[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 79.630668][ T30] audit: type=1800 audit(1569307521.673:25): pid=12025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 79.661934][ T30] audit: type=1800 audit(1569307521.703:26): pid=12025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 79.682247][ T30] audit: type=1800 audit(1569307521.703:27): pid=12025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.4' (ECDSA) to the list of known hosts. 2019/09/24 06:45:35 fuzzer started syzkaller login: [ 95.414740][T12183] cc1 (12183) used greatest stack depth: 53440 bytes left 2019/09/24 06:45:39 dialing manager at 10.128.0.26:34199 2019/09/24 06:45:39 syscalls: 2382 2019/09/24 06:45:39 code coverage: enabled 2019/09/24 06:45:39 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/24 06:45:39 extra coverage: enabled 2019/09/24 06:45:39 setuid sandbox: enabled 2019/09/24 06:45:39 namespace sandbox: enabled 2019/09/24 06:45:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/24 06:45:39 fault injection: enabled 2019/09/24 06:45:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/24 06:45:39 net packet injection: enabled 2019/09/24 06:45:39 net device setup: enabled 06:48:11 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') dup3(r0, r1, 0x0) [ 249.367176][T12191] IPVS: ftp: loaded support on port[0] = 21 [ 249.509965][T12191] chnl_net:caif_netlink_parms(): no params data found [ 249.563714][T12191] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.570918][T12191] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.579642][T12191] device bridge_slave_0 entered promiscuous mode [ 249.590589][T12191] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.598055][T12191] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.606797][T12191] device bridge_slave_1 entered promiscuous mode [ 249.639328][T12191] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.652866][T12191] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.684533][T12191] team0: Port device team_slave_0 added [ 249.693674][T12191] team0: Port device team_slave_1 added [ 249.916782][T12191] device hsr_slave_0 entered promiscuous mode [ 250.172924][T12191] device hsr_slave_1 entered promiscuous mode [ 250.461878][T12191] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.469251][T12191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.477073][T12191] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.484404][T12191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.504399][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.514342][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.583745][T12191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.603943][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.612543][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.626902][T12191] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.642716][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.652308][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.661310][ T2926] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.668662][ T2926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.716211][T12191] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.727270][T12191] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.742755][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.752152][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.761167][ T2926] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.768505][ T2926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.777821][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.787740][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.797591][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.807374][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.816884][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.826648][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.836149][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.845245][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.854823][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.863884][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.878224][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.887262][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.914094][T12191] 8021q: adding VLAN 0 to HW filter