[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 75.685653][ T32] audit: type=1800 audit(1569087088.758:25): pid=11349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 75.708603][ T32] audit: type=1800 audit(1569087088.778:26): pid=11349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 75.744341][ T32] audit: type=1800 audit(1569087088.808:27): pid=11349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.124' (ECDSA) to the list of known hosts. 2019/09/21 17:31:42 fuzzer started 2019/09/21 17:31:45 dialing manager at 10.128.0.26:42045 2019/09/21 17:31:46 syscalls: 2382 2019/09/21 17:31:46 code coverage: enabled 2019/09/21 17:31:46 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/21 17:31:46 extra coverage: enabled 2019/09/21 17:31:46 setuid sandbox: enabled 2019/09/21 17:31:46 namespace sandbox: enabled 2019/09/21 17:31:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/21 17:31:46 fault injection: enabled 2019/09/21 17:31:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/21 17:31:46 net packet injection: enabled 2019/09/21 17:31:46 net device setup: enabled 17:34:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) syzkaller login: [ 249.616869][T11514] IPVS: ftp: loaded support on port[0] = 21 [ 249.752572][T11514] chnl_net:caif_netlink_parms(): no params data found [ 249.808151][T11514] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.815431][T11514] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.824107][T11514] device bridge_slave_0 entered promiscuous mode [ 249.834096][T11514] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.841299][T11514] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.850031][T11514] device bridge_slave_1 entered promiscuous mode [ 249.882797][T11514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.895995][T11514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.929085][T11514] team0: Port device team_slave_0 added [ 249.938401][T11514] team0: Port device team_slave_1 added [ 250.016942][T11514] device hsr_slave_0 entered promiscuous mode [ 250.273321][T11514] device hsr_slave_1 entered promiscuous mode [ 250.552004][T11514] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.559272][T11514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.567185][T11514] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.574404][T11514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.652121][T11514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.672868][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.684717][ T3356] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.697550][ T3356] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.710051][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 250.729961][T11514] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.756757][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.767167][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.776153][ T3356] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.783357][ T3356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.833464][T11514] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.844583][T11514] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.859795][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.869566][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.878614][ T3356] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.885813][ T3356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.894024][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.904803][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.914792][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.924455][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.933948][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.943686][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.953146][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.963096][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.972720][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.982059][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.996576][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.005226][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.037191][T11514] 8021q: adding VLAN 0 to HW filter on device batadv0 