[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 75.061441][ T32] audit: type=1800 audit(1569830877.100:25): pid=11822 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 75.084855][ T32] audit: type=1800 audit(1569830877.130:26): pid=11822 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 75.123913][ T32] audit: type=1800 audit(1569830877.160:27): pid=11822 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. 2019/09/30 08:08:09 fuzzer started 2019/09/30 08:08:13 dialing manager at 10.128.0.26:42601 2019/09/30 08:08:14 syscalls: 2385 2019/09/30 08:08:14 code coverage: enabled 2019/09/30 08:08:14 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/30 08:08:14 extra coverage: enabled 2019/09/30 08:08:14 setuid sandbox: enabled 2019/09/30 08:08:14 namespace sandbox: enabled 2019/09/30 08:08:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/30 08:08:14 fault injection: enabled 2019/09/30 08:08:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/30 08:08:14 net packet injection: enabled 2019/09/30 08:08:14 net device setup: enabled 08:11:32 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x280, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000080)={0xed, 0x3f, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'veth1\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xfffffffd}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x80}, &(0x7f0000000180)=0x8) write$USERIO_CMD_REGISTER(r0, &(0x7f00000001c0)={0x0, 0x6}, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x2, 0x20, 0x6, 0x8}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x6, 0x8, 0x0, 0x6, r2}, &(0x7f0000000340)=0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f00000003c0)=""/29) r5 = creat(&(0x7f0000000400)='./file0\x00', 0x100) write$P9_RRENAMEAT(r5, &(0x7f0000000440)={0x7, 0x4b, 0x1}, 0x7) r6 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r6, 0x4018ae51, &(0x7f00000004c0)={0x101, 0x8, 0x2}) exit_group(0x1) write$binfmt_script(r6, &(0x7f0000000500)={'#! ', './file0', [{0x20, '[^'}, {0x20, 'posix_acl_accessGPL'}], 0xa, "2b61c0f8611f0ba2f9fd3fd81a77d69fa57a4ebd6023e719c9e48106f71af00046f1a7feb1c51dd828a12bb7cdf00c63d03dd2fa066ed6c33a59a8536772234dcc72f1465c3322479856f1a2cf28c1de87ef42fc8d5ab286588b7a8311f62f70b9a0863f8ca40ed1afabd20c4e706fbfb346a1769f558ec0b2e2cdfd6ebcd06373c07fe593a0104c64bdc06265bfceb9df61f8ce6780adb5e83392e85d795b0a7cbaa1a835d1d6c95d3b3b1a0a60a22d3747749f498bd19bb457fc91e892cce998bcab87e41c329692e27798293475b6c16339621399e2"}, 0xf9) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='cpuset\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x10000, @rand_addr="cfc550ca844c6ddc43dd3fa969b968af", 0x5}}, 0xf801, 0x5}, &(0x7f0000000700)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000740)={r8, 0x3, 0xb47, 0x7, 0x7, 0x4, 0x0, 0x0, {r3, @in6={{0xa, 0x4e23, 0x2, @rand_addr="e50bb836294656cdc7d9d2cdbef72440", 0x7}}, 0x9, 0x3, 0xbebc, 0x9, 0x800}}, &(0x7f0000000800)=0xb0) r9 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000840)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r9, 0x114, 0xa, &(0x7f0000000880)={0x3, "f6386f"}, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0xf1f, 0x7f}, &(0x7f0000000900)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000940)={r10, @in6={{0xa, 0x4e23, 0x8b5, @loopback}}}, 0x84) r11 = dup3(r9, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r11, 0x29, 0x3d, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/dlm-monitor\x00', 0x100, 0x0) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/dlm-control\x00', 0x514b81, 0x0) recvmmsg(r4, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000c80)=""/204, 0xcc}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)=""/182, 0xb6}, {&(0x7f0000000e80)=""/130, 0x82}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)=""/126, 0x7e}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/30, 0x1e}, {&(0x7f0000002040)=""/186, 0xba}], 