[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 30.281651] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 35.249552] random: sshd: uninitialized urandom read (32 bytes read) [ 35.835498] random: sshd: uninitialized urandom read (32 bytes read) [ 37.226297] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.39' (ECDSA) to the list of known hosts. [ 42.716520] random: sshd: uninitialized urandom read (32 bytes read) 2018/06/13 09:03:33 fuzzer started [ 44.256843] random: cc1: uninitialized urandom read (8 bytes read) 2018/06/13 09:03:36 dialing manager at 10.128.0.26:37601 2018/06/13 09:03:41 syscalls: 1643 2018/06/13 09:03:41 code coverage: enabled 2018/06/13 09:03:41 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: errno 524 2018/06/13 09:03:41 setuid sandbox: enabled 2018/06/13 09:03:41 namespace sandbox: enabled 2018/06/13 09:03:41 fault injection: enabled 2018/06/13 09:03:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/06/13 09:03:41 net packed injection: enabled 09:03:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xfffffffffffffffd, 0x44, 0x7f, @buffer={0x0, 0x84, &(0x7f0000000040)=""/132}, &(0x7f0000000100)="323c5572edc8e35f2f867e06dc4c8f8fed5d2188267771d99617f30816e5c3512e21201d743f967141eaf26e9573a691a46d769f4938d8e68cf76619c71387d8f791b2bc", &(0x7f0000000180), 0x200, 0x10022, 0x0, &(0x7f00000001c0)}) ioctl$TCFLSH(r0, 0x540b, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000280), 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x20801, 0x0) accept$unix(r1, 0x0, &(0x7f0000000300)) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xff, 0x7, 0x200, 0x1, 0x2, 0x6, 0x401, 0x387, 0x40, 0x1cb, 0x3f, 0x5, 0x38, 0x1, 0x81, 0xb1e5, 0x9}, [{0x6474e551, 0x5, 0x2, 0x4, 0x0, 0xffff, 0x7, 0x997}, {0x3, 0x3, 0x8000000, 0x0, 0x80, 0x0, 0x9, 0x1000}], "6a20535940b6652982ed09e528ad4d797d051f52aadb2a050b9e43ad21e29ea294b014aeb80d34582f7566e8d66880948b25a232e299fc8267ef7e76f9859a17b1ca51e5e77c3c91c7e2f4cc76cbebe1700d2b2d022588cba474b4a1993c79a886940e26f6cf1a0192b995ccbec55ab81b5f8a73a16f843a48b911cbf54e8089114e2d377f14", [[], [], []]}, 0x436) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000007c0)={&(0x7f0000000780)=[0x0], 0x1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000800)='/dev/audio\x00', 0x0, 0x0) r3 = openat(r0, &(0x7f0000000840)='./file0\x00', 0x200800, 0x55) close(r0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000880)=0xfffffffffffffffe) r4 = accept4$inet(r0, &(0x7f00000008c0)={0x0, 0x0, @local}, &(0x7f0000000900)=0x10, 0x80800) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000940)) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000009c0)={'veth1\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) mkdirat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x1ff) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000a40)=0x569, 0x1) signalfd4(r5, &(0x7f0000000a80)={0x1f}, 0x8, 0x800) read(r1, &(0x7f0000000ac0)=""/255, 0xff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@remote, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000cc0)=0xe8) socket$key(0xf, 0x3, 0x2) r6 = creat(&(0x7f0000000d00)='./file0\x00', 0x1) clock_gettime(0x0, &(0x7f0000000d40)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r6, 0xc0385720, &(0x7f0000000d80)={0x0, {r7, r8+30000000}, 0x3ff, 