[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 88.244808][ T30] audit: type=1800 audit(1565310095.295:25): pid=12985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 88.282638][ T30] audit: type=1800 audit(1565310095.315:26): pid=12985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 88.303004][ T30] audit: type=1800 audit(1565310095.325:27): pid=12985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.219' (ECDSA) to the list of known hosts. 2019/08/09 00:21:50 fuzzer started 2019/08/09 00:21:55 dialing manager at 10.128.0.26:33023 2019/08/09 00:21:56 syscalls: 2372 2019/08/09 00:21:56 code coverage: enabled 2019/08/09 00:21:56 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/08/09 00:21:56 extra coverage: enabled 2019/08/09 00:21:56 setuid sandbox: enabled 2019/08/09 00:21:56 namespace sandbox: enabled 2019/08/09 00:21:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/09 00:21:56 fault injection: enabled 2019/08/09 00:21:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/09 00:21:56 net packet injection: enabled 2019/08/09 00:21:56 net device setup: enabled 00:24:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth0\x00', 0x8000000000001011}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2}, 0x14) syzkaller login: [ 250.828712][T13149] IPVS: ftp: loaded support on port[0] = 21 [ 250.970368][T13149] chnl_net:caif_netlink_parms(): no params data found [ 251.027990][T13149] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.035352][T13149] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.044177][T13149] device bridge_slave_0 entered promiscuous mode [ 251.053957][T13149] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.061150][T13149] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.069937][T13149] device bridge_slave_1 entered promiscuous mode [ 251.102366][T13149] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.115364][T13149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.151113][T13149] team0: Port device team_slave_0 added [ 251.160391][T13149] team0: Port device team_slave_1 added [ 251.328493][T13149] device hsr_slave_0 entered promiscuous mode [ 251.373292][T13149] device hsr_slave_1 entered promiscuous mode [ 251.641406][T13149] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.648680][T13149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.656504][T13149] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.663731][T13149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.743250][T13149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.763498][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.774585][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.793286][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.805312][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 251.825694][T13149] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.842164][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.852204][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.859945][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.897489][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.906735][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.913978][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.924888][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.935739][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.957437][ T3332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.967290][ T3332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.976904][ T3332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.986085][ T3332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.003574][T13149] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.016386][T13149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.043341][ T3332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.052668][ T3332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.069262][T13149] 8021q: adding VLAN 0 to HW filter on device batadv0 00:24:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) 00:24:19 executing program 0: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000580)=0x7, 0x12) r5 = openat$cgroup_ro(r1, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r4}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x45, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100000000}, 0xe}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0xfffffffffffffffe, 0x70, 0x3e2, 0x0, 0x20000001, 0x0, 0x0, 0x0, 0xa8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3a65, 0xfffffffffffffff7, 0x0, 0x0, 0xb4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x81, 0x200, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0x33b1, 0x3e}, r8, 0x802003, 0xffffffffffffffff, 0x8) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000640)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x6849) close(r6) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r4, r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x20}, 0x3c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r10) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000240)=0x3, 0xffffffffffffff85) close(r11) 00:24:19 executing program 0: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000580)=0x7, 0x12) r5 = openat$cgroup_ro(r1, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r4}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x45, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100000000}, 