0x9, &(0x7f00000021c0)=""/70, 0x46}, 0x3}, {{&(0x7f0000002240)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002380)=[{&(0x7f00000022c0)=""/174, 0xae}], 0x1, &(0x7f00000023c0)=""/4096, 0x1000}, 0xfffffff7}, {{0x0, 0x0, &(0x7f0000003500)=[{&(0x7f00000033c0)=""/69, 0x45}, {&(0x7f0000003440)=""/142, 0x8e}], 0x2, &(0x7f0000003540)=""/178, 0xb2}, 0x40}, {{&(0x7f0000003600)=@tipc=@name, 0x80, &(0x7f0000006900)=[{&(0x7f0000003680)=""/4096, 0x1000}, {&(0x7f0000004680)=""/31, 0x1f}, {&(0x7f00000046c0)=""/150, 0x96}, {&(0x7f0000004780)=""/115, 0x73}, {&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000005800)=""/4096, 0x1000}, {&(0x7f0000006800)=""/202, 0xca}], 0x7, &(0x7f0000006980)=""/172, 0xac}}], 0x4, 0x1, &(0x7f0000006b40)={0x0, 0x989680}) bind$can_raw(r12, &(0x7f0000006b80)={0x1d, r13}, 0x10) openat$cgroup_procs(r6, &(0x7f0000006bc0)='tasks\x00', 0x2, 0x0) syzkaller login: [ 291.009607][T11984] IPVS: ftp: loaded support on port[0] = 21 [ 291.139842][T11984] chnl_net:caif_netlink_parms(): no params data found [ 291.193850][T11984] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.201056][T11984] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.209648][T11984] device bridge_slave_0 entered promiscuous mode [ 291.219606][T11984] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.226816][T11984] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.235501][T11984] device bridge_slave_1 entered promiscuous mode [ 291.266536][T11984] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.278798][T11984] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.310554][T11984] team0: Port device team_slave_0 added [ 291.319588][T11984] team0: Port device team_slave_1 added [ 291.606378][T11984] device hsr_slave_0 entered promiscuous mode [ 291.733065][T11984] device hsr_slave_1 entered promiscuous mode [ 291.981134][T11984] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.988396][T11984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.996350][T11984] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.003546][T11984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.075782][T11984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.094569][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.105315][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.114969][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.126217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 292.145007][T11984] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.160135][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.170054][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.178999][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.186214][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.230573][T11984] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 292.241443][T11984] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 292.256308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.265851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.274795][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.281981][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.290362][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.300154][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 292.309957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 292.319625][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.328995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 292.338579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.348080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.357103][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.366354][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.375310][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.388998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 292.397450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.425310][T11984] 8021q: adding VLAN 0 to HW filter on device