[....] Starting OpenBSD Secure Shell server: sshd[ 52.759991] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 53.098186] audit: type=1800 audit(1539252233.153:29): pid=5918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 53.118176] audit: type=1800 audit(1539252233.153:30): pid=5918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 53.863823] random: sshd: uninitialized urandom read (32 bytes read) [ 54.322966] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 56.245390] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.66' (ECDSA) to the list of known hosts. [ 62.190543] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 10:04:04 fuzzer started [ 66.441020] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 10:04:08 dialing manager at 10.128.0.26:39089 2018/10/11 10:04:08 syscalls: 1 2018/10/11 10:04:08 code coverage: enabled 2018/10/11 10:04:08 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 10:04:08 setuid sandbox: enabled 2018/10/11 10:04:08 namespace sandbox: enabled 2018/10/11 10:04:08 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 10:04:08 fault injection: enabled 2018/10/11 10:04:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 10:04:08 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 10:04:08 net device setup: enabled [ 71.711722] random: crng init done 10:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000003680)=[{{&(0x7f0000002000)=@generic, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003080)=""/233, 0xe9}], 0x1, &(0x7f00000033c0)=""/252, 0xfc}}], 0xe000, 0x0, 0x0) [ 163.566649] IPVS: ftp: loaded support on port[0] = 21 [ 164.770969] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.777569] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.785985] device bridge_slave_0 entered promiscuous mode [ 164.926369] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.932881] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.941487] device bridge_slave_1 entered promiscuous mode [ 165.067766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.192724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.578655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.709042] bond0: Enslaving bond_slave_1 as an active interface with an up link 10:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="b7f2", 0x2) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000003680)=[{{&(0x7f0000002000)=@generic, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002080)=""/4096, 0x1000}], 0x1, &(0x7f00000033c0)=""/252, 0xfc}}], 0x1, 0x0, 0x0) [ 166.475723] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.483849] team0: Port device team_slave_0 added [ 166.741120] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.748998] team0: Port device team_slave_1 added [ 166.931362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 166.938752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.947765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.083036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.090108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.099019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.204155] IPVS: ftp: loaded support on port[0] = 21 [ 167.287787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 167.295433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.304350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.507227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 167.514966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.523962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.115914] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.122462] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.130895] device bridge_slave_0 entered promiscuous mode [ 169.258538] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.265265] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.273658] device bridge_slave_1 entered promiscuous mode [ 169.461821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 169.627753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 169.737715] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.744252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.751155] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.757713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.766420] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 170.228156] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.311977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.377121] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.549775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 170.557151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.687597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 170.694799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.128539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.136672] team0: Port device team_slave_0 added [ 171.374131] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.382324] team0: Port device team_slave_1 added [ 171.573334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 171.589279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.598150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 10:05:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x81204101, &(0x7f0000000080)) [ 171.848588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.855917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.864764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.129657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.137586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.146545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.435849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.443428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.452850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.791179] IPVS: ftp: loaded support on port[0] = 21 [ 175.250382] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.256997] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.265422] device bridge_slave_0 entered promiscuous mode [ 175.441107] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.448381] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.456939] device bridge_slave_1 entered promiscuous mode [ 175.480751] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.487469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.494809] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.501313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.509984] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 175.678039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.903853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.933873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.553270] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.763776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.004795] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 177.012061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.312216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.319294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.198120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.206241] team0: Port device team_slave_0 added [ 178.443063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.451301] team0: Port device team_slave_1 added [ 178.686743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 178.694184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.703073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 10:05:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000240)={0x1}) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000001600)={0x79, 0x0, [0xfffffffffffffff8, 0x1, 0x22d5, 0x3]}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000001c0)={0x0, 0xc804, 0x2, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000100)='H.', &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000080), 0xfffffff6}) clock_gettime(0x1, &(0x7f0000001780)) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) [ 178.948773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 178.956080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.964888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.286076] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.294579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.303439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.573154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 179.580697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.589723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.143153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.389579] IPVS: ftp: loaded support on port[0] = 21 [ 