17:34:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002c0001070000000000000000fffffff3767075262a15c44446e27d9b5c0ca504030777003def533953ccdda0641aecc328c2fafbefa50615a0e9a2a6a6960b1f8cf1afa73cd25fa304fc11e4d582196f45e7853caf4e1375e05f0a2a22e00a468952caa861cf944ae8d859add2e89c02fd6171c1c54fab6265aed691f3c3aefdb97d9ebcace5c25d81a520448ba2159aad52ec2340badd11a3129bb221e71239e4122fd8e0b3067a6873769ba9d40d57b0af45aed30c646c0590419db0", @ANYRES32, @ANYBLOB="00000000000000000e00000008000100750004000c0002000800040000200000"], 0x38}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x332, 0x0) 17:34:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x81}, 0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="6d616e676c65ebb50000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000045bc00"/72], 0x48) ioctl$int_in(r2, 0x5421, &(0x7f0000000180)=0x7fff) sendto$inet(r2, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000380)="9d", 0x1, 0xfffffffffffffffe, 0x0, 0x0) close(r2) writev(r1, &(0x7f0000000540), 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00@\x00', 0x103}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="6d616e676c65ebb500000000000000000000000000000000000000000000000002000000000000000000010000000000000000000000000000000000000000e25947a48c7a077400"], 0x48) getsockopt$bt_hci(r1, 0x0, 0x1, &(0x7f00000001c0)=""/47, &(0x7f0000000240)=0x2f) ioctl$int_in(r4, 0x5421, &(0x7f0000000180)=0x7fff) sendto$inet(r4, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) r5 = socket(0x0, 0x801, 0x0) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000180)={@rand_addr="da4676b72915a865a84065b01832d497", @empty, @empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r7}) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@rand_addr=0xffffffff, 0x4e23, 0x0, 0x4e23, 0xfffffffffffff464, 0x17, 0x1a0, 0x40, 0x0, r7, r9}, {0x1, 0x5, 0x9, 0xfffffffffffffffc, 0x20, 0xfffffffffffffffb, 0x4, 0x10}, {0x8, 0x6, 0x29a1, 0xfffffffffffffffc}, 0x1, 0x6e6bb4, 0x0, 0x1, 0x1, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0xa, @in6=@empty, 0x3501, 0x3, 0x3, 0x9, 0x3, 0xfffffffffffffffd, 0xffffffffffffffc0}}, 0xe8) [ 251.528056][T11525] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 251.540422][T11526] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 251.637621][T11529] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 251.661395][T11529] device lo entered promiscuous mode 17:34:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x225e4ef8899f3c1, 0x0) 17:34:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1005, 0xa02) read$alg(r0, &(0x7f0000000300)=""/130, 0x82) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)="01dca5055e0bcfe47bf070") dup2(r1, r0) 17:34:26 executing program 0: r0 = memfd_create(&(0x7f0000000040)='/dev/auts\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/l2cap\x00') [ 253.173828][T11540] IPVS: ftp: loaded support on port[0] = 21 17:34:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6964db", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) setsockopt$sock_int(r1, 0x1, 0xb, &(0x7f0000000040)=0x10000000000001b, 0x7b) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = dup(r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0xffff, @remote, 0x100000000}, @in6={0xa, 0x4e21, 0x1ff, @remote, 0x9}, @in6={0xa, 0x4e22, 0x8, @loopback, 0x8c4c}], 0x54) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) getgroups(0x2, &(0x7f0000000100)=[0xee00, 0xffffffffffffffff]) r4 = getuid() lchown(&(0x7f0000000000)='./file0\x00', r4, r3) [ 253.341205][T11540] chnl_net:caif_netlink_parms(): no params data found [ 253.427205][T11540] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.435570][T11540] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.444225][T11540] device bridge_slave_0 entered promiscuous mode [ 253.454607][T11540] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.461833][T11540] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.470601][T11540] device bridge_slave_1 entered promiscuous mode [ 253.503921][T11540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.517389][T11540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.550188][T11540] team0: Port device team_slave_0 added [ 253.559662][T11540] team0: Port device team_slave_1 added 17:34:26 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) getrlimit(0x9, &(0x7f0000000040)) [ 253.636351][T11540] device hsr_slave_0 entered promiscuous mode [ 253.675172][T11540] device hsr_slave_1 entered promiscuous mode [ 253.702656][T11540] debugfs: Directory 'hsr0' with parent '/' already present! 