[ 64.069592][ T32] audit: type=1800 audit(1559869950.126:25): pid=10660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 64.093025][ T32] audit: type=1800 audit(1559869950.156:26): pid=10660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 64.125972][ T32] audit: type=1800 audit(1559869950.176:27): pid=10660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 64.240748][T10724] cat (10724) used greatest stack depth: 53664 bytes left [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 78.159975][T11022] ================================================================== [ 78.168096][T11022] BUG: KMSAN: uninit-value in _copy_to_user+0x1d6/0x1f0 [ 78.175108][T11022] CPU: 1 PID: 11022 Comm: syz-executor339 Not tainted 5.1.0+ #1 [ 78.182813][T11022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.192957][T11022] Call Trace: [ 78.196255][T11022] dump_stack+0x191/0x1f0 [ 78.200596][T11022] kmsan_report+0x130/0x2a0 [ 78.205089][T11022] __msan_warning+0x75/0xe0 [ 78.209598][T11022] _copy_to_user+0x1d6/0x1f0 [ 78.214214][T11022] __vb2_perform_fileio+0x67b/0x22b0 [ 78.219537][T11022] vb2_read+0xf7/0x110 [ 78.223840][T11022] vb2_fop_read+0x475/0x640 [ 78.228370][T11022] ? vb2_fop_write+0x640/0x640 [ 78.233125][T11022] v4l2_read+0x274/0x4a0 [ 78.237420][T11022] ? video_unregister_device+0x140/0x140 [ 78.243276][T11022] __vfs_read+0x1a5/0xbe0 [ 78.247613][T11022] ? security_file_permission+0x51f/0x6e0 [ 78.253345][T11022] ? rw_verify_area+0x35e/0x580 [ 78.258210][T11022] vfs_read+0x359/0x6f0 [ 78.262382][T11022] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 78.268395][T11022] ksys_read+0x1c5/0x440 [ 78.272646][T11022] __se_sys_read+0x92/0xb0 [ 78.277059][T11022] __x64_sys_read+0x4a/0x70 [ 78.281555][T11022] do_syscall_64+0xbc/0xf0 [ 78.285982][T11022] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 78.292251][T11022] RIP: 0033:0x444f09 [ 78.296125][T11022] Code: e8 ac e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b cd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.315846][T11022] RSP: 002b:00007ffe7c611e78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 78.324339][T11022] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000444f09 [ 78.332454][T11022] RDX: 000000000000004b RSI: 0000000020000280 RDI: 0000000000000003 [ 78.340450][T11022] RBP: 0000000000013139 R08: 0000000000000004 R09: 00000000004002e0 [ 78.348414][T11022] R10: 000000000000000f R11: 0000000000000246 R12: 00000000004020a0 [ 78.356374][T11022] R13: 0000000000402130 R14: 0000000000000000 R15: 0000000000000000 [ 78.364333][T11022] [ 78.366638][T11022] Uninit was created at: [ 78.370910][T11022] kmsan_internal_poison_shadow+0x92/0x150 [ 78.376711][T11022] kmsan_kmalloc+0xa4/0x130 [ 78.381209][T11022] kmsan_slab_alloc+0xe/0x10 [ 78.385807][T11022] __kmalloc_node_track_caller+0xcba/0xf30 [ 78.391617][T11022] __alloc_skb+0x306/0xa10 [ 78.396022][T11022] sk_stream_alloc_skb+0x175/0xca0 [ 78.401220][T11022] tcp_sendmsg_locked+0x2a48/0x6c30 [ 78.406408][T11022] tcp_sendmsg+0xb2/0x100 [ 78.410735][T11022] inet_sendmsg+0x546/0x720 [ 78.415232][T11022] sock_write_iter+0x3f3/0x4e0 [ 78.419991][T11022] __vfs_write+0x95a/0xc10 [ 78.424388][T11022] vfs_write+0x481/0x920 [ 78.428734][T11022] ksys_write+0x1c5/0x440 [ 78.433054][T11022] __se_sys_write+0x92/0xb0 [ 78.437535][T11022] __x64_sys_write+0x4a/0x70 [ 78.442106][T11022] do_syscall_64+0xbc/0xf0 [ 78.446694][T11022] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 78.452685][T11022] ================================================================== [ 78.460740][T11022] Disabling lock debugging due to kernel taint [ 78.466884][T11022] Kernel panic - not syncing: panic_on_warn set ... [ 78.473477][T11022] CPU: 1 PID: 11022 Comm: syz-executor339 Tainted: G B 5.1.0+ #1 [ 78.482478][T11022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.492541][T11022] Call Trace: [ 78.495834][T11022] dump_stack+0x191/0x1f0 [ 78.500168][T11022] panic+0x3ca/0xafe [ 78.504198][T11022] kmsan_report+0x298/0x2a0 [ 78.508740][T11022] __msan_warning+0x75/0xe0 [ 78.513257][T11022] _copy_to_user+0x1d6/0x1f0 [ 78.517867][T11022] __vb2_perform_fileio+0x67b/0x22b0 [ 78.523191][T11022] vb2_read+0xf7/0x110 [ 78.527267][T11022] vb2_fop_read+0x475/0x640 [ 78.531843][T11022] ? vb2_fop_write+0x640/0x640 [ 78.536618][T11022] v4l2_read+0x274/0x4a0 [ 78.540869][T11022] ? video_unregister_device+0x140/0x140 [ 78.546494][T11022] __vfs_read+0x1a5/0xbe0 [ 78.550826][T11022] ? security_file_permission+0x51f/0x6e0 [ 78.556544][T11022] ? rw_verify_area+0x35e/0x580 [ 78.561385][T11022] vfs_read+0x359/0x6f0 [ 78.565550][T11022] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 78.571440][T11022] ksys_read+0x1c5/0x440 [ 78.575769][T11022] __se_sys_read+0x92/0xb0 [ 78.580190][T11022] __x64_sys_read+0x4a/0x70 [ 78.584719][T11022] do_syscall_64+0xbc/0xf0 [ 78.589132][T11022] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 78.595018][T11022] RIP: 0033:0x444f09 [ 78.598923][T11022] Code: e8 ac e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b cd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.618527][T11022] RSP: 002b:00007ffe7c611e78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 78.627068][T11022] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000444f09 [ 78.635024][T11022] RDX: 000000000000004b RSI: 0000000020000280 RDI: 0000000000000003 [ 78.642996][T11022] RBP: 0000000000013139 R08: 0000000000000004 R09: 00000000004002e0 [ 78.651089][T11022] R10: 000000000000000f R11: 0000000000000246 R12: 00000000004020a0 [ 78.659058][T11022] R13: 0000000000402130 R14: 0000000000000000 R15: 0000000000000000 [ 78.668391][T11022] Kernel Offset: disabled [ 78.673864][T11022] Rebooting in 86400 seconds..