[ 50.709005] audit: type=1800 audit(1545313629.739:26): pid=6280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.281199] kauditd_printk_skb: 2 callbacks suppressed [ 52.281229] audit: type=1800 audit(1545313631.329:29): pid=6280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 52.306004] audit: type=1800 audit(1545313631.349:30): pid=6280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2018/12/20 13:47:25 fuzzer started 2018/12/20 13:47:29 dialing manager at 10.128.0.26:46613 2018/12/20 13:47:29 syscalls: 1 2018/12/20 13:47:29 code coverage: enabled 2018/12/20 13:47:29 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 13:47:29 setuid sandbox: enabled 2018/12/20 13:47:29 namespace sandbox: enabled 2018/12/20 13:47:29 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 13:47:29 fault injection: enabled 2018/12/20 13:47:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 13:47:29 net packet injection: enabled 2018/12/20 13:47:29 net device setup: enabled 13:47:35 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00000004c0)="04", 0x1) syzkaller login: [ 76.858093] IPVS: ftp: loaded support on port[0] = 21 [ 78.284365] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.290919] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.299299] device bridge_slave_0 entered promiscuous mode [ 78.379737] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.386394] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.394641] device bridge_slave_1 entered promiscuous mode [ 78.472797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 78.551344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 78.797056] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 78.880727] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 78.962235] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 78.969219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 79.053036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 79.059984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 79.309399] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 79.318534] team0: Port device team_slave_0 added [ 79.398944] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 79.407732] team0: Port device team_slave_1 added [ 79.489968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.576146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.657904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.665554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.674905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.757803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.765520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.774828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:47:39 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000001061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 80.666584] IPVS: ftp: loaded support on port[0] = 21 [ 80.828871] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.835474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.842759] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.849310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.858697] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 80.921713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.081041] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.087609] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.095758] device bridge_slave_0 entered promiscuous mode [ 83.219486] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.226061] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.234294] device bridge_slave_1 entered promiscuous mode [ 83.382231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.549576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 83.993188] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.169795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 84.903540] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 84.912133] team0: Port device team_slave_0 added [ 85.089554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 85.098155] team0: Port device team_slave_1 added [ 85.222798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 13:47:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) [ 85.351413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.491329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 85.498903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.508082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.716586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 85.724237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.733447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.748459] IPVS: ftp: loaded support on port[0] = 21 [ 86.364435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.982754] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.504563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.510853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.518934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.726739] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.733475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.740747] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.747378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.756966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 88.126956] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.581718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.700259] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.706897] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.715316] device bridge_slave_0 entered promiscuous mode [ 88.840989] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.847619] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.855872] device bridge_slave_1 entered promiscuous mode [ 89.018271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 89.157667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 89.503835] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.671428] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.892504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 89.899497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.109362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 90.116591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.682039] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 90.690535] team0: Port device team_slave_0 added [ 90.852256] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 90.860751] team0: Port device team_slave_1 added [ 91.087390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 91.094507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.103585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.309080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 91.316237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.325201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.481291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 91.489108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.498218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.680933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 91.688783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.697890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:47:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00000004c0)="04", 0x1) 13:47:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00000004c0)="04", 0x1) 13:47:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00000004c0)="04", 0x1) 13:47:51 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:47:51 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:47:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:47:52 executing program 3: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:47:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) [ 93.575499] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.582112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.589311] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.595938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.604949] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 