device bridge_slave_1 entered promiscuous mode L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready IPVS: ftp: loaded support on port[0] = 21 ================================================================== BUG: KMSAN: uninit-value in vmap_pte_range mm/vmalloc.c:153 [inline] BUG: KMSAN: uninit-value in vmap_pmd_range mm/vmalloc.c:172 [inline] BUG: KMSAN: uninit-value in vmap_pud_range mm/vmalloc.c:189 [inline] BUG: KMSAN: uninit-value in vmap_p4d_range mm/vmalloc.c:206 [inline] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 mm/vmalloc.c:231 CPU: 0 PID: 7086 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x306/0x460 lib/dump_stack.c:113 kmsan_report+0x1a2/0x2e0 mm/kmsan/kmsan.c:917 __msan_warning+0x7c/0xe0 mm/kmsan/kmsan_instr.c:500 vmap_pte_range mm/vmalloc.c:153 [inline] vmap_pmd_range mm/vmalloc.c:172 [inline] vmap_pud_range mm/vmalloc.c:189 [inline] vmap_p4d_range mm/vmalloc.c:206 [inline] vmap_page_range_noflush+0x975/0xed0 mm/vmalloc.c:231 vmap_page_range mm/vmalloc.c:244 [inline] map_vm_area+0x17d/0x1f0 mm/vmalloc.c:1344 kmsan_vmap+0xf2/0x180 mm/kmsan/kmsan_hooks.c:250 vmap+0x3a1/0x510 mm/vmalloc.c:1648 relay_alloc_buf kernel/relay.c:141 [inline] relay_create_buf kernel/relay.c:177 [inline] relay_open_buf+0x81e/0x19d0 kernel/relay.c:450 relay_open+0xabb/0x1370 kernel/relay.c:597 do_blk_trace_setup+0xaf7/0x1780 kernel/trace/blktrace.c:532 __blk_trace_setup+0x20b/0x380 kernel/trace/blktrace.c:577 blk_trace_setup+0xfb/0x140 kernel/trace/blktrace.c:595 sg_ioctl+0x10ff/0x58b0 drivers/scsi/sg.c:1117 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0xcf3/0x2810 fs/ioctl.c:687 ksys_ioctl fs/ioctl.c:702 [inline] __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl+0x1da/0x270 fs/ioctl.c:707 __x64_sys_ioctl+0x4a/0x70 fs/ioctl.c:707 do_syscall_64+0xbe/0x100 arch/x86/entry/common.c:291 entry_SYSCALL_64_after_hwframe+0x63/0xe7 RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd1b15c5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 000000000000000c RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1b15c66d4 R13: 00000000004be9e3 R14: 00000000004ce6e0 R15: 00000000ffffffff Uninit was created at: kmsan_save_stack_with_flags mm/kmsan/kmsan.c:255 [inline] kmsan_internal_poison_shadow+0xc8/0x1d0 mm/kmsan/kmsan.c:180 kmsan_kmalloc+0xa4/0x120 mm/kmsan/kmsan_hooks.c:104 __kmalloc+0x14b/0x440 mm/slub.c:3789 kmalloc include/linux/slab.h:518 [inline] kmsan_vmap+0x9b/0x180 mm/kmsan/kmsan_hooks.c:239 vmap+0x3a1/0x510 mm/vmalloc.c:1648 relay_alloc_buf kernel/relay.c:141 [inline] relay_create_buf kernel/relay.c:177 [inline] relay_open_buf+0x81e/0x19d0 kernel/relay.c:450 relay_open+0xabb/0x1370 kernel/relay.c:597 do_blk_trace_setup+0xaf7/0x1780 kernel/trace/blktrace.c:532 __blk_trace_setup+0x20b/0x380 kernel/trace/blktrace.c:577 blk_trace_setup+0xfb/0x140 kernel/trace/blktrace.c:595 sg_ioctl+0x10ff/0x58b0 drivers/scsi/sg.c:1117 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0xcf3/0x2810 fs/ioctl.c:687 ksys_ioctl fs/ioctl.c:702 [inline] __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl+0x1da/0x270 fs/ioctl.c:707 __x64_sys_ioctl+0x4a/0x70 fs/ioctl.c:707 do_syscall_64+0xbe/0x100 arch/x86/entry/common.c:291 entry_SYSCALL_64_after_hwframe+0x63/0xe7 ================================================================== IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready