __save_stack_trace+0x8be/0xc60 [ 215.545067] ? save_stack_trace+0xc6/0x110 [ 215.549305] ? kmsan_internal_chain_origin+0x136/0x240 [ 215.554585] ? kmsan_memcpy_origins+0x13d/0x190 [ 215.559253] ? __msan_memcpy+0x6f/0x80 [ 215.563140] ? nla_put+0x20a/0x2d0 [ 215.566694] ? br_port_fill_attrs+0x366/0x1ea0 [ 215.571290] ? br_port_fill_slave_info+0xff/0x120 [ 215.576137] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 215.580624] ? rtnl_dump_ifinfo+0x18b5/0x2140 [ 215.585116] ? netlink_dump+0xc79/0x1c90 [ 215.589175] ? netlink_recvmsg+0xec2/0x19d0 22:33:33 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) [ 215.593497] ? sock_recvmsg+0x1d1/0x230 [ 215.597467] ? ___sys_recvmsg+0x444/0xae0 [ 215.601618] ? __se_sys_recvmsg+0x2fa/0x450 [ 215.605940] ? __x64_sys_recvmsg+0x4a/0x70 [ 215.610173] ? do_syscall_64+0xcf/0x110 [ 215.614156] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 215.619522] ? do_syscall_64+0xcf/0x110 [ 215.623498] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 215.628961] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 215.634331] ? __module_address+0x6a/0x5f0 [ 215.638598] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 215.643974] ? is_bpf_text_address+0x49e/0x4d0 [ 215.648567] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 215.654022] ? in_task_stack+0x12c/0x210 [ 215.658097] __msan_chain_origin+0x6d/0xb0 [ 215.662338] ? __msan_memcpy+0x6f/0x80 [ 215.666245] __save_stack_trace+0x8be/0xc60 [ 215.670570] ? __save_stack_trace+0x9f2/0xc60 [ 215.675081] ? __msan_memcpy+0x6f/0x80 [ 215.678981] save_stack_trace+0xc6/0x110 [ 215.683064] kmsan_internal_chain_origin+0x136/0x240 [ 215.688276] ? kmsan_internal_chain_origin+0x136/0x240 [ 215.693558] ? kmsan_memcpy_origins+0x13d/0x190 [ 215.698231] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 215.703608] ? __msan_poison_alloca+0x1e0/0x270 [ 215.708287] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 215.713659] ? find_next_bit+0x25b/0x2a0 [ 215.717725] ? vmalloc_to_page+0x585/0x6c0 [ 215.721964] ? kmsan_set_origin+0x7f/0x100 [ 215.726205] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 215.731583] kmsan_memcpy_origins+0x13d/0x190 [ 215.736106] __msan_memcpy+0x6f/0x80 [ 215.739822] nla_put+0x20a/0x2d0 [ 215.743194] br_port_fill_attrs+0x366/0x1ea0 [ 215.747614] br_port_fill_slave_info+0xff/0x120 [ 215.752288] ? br_port_get_slave_size+0x30/0x30 [ 215.756966] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 215.761318] rtnl_dump_ifinfo+0x18b5/0x2140 [ 215.765704] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 215.771068] ? rtnl_getlink+0xec0/0xec0 [ 215.775061] netlink_dump+0xc79/0x1c90 [ 215.778987] netlink_recvmsg+0xec2/0x19d0 [ 215.783158] sock_recvmsg+0x1d1/0x230 [ 215.786959] ? netlink_sendmsg+0x1440/0x1440 [ 215.791503] ___sys_recvmsg+0x444/0xae0 [ 215.795497] ? __msan_poison_alloca+0x1e0/0x270 [ 215.800291] ? __se_sys_recvmsg+0xca/0x450 [ 215.804580] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 215.810026] ? __fdget+0x23c/0x440 [ 215.813593] __se_sys_recvmsg+0x2fa/0x450 [ 215.817763] __x64_sys_recvmsg+0x4a/0x70 [ 215.821837] do_syscall_64+0xcf/0x110 [ 215.825761] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 215.830951] RIP: 0033:0x7f50e40cb210 [ 215.834665] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 215.853591] RSP: 002b:00007ffe77043d58 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 215.861436] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f50e40cb210 [ 215.868796] RDX: 0000000000000000 RSI: 00007ffe77043da0 RDI: 0000000000000003 [ 215.876104] RBP: 0000000000000ac0 R08: 00007f50e4374ec8 R09: 00007f50e4111800 [ 215.883407] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006395c0 [ 215.890678] R13: 00007ffe77047e30 R14: 0000000000000ac0 R15: 00007ffe770448a0 [ 215.897959] Uninit was stored to memory at: [ 215.902289] kmsan_internal_chain_origin+0x136/0x240 [ 215.907397] __msan_chain_origin+0x6d/0xb0 [ 215.911633] __save_stack_trace+0x8be/0xc60 [ 215.915959] save_stack_trace+0xc6/0x110 [ 215.920145] kmsan_internal_chain_origin+0x136/0x240 [ 215.925283] kmsan_memcpy_origins+0x13d/0x190 [ 215.929784] __msan_memcpy+0x6f/0x80 [ 215.933505] nla_put+0x20a/0x2d0 [ 215.936873] br_port_fill_attrs+0x366/0x1ea0 [ 215.941280] br_port_fill_slave_info+0xff/0x120 [ 215.945954] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 215.950269] rtnl_dump_ifinfo+0x18b5/0x2140 [ 215.954597] netlink_dump+0xc79/0x1c90 [ 215.958484] netlink_recvmsg+0xec2/0x19d0 [ 215.962630] sock_recvmsg+0x1d1/0x230 [ 215.966425] ___sys_recvmsg+0x444/0xae0 [ 215.970391] __se_sys_recvmsg+0x2fa/0x450 [ 215.974535] __x64_sys_recvmsg+0x4a/0x70 [ 215.978623] do_syscall_64+0xcf/0x110 [ 215.982428] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 215.987626] [ 215.989249] Uninit was stored to memory at: [ 215.993686] kmsan_internal_chain_origin+0x136/0x240 [ 215.998923] __msan_chain_origin+0x6d/0xb0 [ 216.003248] __save_stack_trace+0x8be/0xc60 [ 216.007571] save_stack_trace+0xc6/0x110 [ 216.011651] kmsan_internal_chain_origin+0x136/0x240 [ 216.016760] kmsan_memcpy_origins+0x13d/0x190 [ 216.021267] __msan_memcpy+0x6f/0x80 [ 216.024987] nla_put+0x20a/0x2d0 [ 216.028352] br_port_fill_attrs+0x366/0x1ea0 [ 216.032775] br_port_fill_slave_info+0xff/0x120 [ 216.037469] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 216.041898] rtnl_dump_ifinfo+0x18b5/0x2140 [ 216.046219] netlink_dump+0xc79/0x1c90 [ 216.050106] netlink_recvmsg+0xec2/0x19d0 [ 216.054269] sock_recvmsg+0x1d1/0x230 [ 216.058162] ___sys_recvmsg+0x444/0xae0 [ 216.062138] __se_sys_recvmsg+0x2fa/0x450 [ 216.066293] __x64_sys_recvmsg+0x4a/0x70 [ 216.070493] do_syscall_64+0xcf/0x110 [ 216.074309] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 216.079492] [ 216.081110] Uninit was stored to memory at: [ 216.085435] kmsan_internal_chain_origin+0x136/0x240 [ 216.090548] __msan_chain_origin+0x6d/0xb0 [ 216.094788] __save_stack_trace+0x8be/0xc60 [ 216.099156] save_stack_trace+0xc6/0x110 [ 216.103225] kmsan_internal_chain_origin+0x136/0x240 [ 216.108335] kmsan_memcpy_origins+0x13d/0x190 [ 216.112833] __msan_memcpy+0x6f/0x80 [ 216.116635] nla_put+0x20a/0x2d0 [ 216.120017] br_port_fill_attrs+0x366/0x1ea0 [ 216.124430] br_port_fill_slave_info+0xff/0x120 [ 216.129099] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 216.133419] rtnl_dump_ifinfo+0x18b5/0x2140 [ 216.137740] netlink_dump+0xc79/0x1c90 [ 216.141710] netlink_recvmsg+0xec2/0x19d0 [ 216.145876] sock_recvmsg+0x1d1/0x230 [ 216.149678] ___sys_recvmsg+0x444/0xae0 [ 216.153655] __se_sys_recvmsg+0x2fa/0x450 [ 216.157799] __x64_sys_recvmsg+0x4a/0x70 [ 216.161858] do_syscall_64+0xcf/0x110 [ 216.165662] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 216.170845] [ 216.172468] Uninit was stored to memory at: [ 216.176813] kmsan_internal_chain_origin+0x136/0x240 [ 216.181917] __msan_chain_origin+0x6d/0xb0 [ 216.186152] __save_stack_trace+0x8be/0xc60 [ 216.190488] save_stack_trace+0xc6/0x110 [ 216.194549] kmsan_internal_chain_origin+0x136/0x240 [ 216.199653] kmsan_memcpy_origins+0x13d/0x190 [ 216.204148] __msan_memcpy+0x6f/0x80 [ 216.207885] nla_put+0x20a/0x2d0 [ 216.211260] br_port_fill_attrs+0x366/0x1ea0 [ 216.215674] br_port_fill_slave_info+0xff/0x120 [ 216.220348] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 216.224669] rtnl_dump_ifinfo+0x18b5/0x2140 [ 216.228991] netlink_dump+0xc79/0x1c90 [ 216.232879] netlink_recvmsg+0xec2/0x19d0 [ 216.237037] sock_recvmsg+0x1d1/0x230 [ 216.240832] ___sys_recvmsg+0x444/0xae0 [ 216.244808] __se_sys_recvmsg+0x2fa/0x450 [ 216.248956] __x64_sys_recvmsg+0x4a/0x70 [ 216.253223] do_syscall_64+0xcf/0x110 [ 216.257027] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 216.262206] [ 216.263822] Uninit was stored to memory at: [ 216.268149] kmsan_internal_chain_origin+0x136/0x240 [ 216.273269] __msan_chain_origin+0x6d/0xb0 [ 216.277518] __save_stack_trace+0x8be/0xc60 [ 216.281842] save_stack_trace+0xc6/0x110 [ 216.285920] kmsan_internal_chain_origin+0x136/0x240 [ 216.291033] kmsan_memcpy_origins+0x13d/0x190 [ 216.295533] __msan_memcpy+0x6f/0x80 [ 216.299252] nla_put+0x20a/0x2d0 [ 216.302618] br_port_fill_attrs+0x366/0x1ea0 [ 216.307030] br_port_fill_slave_info+0xff/0x120 [ 216.311717] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 216.316046] rtnl_dump_ifinfo+0x18b5/0x2140 [ 216.320360] netlink_dump+0xc79/0x1c90 [ 216.324244] netlink_recvmsg+0xec2/0x19d0 [ 216.328395] sock_recvmsg+0x1d1/0x230 [ 216.332214] ___sys_recvmsg+0x444/0xae0 [ 216.336192] __se_sys_recvmsg+0x2fa/0x450 [ 216.340343] __x64_sys_recvmsg+0x4a/0x70 [ 216.344425] do_syscall_64+0xcf/0x110 [ 216.348231] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 216.353415] [ 216.355046] Uninit was stored to memory at: [ 216.359367] kmsan_internal_chain_origin+0x136/0x240 [ 216.364469] __msan_chain_origin+0x6d/0xb0 [ 216.368821] __save_stack_trace+0x8be/0xc60 [ 216.373143] save_stack_trace+0xc6/0x110 [ 216.377204] kmsan_internal_chain_origin+0x136/0x240 [ 216.382314] kmsan_memcpy_origins+0x13d/0x190 [ 216.386810] __msan_memcpy+0x6f/0x80 [ 216.390523] nla_put+0x20a/0x2d0 [ 216.393922] br_port_fill_attrs+0x366/0x1ea0 [ 216.398334] br_port_fill_slave_info+0xff/0x120 [ 216.403002] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 216.407429] rtnl_dump_ifinfo+0x18b5/0x2140 [ 216.411759] netlink_dump+0xc79/0x1c90 [ 216.415644] netlink_recvmsg+0xec2/0x19d0 [ 216.420017] sock_recvmsg+0x1d1/0x230 [ 216.423819] ___sys_recvmsg+0x444/0xae0 [ 216.427788] __se_sys_recvmsg+0x2fa/0x450 [ 216.431927] __x64_sys_recvmsg+0x4a/0x70 [ 216.435984] do_syscall_64+0xcf/0x110 [ 216.439783] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 216.445076] [ 216.446694] Uninit was stored to memory at: [ 216.451016] kmsan_internal_chain_origin+0x136/0x240 [ 216.456218] __msan_chain_origin+0x6d/0xb0 [ 216.460559] __save_stack_trace+0x8be/0xc60 [ 216.464896] save_stack_trace+0xc6/0x110 [ 216.468959] kmsan_internal_chain_origin+0x136/0x240 [ 216.474058] kmsan_memcpy_origins+0x13d/0x190 [ 216.478555] __msan_memcpy+0x6f/0x80 [ 216.482276] nla_put+0x20a/0x2d0 [ 216.485646] br_port_fill_attrs+0x366/0x1ea0 [ 216.490053] br_port_fill_slave_info+0xff/0x120 [ 216.494724] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 216.499051] rtnl_dump_ifinfo+0x18b5/0x2140 [ 216.503371] netlink_dump+0xc79/0x1c90 [ 216.507264] netlink_recvmsg+0xec2/0x19d0 [ 216.511434] sock_recvmsg+0x1d1/0x230 [ 216.515234] ___sys_recvmsg+0x444/0xae0 [ 216.519209] __se_sys_recvmsg+0x2fa/0x450 [ 216.523371] __x64_sys_recvmsg+0x4a/0x70 [ 216.527433] do_syscall_64+0xcf/0x110 [ 216.531235] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 216.536420] [ 216.538053] Local variable description: ----v.addr.i.i108@update_curr [ 216.544632] Variable was created at: [ 216.548348] update_curr+0x62/0x2100 [ 216.552054] pick_next_task_fair+0x29c/0x3060 [ 216.578500] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.586273] team0: Port device team_slave_0 added [ 216.865546] IPVS: ftp: loaded support on port[0] = 21 [ 216.907900] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.915871] team0: Port device team_slave_1 added [ 217.254050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.261170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.269756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.524200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.592243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.599254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.607683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.947527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.955193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.963834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.196475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.204213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.212985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.804539] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 22:33:37 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc00600", 0xc201}) [ 219.644277] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.713687] 8021q: adding VLAN 0 to HW filter on device team0 22:33:38 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc00600", 0xc201}) [ 220.076758] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.083355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.090894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.205585] 8021q: adding VLAN 0 to HW filter on device team0 22:33:38 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc00600", 0xc201}) [ 220.643043] 8021q: adding VLAN 0 to HW filter on device team0 22:33:39 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc00600", 0xc201}) [ 221.100328] 8021q: adding VLAN 0 to HW filter on device team0 22:33:39 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc00600", 0xc201}) [ 221.484505] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.522274] 8021q: adding VLAN 0 to HW filter on device team0 22:33:39 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) [ 221.778905] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.785443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.792339] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.798793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.807079] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) [ 