batadv0 08:11:34 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000001c0)=@v1={0x0, @adiantum, 0x4, "38cb87a183561ca0"}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x280040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000080)={0x2, 0x6, 0x1f9c, 0x8b0, 0x9, 0xea}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="6343b1f6e1a32efa1be988f69d6a57e6"}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_usb_connect(0x0, 0x3e5, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000080dd2720e60f0098b83c0000000109021200010000000009049f00007e052200"], 0x0) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io(r4, 0x0, &(0x7f0000001740)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={0x40, 0x13, 0x6, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r4, 0x0, &(0x7f0000000480)={0x2c, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r4, 0x0, 0x0) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r4, 0x0, &(0x7f0000000300)={0x44, &(0x7f00000000c0)={0x0, 0x0, 0x2, "e5cb"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r4, &(0x7f0000000340)={0x2c, &(0x7f0000000040)={0x0, 0x1, 0x14, {0x14, 0xba1df7a15cb3d8d3, "6bd174f3bb85cd1b0d0fbb4d8977f18ef3ce"}}, &(0x7f0000000240)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xc01}}, &(0x7f0000000280)={0x0, 0xf, 0x31, {0x5, 0xf, 0x31, 0x5, [@ptm_cap={0x3}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x41, 0x0, 0x23, 0x1, 0x2}, @ssp_cap={0x18, 0x10, 0xa, 0x80, 0x3, 0x5, 0xff00, 0xe2, [0xe0ce, 0x3f00, 0x60c0]}, @ptm_cap={0x3}]}}, &(0x7f00000002c0)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x4, 0x8, 0x39, "bb73de07", "f07c1437"}}, &(0x7f0000000300)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x81, 0x2, 0x7, 0x0, 0x81, 0x7, 0x6}}}, &(0x7f0000000900)={0xac, &(0x7f0000000380)={0x40, 0x7, 0x69, "0a7c5a1a72aab553e67f07352d0014c0e0356dede6e8483788738b469af901b024ffaac43af92245ac359ab251253d311f81b63a7b80060df7b19ff0fea717f45db28df89c1c01eefd56e4700a9a3d3978e66af600b1a53b995cb86d7d4961de2bead2c107ca596114"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000000480)={0x20, 0x81, 0x1, '+'}, &(0x7f00000004c0)={0x20, 0x82, 0x1, 'f'}, &(0x7f0000000500)={0x20, 0x83, 0x2, '\b!'}, &(0x7f0000000540)={0x20, 0x84, 0x1, "9b"}, &(0x7f0000000580)={0x20, 0x85, 0x3, "cce9eb"}, &(0x7f00000005c0)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000600)={0x20, 0x0, 0x4, {0x160, 0x20}}, &(0x7f0000000640)={0x40, 0x7, 0x2, 0x3ff}, &(0x7f0000000680)={0x40, 0x9, 0x1, 0x9}, &(0x7f00000006c0)={0x40, 0xb, 0x2, "890e"}, &(0x7f0000000700)={0x40, 0xf, 0x2, 0x8b}, &(0x7f0000000740)={0x40, 0x13, 0x6, @remote}, &(0x7f0000000780)={0x40, 0x17, 0x6, @random="4a2753bfbfac"}, &(0x7f00000007c0)={0x40, 0x19, 0x2, "3ce7"}, &(0x7f0000000800)={0x40, 0x1a, 0x2, 0xfff9}, &(0x7f0000000840)={0x40, 0x1c, 0x1, 0x6}, &(0x7f0000000880)={0x40, 0x1e, 0x1, 0x1}, &(0x7f00000008c0)={0x40, 0x21, 0x1, 0x63}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000180)={0x40000000}) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000100)) [ 292.912242][ T5] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 293.152337][ T5] usb 1-1: Using ep0 maxpacket: 32 [ 293.272437][ T5] usb 1-1: config 0 has an invalid interface number: 159 but max is 0 [ 293.280821][ T5] usb 1-1: config 0 has no interface number 0 [ 293.287127][ T5] usb 1-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=3c.b8 [ 293.296277][ T5] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 293.309668][ T5] usb 1-1: config 0 descriptor?? 