181.320677] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.351450] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.357978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.366040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.075113] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.081800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.088732] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.095349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.104144] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.204908] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.211460] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.220245] device bridge_slave_0 entered promiscuous mode [ 183.561425] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.591845] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.598312] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.606797] device bridge_slave_1 entered promiscuous mode [ 183.773466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.964039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.229806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.219755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.556944] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.870559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.877815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.149687] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 186.156903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.037751] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.045887] team0: Port device team_slave_0 added [ 187.377103] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.385354] team0: Port device team_slave_1 added [ 187.698060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.705400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.714070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.010638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 188.017962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.026606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.060246] 8021q: adding VLAN 0 to HW filter on device bond0 10:06:08 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) msgget$private(0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) [ 188.386452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.394378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.403397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.798173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.806091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.815434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.437073] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.031542] IPVS: ftp: loaded support on port[0] = 21 [ 190.862910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 190.869247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.877033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.288989] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.647275] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.653868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.660843] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.667517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.676186] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.892528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.424157] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.430628] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.439116] device bridge_slave_0 entered promiscuous mode [ 193.763969] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.770422] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.778829] device bridge_slave_1 entered promiscuous mode [ 194.129823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 10:06:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000480)=""/108, 0xfffffffffffffe7d}, {&(0x7f0000000500)=""/65, 0x159}, {&(0x7f0000000580)=""/250, 0xfa}], 0x3, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYBLOB="b5000000ee0cd74c227ff3f7885ba14d17b5ff4f4f0aedef73a3991a56623dd3943db5a7e72c946911404ddc2bb351d3295791157b015680cbeb8b1c4dd4f5c460e14a60d944c84694c4de1f3c392c6b4d1b050338f11cc40000000003be9246e3b9bf74358ed3d67b8024882a1567a764b6bc87ced81043d123be95788afb5c127d6d54a7c9d50200000090b2b5871c94d565f74d708e8bc24661f78342e0215993e5396a4d10d05064283685240c4dd0dd"], &(0x7f0000000140)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 194.456233] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.493360] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 194.598363] ================================================================== [ 194.605891] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 194.613517] CPU: 1 PID: 6814 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 [ 194.620696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.630045] Call Trace: [ 194.632646] dump_stack+0x306/0x460 [ 194.636276] ? vmx_set_constant_host_state+0x1778/0x1830 [ 194.641734] kmsan_report+0x1a2/0x2e0 [ 194.645540] __msan_warning+0x7c/0xe0 [ 194.649446] vmx_set_constant_host_state+0x1778/0x1830 [ 194.654735] vmx_create_vcpu+0x3e6f/0x7870 [ 194.658995] ? kmsan_set_origin_inline+0x6b/0x120 [ 194.663879] ? __msan_poison_alloca+0x17a/0x210 [ 194.668666] ? vmx_vm_init+0x340/0x340 [ 194.672561] kvm_arch_vcpu_create+0x25d/0x2f0 [ 194.677074] kvm_vm_ioctl+0x13fd/0x33d0 [ 194.681096] ? __msan_poison_alloca+0x17a/0x210 [ 194.685771] ? do_vfs_ioctl+0x18a/0x2810 [ 194.689833] ? __se_sys_ioctl+0x1da/0x270 [ 194.693989] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 194.698843] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 194.703699] do_vfs_ioctl+0xcf3/0x2810 [ 194.707596] ? security_file_ioctl+0x92/0x200 [ 194.712109] __se_sys_ioctl+0x1da/0x270 [ 194.716096] __x64_sys_ioctl+0x4a/0x70 [ 194.719985] do_syscall_64+0xbe/0x100 [ 194.723800] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 194.729076] RIP: 0033:0x457519 [ 194.732370] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.751273] RSP: 002b:00007fa6f0870c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 194.758988] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 194.766278] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 194.773549] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 194.780931] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6f08716d4 [ 194.788288] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 194.795566] [ 194.797187] Local variable description: ----dt@vmx_set_constant_host_state [ 194.804187] Variable was created at: [ 194.807911] vmx_set_constant_host_state+0x2b0/0x1830 [ 194.813105] vmx_create_vcpu+0x3e6f/0x7870 [ 194.817331] ================================================================== [ 194.824699] Disabling lock debugging due to kernel taint [ 194.830158] Kernel panic - not syncing: panic_on_warn set ... [ 194.830158] [ 194.837535] CPU: 1 PID: 6814 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #66 [ 194.846114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.855471] Call Trace: [ 194.858071] dump_stack+0x306/0x460 [ 194.861754] panic+0x54c/0xafa [ 194.864998] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 194.870464] kmsan_report+0x2d3/0x2e0 [ 194.874390] __msan_warning+0x7c/0xe0 [ 194.878222] vmx_set_constant_host_state+0x1778/0x1830 [ 194.883519] vmx_create_vcpu+0x3e6f/0x7870 [ 194.887779] ? kmsan_set_origin_inline+0x6b/0x120 [ 194.892630] ? __msan_poison_alloca+0x17a/0x210 [ 194.897332] ? vmx_vm_init+0x340/0x340 [ 194.901236] kvm_arch_vcpu_create+0x25d/0x2f0 [ 194.905748] kvm_vm_ioctl+0x13fd/0x33d0 [ 194.909740] ? __msan_poison_alloca+0x17a/0x210 [ 194.914422] ? do_vfs_ioctl+0x18a/0x2810 [ 194.918488] ? __se_sys_ioctl+0x1da/0x270 [ 194.922638] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 194.927494] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 194.932347] do_vfs_ioctl+0xcf3/0x2810 [ 194.936246] ? security_file_ioctl+0x92/0x200 [ 194.940766] __se_sys_ioctl+0x1da/0x270 [ 194.944755] __x64_sys_ioctl+0x4a/0x70 [ 194.948640] do_syscall_64+0xbe/0x100 [ 194.952445] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 194.957636] RIP: 0033:0x457519 [ 194.960852] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.979768] RSP: 002b:00007fa6f0870c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 194.987483] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 194.994751] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 195.002021] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 195.009309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6f08716d4 [ 195.016585] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 195.025037] Kernel Offset: disabled [ 195.028666] Rebooting in 86400 seconds..