93.611477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 13:47:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) [ 94.025586] IPVS: ftp: loaded support on port[0] = 21 13:47:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) [ 94.830956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.408000] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 95.934079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 95.940362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.948685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.626032] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.993320] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.999851] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.008202] device bridge_slave_0 entered promiscuous mode [ 97.117095] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.123744] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.132001] device bridge_slave_1 entered promiscuous mode [ 97.279352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 97.429777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 97.868998] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 98.022567] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 98.162824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 98.169816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 98.268462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 98.275594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 98.733604] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 98.742328] team0: Port device team_slave_0 added [ 98.870629] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 98.879081] team0: Port device team_slave_1 added [ 99.002787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.228688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 99.235974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.245165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.429255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 99.437560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.446672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.628138] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 99.635848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.645050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.571384] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 100.578833] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 13:47:59 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000001061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 100.791899] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 100.799255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 100.935205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.227878] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.234498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.241744] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.248318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.257388] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 101.263926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.517495] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.082763] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.089054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.097035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.543989] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.891805] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 13:48:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:05 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:48:05 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000001061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 13:48:05 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) [ 106.116246] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 106.123757] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 13:48:05 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000001061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 106.381491] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 106.388989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 13:48:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) [ 106.936354] IPVS: ftp: loaded support on port[0] = 21 [ 107.026305] IPVS: ftp: loaded support on port[0] = 21 [ 107.107591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.498740] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 107.906940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 107.913580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.921725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.472511] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.051448] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.058063] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.066483] device bridge_slave_0 entered promiscuous mode [ 109.099874] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.106536] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.114872] device bridge_slave_0 entered promiscuous mode [ 109.158820] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.165430] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.173773] device bridge_slave_1 entered promiscuous mode [ 109.280360] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.286917] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.295128] device bridge_slave_1 entered promiscuous mode [ 109.307162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 109.383268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 109.409040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 109.504624] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 109.836302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.868479] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.978225] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.988985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 110.095702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 110.104270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.118726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 110.125842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.253115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 110.260769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 110.276067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.284958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.603210] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.612092] team0: Port device team_slave_0 added [ 110.680255] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 110.688978] team0: Port device team_slave_0 added [ 110.703948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.712587] team0: Port device team_slave_1 added [ 110.806817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.839058] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 110.848242] team0: Port device team_slave_1 added [ 110.912334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.947222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.025223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 111.032910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.042190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.061263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 111.068501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.077579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.174161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 111.182482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.191451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.207614] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 111.215411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.224667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.323705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 111.331317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.340592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:48:10 executing program 3: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:48:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:11 executing program 3: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) [ 112.859780] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.866400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.873621] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.880210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.889013] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.895832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.061323] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.067921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.075102] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.081691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.092042] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 113.954233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.138596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 116.326218] 8021q: adding VLAN 0 to HW filter on device bond0 [ 116.443235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 116.642356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 116.744034] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 116.750359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.758230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.951641] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 116.957932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.965864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.061355] 8021q: adding VLAN 0 to HW filter on device team0 [ 117.280113] 8021q: adding VLAN 0 to HW filter on device team0 13:48:18 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:48:18 executing program 2: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:48:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x200a) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 13:48:18 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000000040), &(0x7f0000013000)=0xfffffffffffffeb8) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 13:48:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x1f6) 13:48:18 executing program 2: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 13:48:18 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0xd4) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) [ 119.518920] ================================================================== [ 119.526338] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 119.532946] CPU: 0 PID: 8088 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #8 [ 119.540062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.549436] Call Trace: [ 119.552070] dump_stack+0x173/0x1d0 [ 119.555757] kmsan_report+0x120/0x290 [ 119.559609] kmsan_internal_check_memory+0x9a7/0xa20 [ 119.564785] __msan_instrument_asm_load+0x8a/0x90 [ 119.569665] __siphash_aligned+0x512/0xae0 [ 119.573965] secure_ipv6_port_ephemeral+0x110/0x220 [ 119.579033] inet6_hash_connect+0x11f/0x1a0 [ 119.583402] tcp_v6_connect+0x20ba/0x2890 [ 119.587617] ? __msan_poison_alloca+0x1e0/0x270 [ 119.592337] ? tcp_v6_pre_connect+0x130/0x130 [ 119.596868] __inet_stream_connect+0x2f9/0x1340 [ 119.601572] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 119.606463] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 119.611191] tcp_sendmsg_locked+0x65d5/0x6be0 [ 119.615724] ? aa_label_sk_perm+0xda/0x940 [ 119.619995] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 119.625388] ? aa_label_sk_perm+0x6d6/0x940 [ 119.629746] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 119.635139] ? futex_wait+0x912/0xc40 [ 119.639029] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 119.644459] tcp_sendmsg+0xb2/0x100 [ 119.648128] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 119.652840] inet_sendmsg+0x54a/0x720 [ 119.656669] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 119.662064] ? security_socket_sendmsg+0x1bd/0x200 [ 119.667029] ? inet_getname+0x490/0x490 [ 119.671048] __sys_sendto+0x8c4/0xac0 [ 119.674921] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 119.680409] ? prepare_exit_to_usermode+0x114/0x420 [ 119.685469] ? syscall_return_slowpath+0x50/0x650 [ 119.690332] __se_sys_sendto+0x107/0x130 [ 119.694436] __x64_sys_sendto+0x6e/0x90 [ 119.698470] do_syscall_64+0xbc/0xf0 [ 119.702236] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 119.707450] RIP: 0033:0x457669 [ 119.710669] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.729592] RSP: 002b:00007f63cd4c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 119.737326] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 119.744608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 119.751893] RBP: 000000000072bf00 R08: 000000002031e000 R09: 000000000000001c [ 119.759219] R10: 0000000020000004 R11: 0000000000000246 R12: 00007f63cd4c66d4 [ 119.766495] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 119.773795] [ 119.775432] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 119.782885] Variable was created at: [ 119.786642] secure_ipv6_port_ephemeral+0x6a/0x220 [ 119.791583] inet6_hash_connect+0x11f/0x1a0 [ 119.795899] [ 119.797532] Bytes 2-7 of 8 are uninitialized [ 119.801948] Memory access of size 8 starts at ffff88819706f5f0 [ 119.807916] ================================================================== [ 119.815529] Disabling lock debugging due to kernel taint [ 119.820987] Kernel panic - not syncing: panic_on_warn set ... [ 119.826883] CPU: 0 PID: 8088 Comm: syz-executor3 Tainted: G B 4.20.0-rc7+ #8 [ 119.835374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.844728] Call Trace: [ 119.847339] dump_stack+0x173/0x1d0 [ 119.850992] panic+0x3ce/0x961 [ 119.854275] kmsan_report+0x285/0x290 [ 119.858128] kmsan_internal_check_memory+0x9a7/0xa20 [ 119.863279] __msan_instrument_asm_load+0x8a/0x90 [ 119.868158] __siphash_aligned+0x512/0xae0 [ 119.872460] secure_ipv6_port_ephemeral+0x110/0x220 [ 119.877541] inet6_hash_connect+0x11f/0x1a0 [ 119.881893] tcp_v6_connect+0x20ba/0x2890 [ 119.886081] ? __msan_poison_alloca+0x1e0/0x270 [ 119.890813] ? tcp_v6_pre_connect+0x130/0x130 [ 119.895323] __inet_stream_connect+0x2f9/0x1340 [ 119.900009] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 119.904873] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 119.909583] tcp_sendmsg_locked+0x65d5/0x6be0 [ 119.914097] ? aa_label_sk_perm+0xda/0x940 [ 119.918368] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 119.923743] ? aa_label_sk_perm+0x6d6/0x940 [ 119.928079] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 119.933466] ? futex_wait+0x912/0xc40 [ 119.937329] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 119.942849] tcp_sendmsg+0xb2/0x100 [ 119.946505] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 119.951199] inet_sendmsg+0x54a/0x720 [ 119.955017] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 119.960404] ? security_socket_sendmsg+0x1bd/0x200 [ 119.965357] ? inet_getname+0x490/0x490 [ 119.969352] __sys_sendto+0x8c4/0xac0 [ 119.973214] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 119.978677] ? prepare_exit_to_usermode+0x114/0x420 [ 119.983709] ? syscall_return_slowpath+0x50/0x650 [ 119.988572] __se_sys_sendto+0x107/0x130 [ 119.992666] __x64_sys_sendto+0x6e/0x90 [ 119.996658] do_syscall_64+0xbc/0xf0 [ 120.000385] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 120.005580] RIP: 0033:0x457669 [ 120.008825] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.027731] RSP: 002b:00007f63cd4c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 120.035469] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 120.042746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 120.050020] RBP: 000000000072bf00 R08: 000000002031e000 R09: 000000000000001c [ 120.057293] R10: 0000000020000004 R11: 0000000000000246 R12: 00007f63cd4c66d4 [ 120.064574] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 120.072842] Kernel Offset: disabled [ 120.076474] Rebooting in 86400 seconds..