on device batadv0 06:48:13 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 06:48:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 06:48:13 executing program 0: recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) 06:48:13 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xfffffffffffffff6, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), 0x0}, 0x20) 06:48:13 executing program 0: syz_open_dev$dspn(&(0x7f0000000000)='/\x00\x00\x00\x00\x00\x00\x00\x00\xe8', 0x0, 0x951c1) 06:48:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r2, &(0x7f00000005c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r3, &(0x7f00000005c0)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r4, &(0x7f00000005c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff]}, 0x45c) ioctl$UI_DEV_CREATE(r4, 0x5501) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r0, 0x4081}, {r1, 0x2203f6028572e032}, {r2, 0x8142}, {r0, 0x2000}, {0xffffffffffffffff, 0x2004}, {0xffffffffffffffff, 0x80}, {r3, 0x126}, {r4, 0x68c8}, {r0, 0x100}], 0x9, &(0x7f0000000380)={r5, r6+10000000}, &(0x7f00000003c0)={0x6}, 0x8) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000080)=""/172) r7 = socket(0x1, 0x2, 0x80) write(r7, &(0x7f0000000180)="240000001a0025f00018009300edfc0e800300000000af00000000000800010048050006", 0x24) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200, 0x0) ioctl$TCXONC(r10, 0x540a, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000240)={r11, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000300)=0x139) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={r11, 0x5}, 0x8) [ 251.766075][T12218] input: syz1 as /devices/virtual/input/input5 [ 251.795777][T12218] input: syz1 as /devices/virtual/input/input6 [ 251.825140][T12218] input: syz1 as /devices/virtual/input/input7 06:48:14 executing program 1: recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=""/83, 0x53, 0x0, &(0x7f0000000080)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x4) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @rand_addr=0xffffffff}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @loopback}, 0x80, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000100)='netdevsim0\x00', 0x1, 0x55aa, 0x3}) bind(r0, &(0x7f00000001c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x80) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000280)=""/120, &(0x7f0000000300)=0x78) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'filter\x00'}, &(0x7f00000003c0)=0x54) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x200000, 0x0) prctl$PR_SET_FPEXC(0xc, 0x2) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x4, 0x242502) ioctl$TIOCSBRK(r2, 0x5427) recvmmsg(r0, &(0x7f0000001600)=[{{&(0x7f0000000480)=@ipx, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/145, 0x91}], 0x1, &(0x7f0000000600)=""/4096, 0x1000}, 0x1}], 0x1, 0x60, &(0x7f0000001640)) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f00000017c0)={0xffffff79, 0xb35, &(0x7f0000001680)="0d5098ae15d4d26479a6374fa9a964e14d0b97d21454800142ce4ec7202a1b6c595b83792a0653c7e0fccd1e9c872db92d4b5ef5981a87894e3737dbea5b7583f9930a447da4d8fc8f68b699557eb452d0482b66d6ecce463672e004d083f359445fcfecfa123e", &(0x7f0000001700)="b6b3fbdfd70719d51427fb6c61dce87e32801d9cbf40420e59ea7a48892d96cf06162309fb0fff5203bf55a78a9004ffb7a79442b20e097788afc90213aff054ee1fc092983f2ee738521819695f93a8d4f32a7f62881467c0f8c932368628ebe932dbe0a932e2c312ee14049a8e3adc25c12adf938801b6ef0696983a581be4b71086aa3a10293ecdeb02b98c7a1b334f6fa68c405a4549615f18cf2a2b", 0x67, 0x9e}) arch_prctl$ARCH_SET_GS(0x1001, 0x100000000) pipe2(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000) write$P9_RSTATFS(r3, &(0x7f0000001840)={0x43, 0x9, 0x1, {0xfffffffb, 0x2, 0x1, 0x5, 0x8000, 0x7, 0x2, 0x3, 0x20}}, 0x43) r5 = openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x400000, 0x100) ioctl$KVM_SET_TSS_ADDR(r5, 0xae47, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.stat\x00', 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f0000001940)={0x7, 0x1e, 0x7, 0x0, 0x6, 0xfc, 0x9, 0x8, 0x4, 0x2, 0x3, 0x50, 0x0, 0x0, 0x3ff, 0x9, 0x6, 0x0, 0x7f}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000001980)={0x8db, 0x19, 0xfffffffe, 0x2, 0xb66b}, 0x14) pkey_alloc(0x0, 0x1) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000019c0)={0xfa0, 0x7, 0x2, 0x8, 