17:34:26 executing program 0: userfaultfd(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000040)=0x10000000000001b, 0x7b) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x1, 0x3}) pipe(&(0x7f0000000440)) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x200) [ 253.747102][T11540] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.754374][T11540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.762239][T11540] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.769508][T11540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.917060][T11540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.940374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.970797][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.983364][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.027725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:34:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x4d0}]}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x10000) [ 254.073290][T11540] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.090858][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.100133][T11558] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.107407][T11558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.196980][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.206404][T11558] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.213644][T11562] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 254.213702][T11558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.240231][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.250273][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.259705][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.268778][T11558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.286766][T11540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.296244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.362274][T11540] 8021q: adding VLAN 0 to HW filter on device batadv0 17:34:27 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffcb66, @my=0x1}, 0x10) bind$vsock_stream(r0, &(0x7f0000000180), 0x10) 17:34:27 executing program 0: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000480)=[{&(0x7f0000000500)="3c12ded276797b77e7e0a99d203fd31872546a9848f4021260459f1c2cb833019c02ec65fbdbd3bfb3be408ec8655dd8881e1ee25fda698120abf0f66811b598e5871f994963820c5cb4c04435e931117181919afd840d9721d63624fd3759708115c36b23044636c854270e9b6d12a5e40379eff49d66eab798485ebea6c6d6241a35f194a9e828af2d1db5d7020e3c83fd7a307815335994413cfe465d48f3a0a3bbf2914b0a", 0xa7}, {&(0x7f0000000100)="be4f5187b5de1ef20418e3a964985682b298343bd9b66d440620108a2150a1a6e1fc74536effa9dbe5ee5166360f4078716ead83a979e892db9a3a22bd2b2c69011c6fa46767a556a7dbe597f955abb89a29a370c4562eca86ada3a57265ddc6d0ceffc3c7b267d2d7d9b795b99c81694666631a83a962416417f7ccbf5862611caee5f71454234e1185486772547b5f6cedf880f51c977c5dfbc4b506cde5160d05811080d0e22379d7e987e002e2fbb9bbc578ed1b80ca61662499677c", 0xbe}, {&(0x7f00000001c0)="e53728ed6fad94b4012f412c0eae74c24b61eba80b1ca69b5cdd54fabae8255583936cff638362c5d2", 0x29}, {&(0x7f0000000200)="5327c9f3a2b2674c12b620a488c154fac1adf074d9ee2170bd3f370df7d109f7eb6fbd37d77a00e44e5c6d2e731b041bad5d9015df5e61127766bdc1ef574c7a2415726dc6529e0b7034e566735758eec80b3c92e2bb31acc5b482", 0x5b}, {&(0x7f0000000280)="0f5e57b141cd66b67d953258dfacfa471191641f3f75b59e483f8da90a965ec04cb5ac8ebcf0f2ea5e3fde6e952b253199b5a459c5d339d5be05ff76c1428f23a7eb0cbcf3f0790d5d74fef74080edc854a58e8f9a66e65ec4ab66c01c9205824c07abf4683bc7627ab7bce2c0f6f05065ffc7e28b98d9fb98915f70ea62aa5a26abc8c24cd4569d6a2a89729af9afdd0301e0cdef038bb1bfc430293b89fb3646d61a65d81bbe954805e4eaa3fb0e3638d0b708e70e298be478be9447ba", 0xbe}, {&(0x7f0000000340)="ec1b97e31571114792f1d303a230fc183fc04096ccd2458ca6c852d65c231181efd346a6eed486253737919bae55983f742a51322844c960da8f6eae15df898bb1830a473ad84004244c686f751716c86b5d166f911fed6c5cb3245df88fa3abaae8e7d1d8a9f078ffadd2af2aa6e9e29c56536fb96446585de9b953847c8c68a9f51cca3380bc7e38ed91525b7cb1e1d31875bd105f1e74c51a549f1b6584c2aa504629c30a57231bda3047ca36aaf5b2e472c5373a8a292d1f8eb99aae850a02803029f1fcf47e41f4a1d4015a77", 