08:11:35 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xffff, 0x10ac0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) r1 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffa) keyctl$set_timeout(0xf, r1, 0x7) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x954d5b64830adddb, 0x0) accept4$inet6(r2, 0x0, &(0x7f0000000140), 0xdbbda97ecc2066cc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)=@builtin='builtin_trusted\x00') r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="b43300f8eb15501e601bec7669b03f3835ee903b344d06d0bfd24863fd7c9df3667d2c05208ae60b69f6a1b53e4be174ec125ef2e7130e36e9d0d5da8b652fdf3b68ac43ed4615bf714c8896320b43d5ea90b197ea3a841199e4ea76fbb1013985807796d91dcda386d7e3bab791791f2872", 0x72, r1) keyctl$unlink(0x9, r3, r4) shmget$private(0x0, 0x3000, 0x629, &(0x7f0000ffa000/0x3000)=nil) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x9, 0x42002) r6 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x400) inotify_rm_watch(r5, r6) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x8, 0x80010, 0xffffffffffffffff, 0x8000000) r7 = accept$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000480)=@req={0x59, 0x1, 0x3a7, 0x4}, 0x10) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f00000004c0)=0x2) socket$inet(0x2, 0x819, 0x52) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000500)=0x6, &(0x7f0000000540)=0x2) r8 = creat(&(0x7f0000000580)='./file0\x00', 0x100) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f00000005c0)={0x23, 0x2f, 0x13, 0x1f, 0x5, 0xe1df, 0x5, 0xf5, 0x1}) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20\x00', 0x80040, 0x0) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0xa) r10 = syz_open_dev$amidi(&(0x7f0000000640)='/dev/amidi#\x00', 0x20, 0x823f23a6d5833d32) connect$rds(r10, &(0x7f0000000680)={0x2, 0x4e20, @broadcast}, 0x10) connect$tipc(0xffffffffffffffff, &(0x7f00000006c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x2}}, 0x10) ioctl$VIDIOC_DBG_G_REGISTER(r8, 0xc0385650, &(0x7f0000000700)={{0x2, @addr=0x8}, 0x8, 0x101, 0xdc}) r11 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000740)={0x0, 0x6}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r11, 0x84, 0x22, &(0x7f00000007c0)={0x5, 0xa, 0x7fff, 0x6de0, r12}, 0x10) [ 294.002885][ T5] CoreChips 1-1:0.159 (unnamed net_device) (uninitialized): sr_get_phy_addr : Error reading PHYID register:ffffffea [ 294.071849][T11996] IPVS: ftp: loaded support on port[0] = 21 [ 294.214170][T11996] chnl_net:caif_netlink_parms(): no params data found [ 294.271277][T11996] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.278635][T11996] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.287221][T11996] device bridge_slave_0 entered promiscuous mode [ 294.297777][T11996] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.305022][T11996] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.313518][T11996] device bridge_slave_1 entered promiscuous mode [ 294.345614][T11996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 294.360533][T11996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 294.393603][T11996] team0: Port device team_slave_0 added [ 294.402701][T11996] team0: Port device team_slave_1 added [ 294.486999][T11996] device hsr_slave_0 entered promiscuous mode [ 294.743522][T11996] device hsr_slave_1 entered promiscuous mode [ 295.002320][T11996] debugfs: Directory 'hsr0' with parent '/' already present! [ 295.031213][T11996] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.038457][T11996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.046150][T11996] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.053354][T11996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.132269][T11996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.153322][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.164395][ T3002] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.175662][ T3002] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.187828][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.207818][T11996] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.225234][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.235117][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.243944][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.251077][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.298736][T11996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 