222.103109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.314760] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.321260] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.329541] device bridge_slave_0 entered promiscuous mode 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) [ 222.712250] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.718722] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.727266] device bridge_slave_1 entered promiscuous mode [ 223.133205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.361466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.224451] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.573025] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.763785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.821957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.829124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.010407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.017914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.573938] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.581760] team0: Port device team_slave_0 added [ 225.778449] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.865834] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.874014] team0: Port device team_slave_1 added [ 226.058925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.228426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.235923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.244457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.463232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.470789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.479607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.494831] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.533778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.541284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.716146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.723908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.732699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.329352] 8021q: adding VLAN 0 to HW filter on device team0 22:33:45 executing program 1: [ 228.901236] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.907773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.914684] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.921133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.929567] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.936161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.763473] 8021q: adding VLAN 0 to HW filter on device bond0 22:33:49 executing program 2: clone(0x20040200, &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000980), &(0x7f00000006c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, &(0x7f0000000240), 0x1) read$FUSE(r1, &(0x7f0000000480), 0x1000) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) [ 231.489392] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.060485] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.067019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.074732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.472834] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.274217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.682193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 22:33:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0x2212636441975174, 0x0) sendto$inet(r1, &(0x7f00000001c0), 0x3a36a8, 0x0, 0x0, 0x300) [ 235.069308] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.075864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.083442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.546505] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.242556] ================================================================== [ 238.250098] BUG: KMSAN: uninit-value in sit_tunnel_xmit+0x1b7e/0x3d40 [ 238.256670] CPU: 0 PID: 8008 Comm: syz-executor4 Not tainted 4.20.0-rc2+ #88 [ 238.263832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.273271] Call Trace: [ 238.275851] dump_stack+0x32d/0x480 [ 238.279470] ? sit_tunnel_xmit+0x1b7e/0x3d40 [ 238.283867] kmsan_report+0x19f/0x300 [ 238.287672] __msan_warning+0x76/0xc0 [ 238.291470] sit_tunnel_xmit+0x1b7e/0x3d40 [ 