0xcf}, {&(0x7f0000000440)="29defaba4eb2bf4dd7831f4116", 0xd}], 0x7, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\\vmnet0mime_type+\x00', 0x0) keyctl$assume_authority(0x10, r0) 17:34:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x608200, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3, 0x9811, r1, 0x0) 17:34:27 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt(r0, 0x1, 0x2, &(0x7f0000000000)=""/106, &(0x7f0000000080)=0x6a) r1 = gettid() r2 = gettid() r3 = syz_open_procfs(0xffffffffffffffff, 0xffffffffffffffff) syz_open_procfs(r2, 0xffffffffffffffff) r4 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000280)={'team0\x00', {0x2, 0x4e24, @multicast2}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r3, &(0x7f00000000c0)="c4f7c56a0a8d0a703132ebab2777a67858e27ca7b2a3b3dec8ba1ca77f620304f16d14812e5f1bfc5ded52d167716269fcaf4ff77f97669ba0fdb0076bf1b6dc411c7703dbc1e4407c9f136fe7c288703dccac0a15c1334f0573225f00b62b6caa85fa5ffd44", &(0x7f0000000140)=""/231}, 0x20) ptrace$setopts(0x4200, r1, 0x5, 0x100000) 17:34:27 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\x8b\xaa\xffIb\x9e\xc1\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) r1 = memfd_create(&(0x7f0000000080)='^\x00', 0x5) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x8, 0x810, r1, 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0xbc, 0x0, &(0x7f0000000000)) 17:34:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="fadba5095e0bcfe47bf070") socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x161d9) write(r1, &(0x7f0000000000)="cb", 0x10067) 17:34:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x5a) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCXONC(r4, 0x540a, 0x5) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x48, &(0x7f00000000c0)={@ipv4={[0x0, 0xfc], [], @local}}, 0x14) 17:34:28 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000001c0)=""/246) read(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xc4a2, 0x101000) syz_usb_connect(0x7, 0x3cc, &(0x7f00000002c0)={{0x12, 0x1, 0x200, 0x73, 0x59, 0xfe, 0x8, 0xfe9, 0xdb98, 0x82a3, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3ba, 0x2, 0xd18, 0x101, 0x20, 0x8, [{{0x9, 0x4, 0xe2, 0x6, 0x2, 0x8b, 0xef, 0x42, 0x4, [@hid_hid={0x9, 0x21, 0x10000, 0x7f, 0x1, {0x22, 0xb1f}}, @hid_hid={0x9, 0x21, 0x401, 0x3, 0x1, {0x22, 0x225}}], [{{0x9, 0x5, 0xf, 0x0, 0x28f, 0xffffffff, 0x8, 0x80000001}}, {{0x9, 0x5, 0x9, 0x15, 0x36b, 0x7, 0x6, 0x4}}]}}, {{0x9, 0x4, 0x7b, 0x4f, 0x3, 0xff, 0x47, 0xd0, 0x1, [@usb_cdc={{0x7, 0x24, 0x6, 0x0, 0x0, "bc81"}, {0x5, 0x24, 0x0, 0x3}, {0xd, 0x24, 0xf, 0x1, 0x7fff, 0x2, 0x7, 0x400}, [@obex={0x5, 0x24, 0x15, 0x7c}, @dmm={0x7, 0x24, 0x14, 0x3, 0x96e5}, @mbim={0xc, 0x24, 0x1b, 0x28, 0x2, 0x9, 0x0, 0xffffffffffffffe1, 0x8}]}, @generic={0x2b, 0xc, "c8214d0e9abc71818d5d46a9e13e859d8a2cfc5fce41689a5cce5a9b43a59ae8999c794b724619693c"}], [{{0x9, 0x5, 0xa, 0x1, 0x309, 0x9, 0x2, 0x6, [@generic={0xf3, 0x31, "33830d5a709f0174d36ab4482de7081165d9830dfd26422ae4d0e58c9a359603c4201d23bbbcf0f8eed8afad3d237fc6d612876e56d4db5e9aeb393163b9534e33c638bbb8ff3efb1714083b0d96f6d881f2bd85d810b0d435c201f568ea50bbbbb6a3dffbf7caf2b93646cf592d246650e7c048c5846c9cec15782b5ef3be9e3a6a8d0cee5926f3b6b0592424dc9f423f74e8fd41011e2453ece198fada4376a0c6361eb2dfd5af9caaa61764c8a5f706d5e42dbca34c9a4be0945d82eaf6b07663823f3234a916ce740bc3f26c408c415fb5ff18c28337472d145576f51acf151011ce0c3cfd30ff0f22bbc5cc829f77"}, @generic={0xf8, 0x31, "0fdc2d1499329b9ccabd757fcfb3d1eee6f73f90c95ff1ef07469cf86d636e5c0a3b5df1facf8a4640012722672be99eb38169fb043c97345817ad1a7104880b0c4899eb258396950c1f0b201d671602d63520b4b3aa251abc52138f15dbefc348ffe6324be977279d0771e2ce4e250a6720d62208a089931940e1a5c021332fa0f3c1c286139ad12e870b6acdf4bcf1601b18e441d38f3a1bfb283654314197bf200733fd366256e5396ebfddb40ddc2889d9c8ca415f452d5e48f3a017553c80e40d8ea4461046ba20bd58dca92ca16ec74f07166bc38c94f14f22b843219ebbe1a6dd3f1f9ea4c985f9bbda71f1eb57259d9e46d0"}]}}, {{0x9, 0x5, 0xe, 0x11, 0x3c2, 0x40, 0x7, 0x0, [@generic={0x3c, 