0x10000}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000e00)={0x1, &(0x7f0000000dc0)=[{}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000e40)={0x0, 0x20}, &(0x7f0000000e80)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000ec0)={r9, @in={{0x2, 0x4e23, @rand_addr=0x2}}, 0x66, 0x8, 0x0, 0x20, 0x3}, &(0x7f0000000f80)=0x98) 09:03:47 executing program 2: r0 = dup(0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x12) io_setup(0xe7, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x3f, r0, &(0x7f0000000100)="b792d448f2787911a8d9ff7524a476871dd2276691077094880032238448b6a0d8d39993492de9cf332044b2b6", 0x2d, 0x2, 0x0, 0x1, r0}, &(0x7f0000000180)) recvfrom$ax25(r0, &(0x7f00000001c0)=""/64, 0x40, 0x100, &(0x7f0000000200)={0x3, {"d9ceb5d35acf7a"}, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000240), &(0x7f0000000280)=0x4) bind$rds(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8002000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x400, 0x70bd27, 0x25dfdbfb, {0x7}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6571}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x28}, 0x1}, 0x20040041) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000480)=0x1, 0x4) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) listen$netrom(r0, 0x923a) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000540)=""/213) r5 = geteuid() setfsuid(r5) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[0x80000000]}) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000006c0)=""/81) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dsp\x00', 0x200080, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f0000000780)={@broadcast=0xffffffff, @multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc) bind$bt_l2cap(r0, &(0x7f00000007c0)={0x1f, 0x6, {0x40, 0x80000000, 0x7, 0xffffffffffffff00, 0xfff, 0x7f}, 0x101, 0x6}, 0xe) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000800)=@sack_info={0x0, 0x20000000000, 0x1}, &(0x7f0000000840)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000880)={r7, 0x15, "35410880c5cd7f8b2cfab3e95d5fcf16ee4842a6ca"}, &(0x7f00000008c0)=0x1d) r8 = shmget$private(0x0, 0x1000, 0x408, &(0x7f0000ffc000/0x1000)=nil) r9 = getegid() lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f00000009c0)=0x0) r12 = getpgid(0x0) shmctl$IPC_SET(r8, 0x1, &(0x7f0000000a00)={{0x7, r5, r9, r5, r10, 0x84, 0x1}, 0x7, 0x9, 0x1e12, 0x100000001, r11, r12, 0x400}) [ 56.855405] Not allocated shadow for addr ffff8801d34bc000 (page ffffea000af3c680) [ 56.863170] Attempted to access 182 bytes [ 56.867355] ------------[ cut here ]------------ [ 56.872106] kernel BUG at mm/kmsan/kmsan.c:1378! [ 56.876872] invalid opcode: 0000 [#1] SMP PTI [ 56.881363] Dumping ftrace buffer: [ 56.884895] (ftrace buffer empty) [ 56.888596] Modules linked in: [ 56.891789] CPU: 1 PID: 4490 Comm: sshd Not tainted 4.17.0+ #6 [ 56.897754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.907124] RIP: 0010:kmsan_get_shadow_address+0x1ce/0x1f0 [ 56.912751] RSP: 0018:ffff88019640e6f0 EFLAGS: 00010082 [ 56.918106] RAX: 000000000000001d RBX: 0000000000000740 RCX: 0000000000000000 [ 56.925371] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 56.932633] RBP: ffff88019640e708 R08: 0000000000000000 R09: 0000000000000001 [ 56.939897] R10: 0000000000000000 R11: ffffffff86575770 R12: ffff8801d34bc000 [ 56.947166] R13: 00000000000000b6 R14: 0000000000000001 R15: 00000000000000b6 [ 56.954445] FS: 00007fa6453d37c0(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 56.962663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 56.968537] CR2: 0000563ef37b6000 CR3: 000000019c9de000 CR4: 00000000001406e0 [ 56.975807] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 56.983068] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 56.990327] Call Trace: [ 56.992917] kmsan_internal_unpoison_shadow+0x5c/0xe0 [ 56.998109] kmsan_unpoison_shadow+0x66/0xb0 [ 57.002518] virtqueue_get_buf_ctx+0x73f/0xa20 [ 57.007103] virtqueue_get_buf+0x72/0x90 [ 57.011164] start_xmit+0x293/0x29c0 [ 57.014881] ? packet_rcv+0x2210/0x2210 [ 57.018860] ? virtnet_close+0x2c0/0x2c0 [ 57.022925] dev_hard_start_xmit+0x5f6/0xc80 [ 57.027344] sch_direct_xmit+0x578/0x8f0 [ 57.031408] __qdisc_run+0x1822/0x3730 [ 57.035310] __dev_queue_xmit+0x2069/0x3540 [ 57.038076] IPVS: ftp: loaded support on port[0] = 21 [ 57.039649] dev_queue_xmit+0x4b/0x60 [ 57.039662] ip_finish_output2+0x12a8/0x1480 [ 57.039685] ip_finish_output+0xcbc/0x1000 [ 57.057378] ip_output+0x505/0x5d0 [ 57.060920] ? ip_mc_finish_output+0x3b0/0x3b0 [ 57.065504] ? ip_finish_output+0x1000/0x1000 [ 57.069999] ip_queue_xmit+0x1b0f/0x1d00 [ 57.074066] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 57.079515] ? __skb_clone+0x6ec/0x990 [ 57.083408] ? ip_output+0x5d0/0x5d0 [ 57.087124] tcp_transmit_skb+0x3db5/0x5350 [ 57.091455] tcp_write_xmit+0x2d81/0xb200 [ 57.095627] __tcp_push_pending_frames+0x124/0x400 [ 57.100577] tcp_push+0x803/0x8f0 [ 57.104040] tcp_sendmsg_locked+0x4eb1/0x6610 [ 57.108558] tcp_sendmsg+0xb2/0x100 [ 57.112197] ? tcp_sendmsg_locked+0x6610/0x6610 [ 57.116870] inet_sendmsg+0x3fc/0x760 [ 57.120670] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 57.126042] ? inet_getname+0x4a0/0x4a0 [ 57.130015] sock_write_iter+0x3bc/0x470 [ 57.134078] ? sock_read_iter+0x480/0x480 [ 57.138225] __vfs_write+0x808/0x9f0 [ 57.141942] vfs_write+0x467/0x8c0 [ 57.145482] __x64_sys_write+0x1bf/0x3e0 [ 57.149541] ? ksys_write+0x360/0x360 [ 57.153347] do_syscall_64+0x15b/0x230 [ 57.157239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.162424] RIP: 0033:0x7fa64376e370 [ 57.166128] RSP: 002b:00007ffdf44fefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 57.173838] RAX: ffffffffffffffda RBX: 00000000000033e8 RCX: 00007fa64376e370 [ 57.181101] RDX: 00000000000033e8 RSI: 0000563ef37b3220 RDI: 0000000000000003 [ 57.188372] RBP: 0000563ef37b3220 R08: 0000000000000001 R09: 0101010101010101 [ 57.195639] R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffdf44ff04c [ 57.202902] R13: 0000563ef2ec5fb4 R14: 0000000000000028 R15: 0000563ef2ec7ca0 [ 57.210170] Code: 75 29 48 c7 c7 59 38 97 8a 31 c0 e8 fd 4c 80 ff 80 3c 25 f8 93 53 8b 00 75 11 48 c7 c7 89 38 97 8a 31 c0 4c 89 fe e8 e2 4c 80 ff <0f> 0b eb fe 48 3d ff ff ff 1f 0f 87 a2 fe ff ff 48 8b 1c 25 10 [ 57.229371] RIP: kmsan_get_shadow_address+0x1ce/0x1f0 RSP: ffff88019640e6f0 [ 57.236477] ---[ end trace 81ef41f356011566 ]--- [ 57.242094] Kernel panic - not syncing: Fatal exception in interrupt [ 57.249043] Dumping ftrace buffer: [ 57.252596] (ftrace buffer empty) [ 57.256291] Kernel Offset: disabled [ 57.259895] Rebooting in 86400 seconds..