0x2d7}) sync_file_range(r3, 0x3, 0x3, 0x6) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001a00)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$packet_buf(r7, 0x107, 0x0, &(0x7f0000001a40)=""/155, &(0x7f0000001b00)=0x9b) r8 = syz_open_dev$vcsa(&(0x7f0000001b40)='/dev/vcsa#\x00', 0x4, 0x80) setsockopt$TIPC_MCAST_BROADCAST(r8, 0x10f, 0x85) [ 252.567365][T12223] input: syz1 as /devices/virtual/input/input8 [ 252.577863][T12223] input: syz1 as /devices/virtual/input/input9 [ 252.588901][T12224] input: syz1 as /devices/virtual/input/input10 [ 252.989204][T12230] IPVS: ftp: loaded support on port[0] = 21 06:48:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r4) r6 = socket(0x40000000011, 0x80002, 0x5) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000100), 0x4) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xf, 0x12, r6, 0x80000000) keyctl$KEYCTL_MOVE(0x1e, r2, r3, r5, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r8 = dup3(r7, r7, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000140)) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000740)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x7880000}, 0xfffffffffffffff0, &(0x7f0000000780)={&(0x7f0000000680)={0x65, r9, 0xc00, 0x70bd2d, 0x25dfdbfd}, 0x4d}, 0x1, 0x0, 0x0, 0x8040}, 0xc000) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0xb4, r9, 0x120, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0xffffffffffffffc6, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x318de1de}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80008}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5e}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40}, 0xb8fb67bda88f14aa) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 253.149641][T12230] chnl_net:caif_netlink_parms(): no params data found [ 253.215092][T12230] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.223067][T12230] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.231939][T12230] device bridge_slave_0 entered promiscuous mode [ 253.242327][T12230] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.249567][T12230] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.258580][T12230] device bridge_slave_1 entered promiscuous mode [ 253.289625][T12230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.302667][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 253.309442][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 253.316610][T12230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.350288][T12230] team0: Port device team_slave_0 added [ 253.359751][T12230] team0: Port device team_slave_1 added [ 253.405522][ C1] ================================================================== [ 253.414041][ C1] BUG: KMSAN: uninit-value in kmem_cache_free+0x3df/0x2b70 [ 253.421260][ C1] CPU: 1 PID: 12234 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 253.429156][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.439375][ C1] Call Trace: [ 253.442669][ C1] [ 253.445662][ C1] dump_stack+0x191/0x1f0 [ 253.450017][ C1] kmsan_report+0x162/0x2d0 [ 253.454553][ C1] __msan_warning+0x75/0xe0 [ 253.459066][ C1] kmem_cache_free+0x3df/0x2b70 [ 253.463923][ C1] ? kmsan_set_origin+0x6a/0xf0 [ 253.469101][ C1] ? kfree_skb+0x473/0x4c0 [ 253.473535][ C1] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 253.479635][ C1] kfree_skb+0x473/0x4c0 [ 253.484046][ C1] ? __udp4_lib_rcv+0x490d/0x4a70 [ 253.489097][ C1] __udp4_lib_rcv+0x490d/0x4a70 [ 253.493994][ C1] udp_rcv+0x5c/0x70 [ 253.497984][ C1] ? udp_v4_early_demux+0x1e30/0x1e30 [ 253.503416][ C1] ip_protocol_deliver_rcu+0x694/0xbc0 [ 253.508891][ C1] ip_local_deliver+0x62a/0x7c0 [ 253.513849][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 253.518887][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 253.524665][ C1] ip_rcv+0x6c5/0x740 [ 253.528667][ C1] ? ip_rcv_core+0x11d0/0x11d0 [ 253.534266][ C1] process_backlog+0xef5/0x1410 [ 253.539145][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 253.544806][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 253.550107][ C1] net_rx_action+0x74b/0x1950 [ 253.554834][ C1] ? net_tx_action+0xba0/0xba0 [ 253.559658][ C1] __do_softirq+0x4a1/0x83a [ 253.564201][ C1] do_softirq_own_stack+0x49/0x80 [ 253.569225][ C1] [ 253.572236][ C1] do_softirq+0xed/0x150 [ 253.576494][ C1] netif_rx_ni+0x208/0x3c0 [ 