0x21, "d21213e48ab556e68ea3cca536788839e7a6cdb50039a0fad25e43567ca407bafd9b17dc9ae49b599ecaac842e164fc32efd48131953fbdd0021"}, @generic={0xdd, 0x30, "4dad71579ea44db436649d61b019220750a1ffe506da71e3b5f5623ea95256dd9a4c7c9d9421c30053b7e135932c58abc75c15caf40fe448a3be47cf8d89439f297e41b21bfc1afbd03d43ea6a090e72c6b467bbc8ad612d7b6982dc494619b7e7f2aefad50afdf721fd3e7bdf36d74e1406cabadf62de19b1833abcf99545d839be97798a47e0531d2773dece5ff63ab0a532181515bb2e9674f32702bde831acbb6db2c7bc2a8c7c50988b676b1fd027a6497a12be3bad7261faa2213f94350dd8fdc552e34ed7a9f9c37a643b7749f5cdd9b00d55cd5243a7f7"}]}}, {{0x9, 0x5, 0x80, 0x10, 0x36, 0x9, 0x209, 0x9}}]}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f00000006c0)={0xa, 0x6, 0x3b0, 0x1, 0x1, 0x3, 0xff, 0x7}, 0x5, &(0x7f0000000700)={0x5, 0xf, 0x5}, 0x1, [{0x101, &(0x7f0000000740)=@string={0x101, 0x3, "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"}}]}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000180)={0x2, r4}) 17:34:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="fadba5095e0bcfe47bf070") socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x161d9) write(r1, &(0x7f0000000000)="cb", 0x10067) 17:34:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="fadba5095e0bcfe47bf070") socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x161d9) write(r1, &(0x7f0000000000)="cb", 0x10067) [ 255.522771][ T5] usb 1-1: new high-speed USB device number 2 using dummy_hcd 17:34:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="fadba5095e0bcfe47bf070") socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x161d9) write(r1, &(0x7f0000000000)="cb", 0x10067) [ 255.764808][ T5] usb 1-1: Using ep0 maxpacket: 8 17:34:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'veth0_to_bridge\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8937, &(0x7f0000000100)={'bond0\x00', r2}) syz_emit_ethernet(0x7a, &(0x7f0000000200)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0xb, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local={0xac, 0x223}, @loopback, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 255.882690][ T5] usb 1-1: config 24 has an invalid interface number: 226 but max is 1 [ 255.891308][ T5] usb 1-1: config 24 has an invalid interface number: 123 but max is 1 [ 255.899783][ T5] usb 1-1: config 24 has no interface number 0 [ 255.906151][ T5] usb 1-1: config 24 has no interface number 1 [ 255.912702][ T5] usb 1-1: config 24 interface 226 altsetting 6 endpoint 0xF has invalid maxpacket 655, setting to 64 [ 255.923859][ T5] usb 1-1: config 24 interface 123 altsetting 79 endpoint 0xE has an invalid bInterval 64, changing to 7 [ 255.935276][ T5] usb 1-1: config 24 interface 123 altsetting 79 has an invalid endpoint with address 0x80, skipping [ 255.946353][ T5] usb 1-1: config 24 interface 226 has no altsetting 0 [ 255.953652][ T5] usb 1-1: config 24 interface 123 has no altsetting 0 [ 255.995485][ T5] usb 1-1: string descriptor 0 read error: -22 [ 256.002148][ T5] usb 1-1: New USB device found, idVendor=0fe9, idProduct=db98, bcdDevice=82.a3 [ 256.011584][ T5] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 256.068771][ T5] dvb-usb: found a 'DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2)' in warm state. [ 256.078411][ T5] dvb-usb: bulk message failed: -22 (2/-1) [ 256.102689][ T5] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. 17:34:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0xa, 0x300) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4400, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x4, 0x81, 0x74b}, &(0x7f0000000280)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x8001}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000040)=0x3f, 0x4) r3 = semget$private(0x0, 0x8, 0x0) semop(r3, &(0x7f0000000080)=[{}, {0x3, 0xfffffffffffffffd}], 0x2) semop(r3, &(0x7f0000000240)=[{0x3, 0x7fff}], 0xb8) semtimedop(r3, &(0x7f0000000400)=[{0x6, 0x6, 0x1000}, {0x0, 0x6d1, 0x800}], 0x2, &(0x7f0000000100)) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 256.161410][ T5] dvbdev: DVB: registering new adapter (DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2)) [ 256.172019][ T5] usb 1-1: media controller created [ 256.234669][ T5] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 256.292083][ T5] cxusb: set interface failed [ 256.296914][ T5] dvb-usb: bulk message failed: -22 (1/-30592) [ 256.303569][ T5] dvb-usb: bulk message failed: -22 (3/-1) [ 256.332984][ T5] dvb-usb: bulk message failed: -22 (3/-1) [ 256.339306][ T5] dvb-usb: bulk message failed: -22 (7/-1) [ 256.346043][ T5] dvb-usb: bulk message failed: -22 (6/-1) [ 256.352120][ T5] dvb-usb: bulk message failed: -22 (7/-1) [ 256.358185][ T5] dvb-usb: bulk message failed: -22 (6/-1) [ 256.364247][ T5] Unable to enumerate dib7000p [ 256.369205][ T5] dvb-usb: no frontend was attached by 'DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2)' [ 256.413577][ T5] Registered IR keymap rc-dvico-mce [ 256.420080][ T5] rc rc0: DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2) as /devices/platform/dummy_hcd.0/usb1/1-1/rc/rc0 [ 256.433080][ T5] input: DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2) as /devices/platform/dummy_hcd.0/usb1/1-1/rc/rc0/input5 [ 256.482071][ T5] dvb-usb: schedule remote query interval to 100 msecs. [ 256.489152][ T5] dvb-usb: DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2) successfully initialized and connected. [ 256.505695][ T5] dvb-usb: found a 'DViCO FusionHDTV DVB-T Dual Digital 4 (rev 2)' in warm state. [ 256.515234][ T5] dvb-usb: bulk message failed: -22 (2/-1) [ 256.592418][T11558] dvb-usb: bulk message failed: -22 (1/-30592) [ 256.598981][T11558] ================================================================== [ 256.607190][T11558] BUG: KMSAN: uninit-value in cxusb_rc_query+0x2f7/0x360 [ 256.614216][T11558] CPU: 0 PID: 11558 Comm: kworker/0:3 Not tainted 5.3.0-rc7+ #0 [ 256.621833][T11558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.632416][T11558] Workqueue: events dvb_usb_read_remote_control [ 256.638673][T11558] Call Trace: [ 256.642079][T11558] dump_stack+0x191/0x1f0 [ 256.646474][T11558] kmsan_report+0x162/0x2d0 [ 256.651103][T11558] __msan_warning+0x75/0xe0 [ 256.655617][T11558] cxusb_rc_query+0x2f7/0x360 [ 256.660300][T11558] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 256.666107][T11558] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 256.671915][T11558] dvb_usb_read_remote_control+0xf9/0x290 [ 256.677635][T11558] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 256.684240][T11558] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 256.690909][T11558] process_one_work+0x1572/0x1ef0 [ 256.695957][T11558] worker_thread+0x111b/0x2460 [ 256.700770][T11558] kthread+0x4b5/0x4f0 [ 256.704837][T11558] ? process_one_work+0x1ef0/0x1ef0 [ 256.710039][T11558] ? kthread_blkcg+0xf0/0xf0 [ 256.714764][T11558] ret_from_fork+0x35/0x40 [ 256.719183][T11558] [ 256.721503][T11558] Local variable description: ----ircode@cxusb_rc_query [ 256.728422][T11558] Variable was created at: [ 256.732835][T11558] cxusb_rc_query+0x4d/0x360 [ 256.737419][T11558] dvb_usb_read_remote_control+0xf9/0x290 [ 256.743122][T11558] ================================================================== [ 256.751257][T11558] Disabling lock debugging due to kernel taint [ 256.757482][T11558] Kernel panic - not syncing: panic_on_warn set ... [ 256.764069][T11558] CPU: 0 PID: 11558 Comm: kworker/0:3 Tainted: G B 5.3.0-rc7+ #0 [ 256.773165][T11558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.783244][T11558] Workqueue: events dvb_usb_read_remote_control [ 256.789477][T11558] Call Trace: [ 256.792777][T11558] dump_stack+0x191/0x1f0 [ 256.797188][T11558] panic+0x3c9/0xc1e [ 256.801109][T11558] kmsan_report+0x2ca/0x2d0 [ 256.805623][T11558] __msan_warning+0x75/0xe0 [ 256.810131][T11558] cxusb_rc_query+0x2f7/0x360 [ 256.814814][T11558] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 256.820623][T11558] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 256.826430][T11558] dvb_usb_read_remote_control+0xf9/0x290 [ 256.832151][T11558] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 256.838736][T11558] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 256.845448][T11558] process_one_work+0x1572/0x1ef0 [ 256.850495][T11558] worker_thread+0x111b/0x2460 [ 256.855285][T11558] kthread+0x4b5/0x4f0 [ 256.859353][T11558] ? process_one_work+0x1ef0/0x1ef0 [ 256.864557][T11558] ? kthread_blkcg+0xf0/0xf0 [ 256.869383][T11558] ret_from_fork+0x35/0x40 [ 256.875547][T11558] Kernel Offset: disabled [ 256.879876][T11558] Rebooting in 86400 seconds..