0xe}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0xfffffffffffffffe, 0x70, 0x3e2, 0x0, 0x20000001, 0x0, 0x0, 0x0, 0xa8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3a65, 0xfffffffffffffff7, 0x0, 0x0, 0xb4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x81, 0x200, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0x33b1, 0x3e}, r8, 0x802003, 0xffffffffffffffff, 0x8) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000640)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x6849) close(r6) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r4, r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x20}, 0x3c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r10) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000240)=0x3, 0xffffffffffffff85) close(r11) 00:24:19 executing program 0: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000580)=0x7, 0x12) r5 = openat$cgroup_ro(r1, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r4}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x45, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100000000}, 0xe}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0xfffffffffffffffe, 0x70, 0x3e2, 0x0, 0x20000001, 0x0, 0x0, 0x0, 0xa8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3a65, 0xfffffffffffffff7, 0x0, 0x0, 0xb4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x81, 0x200, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0x33b1, 0x3e}, r8, 0x802003, 0xffffffffffffffff, 0x8) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000640)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x6849) close(r6) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r4, r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x20}, 0x3c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r10) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000240)=0x3, 0xffffffffffffff85) close(r11) 00:24:19 executing program 0: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000580)=0x7, 0x12) r5 = openat$cgroup_ro(r1, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r4}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x45, &(0x7f0000000b80)=ANY=[@ANYBLOB="7ba8f8c81ba657e37300000000000000f4de344dd93d3035cd88c75cb3ef0892e6313fe283071a37ce106bb1cf7fc30c9c8bda2ef9cd886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d300191114521f676a080000000000000072c2c72dbb079ee600b4835d6c99d4525ccde1fc9530490892fcee89cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a717032d7807ed0080000000000000eb9730c922273dfcfbb18331e4df2fbdac4009693c90ef194eea212e5f951c00d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a16e508a3147a52217432ba40a45004593122e44fc7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfea7a4d866019f8b11dcccc4d71cf8cc951ac2d714766433dc5ed3d7ebf77dc6a44bab64308975b8d10ed945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50ba35a590f1856f82c083eb795030906b269539512e51084796546c49843fab0817d3a40e776b41c2256f2d76d8ce84c66c6739b1f4664f763db7f0000000007b33d6b9766b1c3aeac6419ff48767117e3f2bb7951bb45c300a923cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c691a33cf8157babfc9ea7d2a4a2a1d279536d0cea0e8b081714f"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x100000000}, 0xe}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0xfffffffffffffffe, 0x70, 0x3e2, 0x0, 0x20000001, 0x0, 0x0, 0x0, 0xa8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3a65, 0xfffffffffffffff7, 0x0, 0x0, 0xb4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x81, 0x200, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0x33b1, 0x3e}, r8, 0x802003, 0xffffffffffffffff, 0x8) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000640)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x6849) close(r6) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r4, r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x20}, 0x3c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r10) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000240)=0x3, 0xffffffffffffff85) close(r11) 00:24:20 executing program 0: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3c, 0x81, 0x57, 0x40, 0x1b80, 0xe755, 0x1e97, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x61, 0x0, 0x1, 0x1b, 0xd5, 0xc6, 0x0, [], [{{0x7, 0x5, 0x83, 0xe0d5d1e99ce80e0d}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000380)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000900)={0xac, &(0x7f00000003c0)={0x0, 0x0, 0x1, "da"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 253.313152][ T3332] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 253.672865][ T3332] usb 1-1: config 0 has an invalid interface number: 97 but max is 0 [ 253.681122][ T3332] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 253.691454][ T3332] usb 1-1: config 0 has no interface number 0 [ 253.697692][ T3332] usb 1-1: config 0 interface 97 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 253.708804][ T3332] usb 1-1: New USB device found, idVendor=1b80, idProduct=e755, bcdDevice=1e.97 [ 253.718003][ T3332] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 253.730082][ T3332] usb 1-1: config 0 descriptor?? [ 253.778253][ T3332] em28xx 1-1:0.97: New device @ 480 Mbps (1b80:e755, interface 97, class 97) [ 253.787472][ T3332] em28xx 1-1:0.97: Audio interface 97 found (Vendor Class) [ 254.024285][T13177] ================================================================== [ 