253.580922][ C1] dev_loopback_xmit+0x607/0x670 [ 253.585967][ C1] ip_mc_finish_output+0x484/0x6d0 [ 253.591102][ C1] ip_mc_output+0xc6d/0x1090 [ 253.595714][ C1] ? ip_mc_output+0x1090/0x1090 [ 253.600574][ C1] ? ip_build_and_send_pkt+0xe80/0xe80 [ 253.606134][ C1] ip_send_skb+0x179/0x360 [ 253.610572][ C1] udp_send_skb+0xeda/0x1870 [ 253.615208][ C1] udp_sendmsg+0x397c/0x4170 [ 253.619813][ C1] ? ip_do_fragment+0x35f0/0x35f0 [ 253.624889][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 253.630970][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 253.636875][ C1] ? udp_cmsg_send+0x5d0/0x5d0 [ 253.641765][ C1] ? udp_cmsg_send+0x5d0/0x5d0 [ 253.646595][ C1] inet_sendmsg+0x276/0x2e0 [ 253.651117][ C1] ? inet_send_prepare+0x600/0x600 [ 253.656275][ C1] ___sys_sendmsg+0x12c4/0x1590 [ 253.661156][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 253.667062][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 253.673281][ C1] ? balance_callback+0x48/0x260 [ 253.678232][ C1] ? kmsan_internal_check_memory+0x99/0x4e0 [ 253.684218][ C1] ? __msan_get_context_state+0x9/0x20 [ 253.689736][ C1] ? rcu_all_qs+0x23/0x240 [ 253.694169][ C1] __sys_sendmmsg+0x53a/0xae0 [ 253.698883][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 253.705136][ C1] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 253.711134][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 253.717046][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 253.721836][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 253.726701][ C1] do_syscall_64+0xbc/0xf0 [ 253.731238][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 253.737139][ C1] RIP: 0033:0x459a09 [ 253.741060][ C1] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.761175][ C1] RSP: 002b:00007f889e184c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 253.769828][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a09 [ 253.777813][ C1] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 253.785804][ C1] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 253.793881][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f889e1856d4 [ 253.801952][ C1] R13: 00000000004c71df R14: 00000000004dc9f8 R15: 00000000ffffffff [ 253.809948][ C1] [ 253.812283][ C1] Uninit was stored to memory at: [ 253.817411][ C1] kmsan_internal_chain_origin+0xcc/0x150 [ 253.823133][ C1] __msan_chain_origin+0x6b/0xe0 [ 253.828162][ C1] ___slab_alloc+0x1dbc/0x1fb0 [ 253.832935][ C1] kmem_cache_alloc+0xade/0xd10 [ 253.837795][ C1] skb_clone+0x326/0x5d0 [ 253.842045][ C1] ip_mc_output+0x934/0x1090 [ 253.846642][ C1] ip_send_skb+0x179/0x360 [ 253.851074][ C1] udp_send_skb+0xeda/0x1870 [ 253.855669][ C1] udp_sendmsg+0x397c/0x4170 [ 253.860439][ C1] inet_sendmsg+0x276/0x2e0 [ 253.864943][ C1] ___sys_sendmsg+0x12c4/0x1590 [ 253.869808][ C1] __sys_sendmmsg+0x53a/0xae0 [ 253.874577][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 253.879353][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 253.884303][ C1] do_syscall_64+0xbc/0xf0 [ 253.888732][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 253.894646][ C1] [ 253.896981][ C1] Uninit was created at: [ 253.901237][ C1] kmsan_internal_poison_shadow+0x58/0xb0 [ 253.906960][ C1] kmsan_slab_free+0x8d/0x100 [ 253.911650][ C1] kmem_cache_free_bulk+0x3ad9/0x3f50 [ 253.917168][ C1] napi_consume_skb+0x593/0x5d0 [ 253.922147][ C1] free_old_xmit_skbs+0x1a1/0x450 [ 253.927181][ C1] virtnet_poll_tx+0x24c/0x4c0 [ 253.931952][ C1] net_rx_action+0x74b/0x1950 [ 253.936717][ C1] __do_softirq+0x4a1/0x83a [ 253.941233][ C1] irq_exit+0x230/0x280 [ 253.945421][ C1] do_IRQ+0x20d/0x3a0 [ 253.949420][ C1] ret_from_intr+0x0/0x33 [ 253.953770][ C1] __msan_poison_alloca+0x155/0x270 [ 253.959074][ C1] ipt_do_table+0xbe/0x28e0 [ 253.963810][ C1] iptable_security_hook+0xb5/0xe0 [ 253.969097][ C1] nf_hook_slow+0x18b/0x3f0 [ 253.973616][ C1] __ip_local_out+0x69b/0x800 [ 253.978301][ C1] __ip_queue_xmit+0x1bdc/0x21f0 [ 253.983490][ C1] ip_queue_xmit+0xcc/0xf0 [ 253.988096][ C1] __tcp_transmit_skb+0x409e/0x5c60 [ 253.993308][ C1] __tcp_send_ack+0x701/0x840 [ 253.998000][ C1] tcp_send_ack+0x68/0x90 [ 254.002336][ C1] tcp_cleanup_rbuf+0x764/0x800 [ 254.007328][ C1] tcp_recvmsg+0x334d/0x4ff0 [ 254.012019][ C1] inet_recvmsg+0x237/0x7d0 [ 254.016528][ C1] sock_read_iter+0x5be/0x660 [ 254.021280][ C1] __vfs_read+0xa67/0xc90 [ 