238.295703] ? __dev_queue_xmit+0x2d9e/0x3e00 [ 238.300186] ? ipip6_tunnel_uninit+0x800/0x800 [ 238.304895] dev_hard_start_xmit+0x6dc/0xde0 [ 238.309294] __dev_queue_xmit+0x2d9e/0x3e00 [ 238.313622] dev_queue_xmit+0x4b/0x60 [ 238.317427] ? __netdev_pick_tx+0x14d0/0x14d0 [ 238.321921] packet_sendmsg+0x797f/0x9180 [ 238.326078] ? futex_wait+0x92b/0xc50 [ 238.329878] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 238.335232] ? drop_futex_key_refs+0x232/0x330 [ 238.339804] ? do_futex+0x5756/0x5e80 [ 238.343591] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.348946] ? aa_sk_perm+0x7ab/0x9e0 [ 238.352783] ? compat_packet_setsockopt+0x360/0x360 [ 238.357820] sock_write_iter+0x3f4/0x4f0 [ 238.361885] ? sock_read_iter+0x4e0/0x4e0 [ 238.366042] __vfs_write+0x888/0xb80 [ 238.369782] vfs_write+0x4a3/0x8f0 [ 238.373317] __se_sys_write+0x17a/0x370 [ 238.377325] __x64_sys_write+0x4a/0x70 [ 238.381203] do_syscall_64+0xcf/0x110 [ 238.385007] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.390200] RIP: 0033:0x457569 [ 238.393389] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.412271] RSP: 002b:00007f41fd464c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 238.420181] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 238.427454] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 238.434717] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 238.441968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f41fd4656d4 [ 238.449218] R13: 00000000004c5893 R14: 00000000004d95a0 R15: 00000000ffffffff [ 238.456476] [ 238.458084] Uninit was created at: [ 238.461624] kmsan_internal_poison_shadow+0xc8/0x1c0 [ 238.466729] kmsan_kmalloc+0x98/0xf0 [ 238.470443] kmsan_slab_alloc+0xe/0x10 [ 238.474323] __kmalloc_node_track_caller+0xf62/0x14e0 [ 238.479501] __alloc_skb+0x42b/0xeb0 [ 238.483198] alloc_skb_with_frags+0x1c9/0xa80 [ 238.487671] sock_alloc_send_pskb+0xeb3/0x14c0 [ 238.492239] packet_sendmsg+0x6719/0x9180 [ 238.496367] sock_write_iter+0x3f4/0x4f0 [ 238.500419] __vfs_write+0x888/0xb80 [ 238.504123] vfs_write+0x4a3/0x8f0 [ 238.507642] __se_sys_write+0x17a/0x370 [ 238.511608] __x64_sys_write+0x4a/0x70 [ 238.515486] do_syscall_64+0xcf/0x110 [ 238.519268] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.524433] ================================================================== [ 238.531772] Disabling lock debugging due to kernel taint [ 238.537205] Kernel panic - not syncing: panic_on_warn set ... [ 238.543095] CPU: 0 PID: 8008 Comm: syz-executor4 Tainted: G B 4.20.0-rc2+ #88 [ 238.551663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.561013] Call Trace: [ 238.563590] dump_stack+0x32d/0x480 [ 238.567206] panic+0x624/0xc08 [ 238.570396] kmsan_report+0x300/0x300 [ 238.574198] __msan_warning+0x76/0xc0 [ 238.577993] sit_tunnel_xmit+0x1b7e/0x3d40 [ 238.582216] ? __dev_queue_xmit+0x2d9e/0x3e00 [ 238.586693] ? ipip6_tunnel_uninit+0x800/0x800 [ 238.591253] dev_hard_start_xmit+0x6dc/0xde0 [ 238.595669] __dev_queue_xmit+0x2d9e/0x3e00 [ 238.599992] dev_queue_xmit+0x4b/0x60 [ 238.603772] ? __netdev_pick_tx+0x14d0/0x14d0 [ 238.608246] packet_sendmsg+0x797f/0x9180 [ 238.612392] ? futex_wait+0x92b/0xc50 [ 238.616187] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 238.621530] ? drop_futex_key_refs+0x232/0x330 [ 238.626099] ? do_futex+0x5756/0x5e80 [ 238.629883] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.635230] ? aa_sk_perm+0x7ab/0x9e0 [ 238.639035] ? compat_packet_setsockopt+0x360/0x360 [ 238.644037] sock_write_iter+0x3f4/0x4f0 [ 238.648094] ? sock_read_iter+0x4e0/0x4e0 [ 238.652249] __vfs_write+0x888/0xb80 [ 238.655973] vfs_write+0x4a3/0x8f0 [ 238.659517] __se_sys_write+0x17a/0x370 [ 238.663491] __x64_sys_write+0x4a/0x70 [ 238.667376] do_syscall_64+0xcf/0x110 [ 238.671162] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.676341] RIP: 0033:0x457569 [ 238.679518] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.698507] RSP: 002b:00007f41fd464c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 238.706212] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 238.713463] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 238.720712] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 238.727960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f41fd4656d4 [ 238.735212] R13: 00000000004c5893 R14: 00000000004d95a0 R15: 00000000ffffffff [ 238.743709] Kernel Offset: disabled [ 238.747342] Rebooting in 86400 seconds..