254.026058][ T3332] em28xx 1-1:0.97: unknown em28xx chip ID (0) [ 254.032554][T13177] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x16b/0x1f0 [ 254.045696][T13177] CPU: 1 PID: 13177 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 254.053751][T13177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.054921][ T3332] em28xx 1-1:0.97: Config register raw data: 0xfffffffb [ 254.063887][T13177] Call Trace: [ 254.064011][T13177] dump_stack+0x191/0x1f0 [ 254.064094][T13177] kmsan_report+0x162/0x2d0 [ 254.083080][T13177] kmsan_internal_check_memory+0x7be/0x8d0 [ 254.088894][T13177] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 254.094119][ T3332] em28xx 1-1:0.97: AC97 chip type couldn't be determined [ 254.094951][T13177] ? wait_for_common+0x6f9/0x8d0 [ 254.102012][ T3332] em28xx 1-1:0.97: No AC97 audio processor [ 254.106950][T13177] kmsan_copy_to_user+0xa9/0xb0 [ 254.106969][T13177] _copy_to_user+0x16b/0x1f0 00:24:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200001000000013, &(0x7f0000000080)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xff2c) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 254.107086][T13177] fuzzer_ioctl+0x511f/0x5690 [ 254.107122][T13177] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 254.107141][T13177] ? next_event+0x6a0/0x6a0 [ 254.107200][T13177] full_proxy_unlocked_ioctl+0x1ca/0x380 [ 254.107227][T13177] ? full_proxy_poll+0x320/0x320 [ 254.107267][T13177] do_vfs_ioctl+0xea8/0x2c50 [ 254.107338][T13177] ? security_file_ioctl+0x1bd/0x200 [ 254.107360][T13177] __se_sys_ioctl+0x1da/0x270 [ 254.107382][T13177] __x64_sys_ioctl+0x4a/0x70 [ 254.107421][T13177] do_syscall_64+0xbc/0xf0 [ 254.107442][T13177] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 254.107475][T13177] RIP: 0033:0x459697 [ 254.182265][T13177] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.202056][T13177] RSP: 002b:00007f9a90be33e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 254.210483][T13177] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459697 [ 254.218465][T13177] RDX: 00007f9a90be3420 RSI: 00000000c0085504 RDI: 0000000000000003 [ 254.226439][T13177] RBP: 0000000000000040 R08: 0000000000000000 R09: 000000000000000f [ 254.234401][T13177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a90be46d4 [ 254.242379][T13177] R13: 00000000004bee86 R14: 00000000004dfe70 R15: 00000000ffffffff [ 254.250434][T13177] [ 254.252746][T13177] Uninit was created at: [ 254.256986][T13177] kmsan_internal_poison_shadow+0x53/0xa0 [ 254.262707][T13177] kmsan_slab_alloc+0xaa/0x120 [ 254.267515][T13177] __kmalloc+0x28e/0x430 [ 254.271747][T13177] fuzzer_ioctl+0x2b09/0x5690 [ 254.276436][T13177] full_proxy_unlocked_ioctl+0x1ca/0x380 [ 254.282071][T13177] do_vfs_ioctl+0xea8/0x2c50 [ 254.286650][T13177] __se_sys_ioctl+0x1da/0x270 [ 254.291315][T13177] __x64_sys_ioctl+0x4a/0x70 [ 254.295899][T13177] do_syscall_64+0xbc/0xf0 [ 254.300308][T13177] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 254.306183][T13177] [ 254.308497][T13177] Byte 0 of 1 is uninitialized [ 254.313246][T13177] Memory access of size 1 starts at ffff888124764578 [ 254.319900][T13177] Data copied to user address 00007f9a90be3428 [ 254.326040][T13177] ================================================================== [ 254.334090][T13177] Disabling lock debugging due to kernel taint [ 254.340315][T13177] Kernel panic - not syncing: panic_on_warn set ... [ 254.346916][T13177] CPU: 1 PID: 13177 Comm: syz-executor.0 Tainted: G B 5.3.0-rc3+ #17 [ 254.356266][T13177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.366399][T13177] Call Trace: [ 254.369691][T13177] dump_stack+0x191/0x1f0 [ 254.374107][T13177] panic+0x3c9/0xc1e [ 254.378015][T13177] kmsan_report+0x2ca/0x2d0 [ 254.382522][T13177] kmsan_internal_check_memory+0x7be/0x8d0 [ 254.388324][T13177] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 254.394313][T13177] ? wait_for_common+0x6f9/0x8d0 [ 254.399265][T13177] kmsan_copy_to_user+0xa9/0xb0 [ 254.404107][T13177] _copy_to_user+0x16b/0x1f0 [ 254.408712][T13177] fuzzer_ioctl+0x511f/0x5690 [ 254.413390][T13177] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 254.419396][T13177] ? next_event+0x6a0/0x6a0 [ 254.423898][T13177] full_proxy_unlocked_ioctl+0x1ca/0x380 [ 254.429538][T13177] ? full_proxy_poll+0x320/0x320 [ 254.434469][T13177] do_vfs_ioctl+0xea8/0x2c50 [ 254.439167][T13177] ? security_file_ioctl+0x1bd/0x200 [ 254.444455][T13177] __se_sys_ioctl+0x1da/0x270 [ 254.449145][T13177] __x64_sys_ioctl+0x4a/0x70 [ 254.453732][T13177] do_syscall_64+0xbc/0xf0 [ 254.458159][T13177] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 254.464050][T13177] RIP: 0033:0x459697 [ 254.467944][T13177] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.487539][T13177] RSP: 002b:00007f9a90be33e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 254.495962][T13177] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000459697 [ 254.504014][T13177] RDX: 00007f9a90be3420 RSI: 00000000c0085504 RDI: 0000000000000003 [ 254.511992][T13177] RBP: 0000000000000040 R08: 0000000000000000 R09: 000000000000000f [ 254.519952][T13177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a90be46d4 [ 254.527919][T13177] R13: 00000000004bee86 R14: 00000000004dfe70 R15: 00000000ffffffff [ 254.538329][T13177] Kernel Offset: disabled [ 254.542714][T13177] Rebooting in 86400 seconds..