254.025616][ C1] vfs_read+0x359/0x6f0 [ 254.029785][ C1] ksys_read+0x265/0x430 [ 254.034034][ C1] __se_sys_read+0x92/0xb0 [ 254.038455][ C1] __x64_sys_read+0x4a/0x70 [ 254.043051][ C1] do_syscall_64+0xbc/0xf0 [ 254.047515][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 254.053533][ C1] ================================================================== [ 254.061599][ C1] Disabling lock debugging due to kernel taint [ 254.067758][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 254.074367][ C1] CPU: 1 PID: 12234 Comm: syz-executor.0 Tainted: G B 5.3.0-rc7+ #0 [ 254.083764][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.093841][ C1] Call Trace: [ 254.097224][ C1] [ 254.100105][ C1] dump_stack+0x191/0x1f0 [ 254.104503][ C1] panic+0x3c9/0xc1e [ 254.108440][ C1] kmsan_report+0x2ca/0x2d0 [ 254.113050][ C1] __msan_warning+0x75/0xe0 [ 254.117570][ C1] kmem_cache_free+0x3df/0x2b70 [ 254.122425][ C1] ? kmsan_set_origin+0x6a/0xf0 [ 254.127288][ C1] ? kfree_skb+0x473/0x4c0 [ 254.131892][ C1] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 254.138065][ C1] kfree_skb+0x473/0x4c0 [ 254.142405][ C1] ? __udp4_lib_rcv+0x490d/0x4a70 [ 254.147445][ C1] __udp4_lib_rcv+0x490d/0x4a70 [ 254.152760][ C1] udp_rcv+0x5c/0x70 [ 254.156671][ C1] ? udp_v4_early_demux+0x1e30/0x1e30 [ 254.162066][ C1] ip_protocol_deliver_rcu+0x694/0xbc0 [ 254.167564][ C1] ip_local_deliver+0x62a/0x7c0 [ 254.172479][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 254.177599][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 254.183418][ C1] ip_rcv+0x6c5/0x740 [ 254.187424][ C1] ? ip_rcv_core+0x11d0/0x11d0 [ 254.192214][ C1] process_backlog+0xef5/0x1410 [ 254.197094][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 254.202930][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 254.208229][ C1] net_rx_action+0x74b/0x1950 [ 254.213030][ C1] ? net_tx_action+0xba0/0xba0 [ 254.217835][ C1] __do_softirq+0x4a1/0x83a [ 254.222365][ C1] do_softirq_own_stack+0x49/0x80 [ 254.227389][ C1] [ 254.230350][ C1] do_softirq+0xed/0x150 [ 254.234614][ C1] netif_rx_ni+0x208/0x3c0 [ 254.239052][ C1] dev_loopback_xmit+0x607/0x670 [ 254.244188][ C1] ip_mc_finish_output+0x484/0x6d0 [ 254.249324][ C1] ip_mc_output+0xc6d/0x1090 [ 254.253941][ C1] ? ip_mc_output+0x1090/0x1090 [ 254.258800][ C1] ? ip_build_and_send_pkt+0xe80/0xe80 [ 254.264279][ C1] ip_send_skb+0x179/0x360 [ 254.268718][ C1] udp_send_skb+0xeda/0x1870 [ 254.273434][ C1] udp_sendmsg+0x397c/0x4170 [ 254.278043][ C1] ? ip_do_fragment+0x35f0/0x35f0 [ 254.283120][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 254.289200][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 254.295107][ C1] ? udp_cmsg_send+0x5d0/0x5d0 [ 254.300053][ C1] ? udp_cmsg_send+0x5d0/0x5d0 [ 254.304939][ C1] inet_sendmsg+0x276/0x2e0 [ 254.309462][ C1] ? inet_send_prepare+0x600/0x600 [ 254.314781][ C1] ___sys_sendmsg+0x12c4/0x1590 [ 254.319715][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 254.325807][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 254.331897][ C1] ? balance_callback+0x48/0x260 [ 254.336905][ C1] ? kmsan_internal_check_memory+0x99/0x4e0 [ 254.342940][ C1] ? __msan_get_context_state+0x9/0x20 [ 254.348439][ C1] ? rcu_all_qs+0x23/0x240 [ 254.352899][ C1] __sys_sendmmsg+0x53a/0xae0 [ 254.357682][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 254.363769][ C1] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 254.369695][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 254.375700][ C1] __se_sys_sendmmsg+0xbd/0xe0 [ 254.380498][ C1] __x64_sys_sendmmsg+0x56/0x70 [ 254.385391][ C1] do_syscall_64+0xbc/0xf0 [ 254.389829][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 254.395732][ C1] RIP: 0033:0x459a09 [ 254.399632][ C1] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.420484][ C1] RSP: 002b:00007f889e184c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 254.428909][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a09 [ 254.437128][ C1] RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 [ 254.445117][ C1] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 254.453107][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f889e1856d4 [ 254.461088][ C1] R13: 00000000004c71df R14: 00000000004dc9f8 R15: 00000000ffffffff [ 254.470873][ C1] Kernel Offset: disabled [ 254.475398][ C1] Rebooting in 86400 seconds..