295.309377][T11996] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.323045][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.332411][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.341357][ T3002] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.348583][ T3002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.358080][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.367885][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.377660][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.387270][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.396546][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.406211][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.415616][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.424706][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.434116][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.443149][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.457953][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.466590][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.501173][T11996] 8021q: adding VLAN 0 to HW filter on device batadv0 08:11:37 executing program 1: setrlimit(0x2, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)=0x8) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000140)="7d537f01072d8561d760b43b81235f4f05f221f1a737684d59c8b40302f40c6653c813854d34c18d38eef1ed10489e047f342d6bb674818449aeeaa00936878629683f9fd450af6e83ff6be5920e") [ 295.705623][T12007] mmap: syz-executor.1 (12007): VmData 18526208 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 296.002573][ T5] CoreChips 1-1:0.159 (unnamed net_device) (uninitialized): Error reading RX_CTL register:ffffffb9 [ 296.033245][ T5] CoreChips 1-1:0.159 (unnamed net_device) (uninitialized): Failed to enable software MII access [ 296.082622][ T5] CoreChips 1-1:0.159 (unnamed net_device) (uninitialized): Failed to enable hardware MII access [ 296.093454][ T5] ===================================================== [ 296.100395][ T5] BUG: KMSAN: uninit-value in usbnet_probe+0x10ae/0x3960 [ 296.107418][ T5] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.3.0-rc7+ #0 [ 296.114688][ T5] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.124760][ T5] Workqueue: usb_hub_wq hub_event [ 296.129774][ T5] Call Trace: [ 296.133152][ T5] dump_stack+0x191/0x1f0 [ 296.137483][ T5] kmsan_report+0x13a/0x2b0 [ 296.141990][ T5] __msan_warning+0x73/0xe0 [ 296.146495][ T5] sr9800_bind+0xd39/0x1b10 [ 296.151014][ T5] ? sr_share_read_word+0x630/0x630 [ 296.156204][ T5] usbnet_probe+0x10ae/0x3960 [ 296.160881][ T5] ? ktime_get_mono_fast_ns+0x2c2/0x400 [ 296.166447][ T5] ? usbnet_disconnect+0x660/0x660 [ 296.171561][ T5] usb_probe_interface+0xd19/0x1310 [ 296.176763][ T5] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 296.182647][ T5] ? usb_register_driver+0x7d0/0x7d0 [ 296.187930][ T5] really_probe+0x1373/0x1dc0 [ 296.192617][ T5] driver_probe_device+0x1ba/0x510 [ 296.197733][ T5] __device_attach_driver+0x5b8/0x790 [ 296.203113][ T5] bus_for_each_drv+0x28e/0x3b0 [ 296.207959][ T5] ? deferred_probe_work_func+0x400/0x400 [ 296.213679][ T5] __device_attach+0x489/0x750 [ 296.218461][ T5] device_initial_probe+0x4a/0x60 [ 296.223491][ T5] bus_probe_device+0x131/0x390 [ 296.228346][ T5] device_add+0x25b5/0x2df0 [ 296.232871][ T5] usb_set_configuration+0x309f/0x3710 [ 296.238348][ T5] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 296.244431][ T5] generic_probe+0xe7/0x280 [ 296.248957][ T5] ? usb_choose_configuration+0xae0/0xae0 [ 296.254681][ T5] usb_probe_device+0x146/0x200 [ 296.259531][ T5] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 296.265440][ T5] ? usb_register_device_driver+0x470/0x470 [ 296.271337][ T5] really_probe+0x1373/0x1dc0 [ 296.276025][ T5] driver_probe_device+0x1ba/0x510 [ 296.281145][ T5] __device_attach_driver+0x5b8/0x790 [ 296.286524][ T5] bus_for_each_drv+0x28e/0x3b0 [ 296.291371][ T5] ? deferred_probe_work_func+0x400/0x400 [ 296.297122][ T5] __device_attach+0x489/0x750 [ 296.301893][ T5] device_initial_probe+0x4a/0x60 [ 296.306916][ T5] bus_probe_device+0x131/0x390 [ 296.311773][ T5] device_add+0x25b5/0x2df0 [ 296.316285][ T5] usb_new_device+0x23e5/0x2fb0 [ 296.321152][ T5] hub_event+0x581d/0x72f0 [ 296.325614][ T5] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 296.331497][ T5] ? led_work+0x720/0x720 [ 296.335817][ T5] ? led_work+0x720/0x720 [ 296.340165][ T5] process_one_work+0x1572/0x1ef0 [ 296.345205][ T5] worker_thread+0x111b/0x2460 [ 296.350023][ T5] kthread+0x4b5/0x4f0 [ 296.354098][ T5] ? process_one_work+0x1ef0/0x1ef0 [ 296.359304][ T5] ? kthread_blkcg+0xf0/0xf0 [ 296.363934][ T5] ret_from_fork+0x35/0x40 [ 296.368364][ T5] [ 296.370692][ T5] Local variable description: ----res@sr_mdio_read [ 296.377178][ T5] Variable was created at: [ 296.381609][ T5] sr_mdio_read+0x78/0x360 [ 296.386022][ T5] sr9800_bind+0xce9/0x1b10 [ 296.390511][ T5] ===================================================== [ 296.397442][ T5] Disabling lock debugging due to kernel taint [ 296.403600][ T5] Kernel panic - not syncing: panic_on_warn set ... [ 296.410184][ T5] CPU: 0 PID: 5 Comm: kworker/0:0 Tainted: G B 5.3.0-rc7+ #0 [ 296.418843][ T5] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.428907][ T5] Workqueue: usb_hub_wq hub_event [ 296.433923][ T5] Call Trace: [ 296.437218][ T5] dump_stack+0x191/0x1f0 [ 296.441558][ T5] panic+0x3c9/0xc1e [ 296.445479][ T5] kmsan_report+0x2a2/0x2b0 [ 296.449983][ T5] __msan_warning+0x73/0xe0 [ 296.454487][ T5] sr9800_bind+0xd39/0x1b10 [ 296.459007][ T5] ? sr_share_read_word+0x630/0x630 [ 296.464200][ T5] usbnet_probe+0x10ae/0x3960 [ 296.468876][ T5] ? ktime_get_mono_fast_ns+0x2c2/0x400 [ 296.474438][ T5] ? usbnet_disconnect+0x660/0x660 [ 296.479550][ T5] usb_probe_interface+0xd19/0x1310 [ 296.484775][ T5] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 296.490670][ T5] ? usb_register_driver+0x7d0/0x7d0 [ 296.495956][ T5] really_probe+0x1373/0x1dc0 [ 296.500652][ T5] driver_probe_device+0x1ba/0x510 [ 296.505777][ T5] __device_attach_driver+0x5b8/0x790 [ 296.511191][ T5] bus_for_each_drv+0x28e/0x3b0 [ 296.516042][ T5] ? deferred_probe_work_func+0x400/0x400 [ 296.521766][ T5] __device_attach+0x489/0x750 [ 296.526541][ T5] device_initial_probe+0x4a/0x60 [ 296.531566][ T5] bus_probe_device+0x131/0x390 [ 296.536427][ T5] device_add+0x25b5/0x2df0 [ 296.540955][ T5] usb_set_configuration+0x309f/0x3710 [ 296.546444][ T5] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 296.552525][ T5] generic_probe+0xe7/0x280 [ 296.557031][ T5] ? usb_choose_configuration+0xae0/0xae0 [ 296.562752][ T5] usb_probe_device+0x146/0x200 [ 296.567602][ T5] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 296.573493][ T5] ? usb_register_device_driver+0x470/0x470 [ 296.579391][ T5] really_probe+0x1373/0x1dc0 [ 296.584084][ T5] driver_probe_device+0x1ba/0x510 [ 296.589204][ T5] __device_attach_driver+0x5b8/0x790 [ 296.594590][ T5] bus_for_each_drv+0x28e/0x3b0 [ 296.599435][ T5] ? deferred_probe_work_func+0x400/0x400 [ 296.605153][ T5] __device_attach+0x489/0x750 [ 296.609925][ T5] device_initial_probe+0x4a/0x60 [ 296.614953][ T5] bus_probe_device+0x131/0x390 [ 296.619810][ T5] device_add+0x25b5/0x2df0 [ 296.624346][ T5] usb_new_device+0x23e5/0x2fb0 [ 296.629216][ T5] hub_event+0x581d/0x72f0 [ 296.633676][ T5] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 296.639567][ T5] ? led_work+0x720/0x720 [ 296.643907][ T5] ? led_work+0x720/0x720 [ 296.648241][ T5] process_one_work+0x1572/0x1ef0 [ 296.653282][ T5] worker_thread+0x111b/0x2460 [ 296.658068][ T5] kthread+0x4b5/0x4f0 [ 296.662143][ T5] ? process_one_work+0x1ef0/0x1ef0 [ 296.667358][ T5] ? kthread_blkcg+0xf0/0xf0 [ 296.671950][ T5] ret_from_fork+0x35/0x40 [ 296.677900][ T5] Kernel Offset: disabled [ 296.682271][ T5] Rebooting in 86400 seconds..