INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.45' (ECDSA) to the list of known hosts. 2018/04/10 01:31:32 fuzzer started 2018/04/10 01:31:32 dialing manager at 10.128.0.26:36427 2018/04/10 01:31:38 kcov=true, comps=false 2018/04/10 01:31:41 executing program 0: 2018/04/10 01:31:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)=@bridge_getlink={0x2c, 0x12, 0x123, 0x0, 0x0, {0x7}, [@IFLA_VFINFO_LIST={0x4, 0x16}, @IFLA_LINK={0x8, 0x5}]}, 0x2c}, 0x1}, 0x0) 2018/04/10 01:31:41 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r0, &(0x7f00009f1000), 0x0, 0x0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/10 01:31:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f00000005c0)="9a", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/10 01:31:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="f3c9b1e1fe85c3cd4be4a2d556b26e42bf250a8420bbdd900eb3cd37fd2492fadea581fef7d382447c418ac60d78922c49fc8e2d2202108f1f30061e53e3b830518076d72e342bdb49e7a0b93056c12dd8340c41f10521129e285b10e579b04385fa0df52202cf54c61f09634f13823a8e222cd00051639d07d593f655a96b78eea02f241318f991d9b595b1ec90d20e55bbb858f2fcfb372c18fcc46019e8a53667def5d31795e75df968ab84631487ea6a27ab2f56409f8cd7b0f52f44f44b133c9ad1112ea007a673d0d343310360694180dab87b63966e48", 0xda, 0xffffffffffffff1e}], 0x400, &(0x7f00000002c0)=ANY=[]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$TUNSETLINK(r2, 0x400454cd, 0xffff) r3 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x80, 0x80800) sendmmsg(r3, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/10 01:31:41 executing program 6: 2018/04/10 01:31:41 executing program 2: 2018/04/10 01:31:41 executing program 3: syzkaller login: [ 41.768937] ip (3774) used greatest stack depth: 54408 bytes left [ 41.928778] ip (3789) used greatest stack depth: 54312 bytes left [ 43.098826] ip (3901) used greatest stack depth: 54200 bytes left [ 43.747829] ip (3959) used greatest stack depth: 54160 bytes left [ 44.938159] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.003421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.184391] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.206815] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.230823] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.335964] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.345426] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.447959] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.544078] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.885842] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.896100] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.999787] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.183203] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.242524] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.255347] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.268603] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.274786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.288081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.359213] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.626881] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.633183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.644563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.684868] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.691184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.708995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.762197] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.768616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.777167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.998887] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.005222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.019847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.049810] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.056112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.069768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.110506] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.119246] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.125440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.133521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.157919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.170622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.152227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/10 01:31:58 executing program 0: clone(0x200, &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r2, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x2ae) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000002140)={0x0, 0x0, 0x0, 0xfffffffffffffffa}, &(0x7f0000002180)=0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000004d00)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000004640)=0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000004780), &(0x7f00000047c0)=0x8) r3 = syz_open_procfs(r0, &(0x7f0000000000)='environ\x00') r4 = dup2(r2, r1) exit(0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) dup3(r4, r3, 0x0) 2018/04/10 01:31:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x16f, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv6_getroute={0x24, 0x1a, 0x9, 0x0, 0x0, {0xa}, [@RTA_MARK={0x8, 0x10}]}, 0x24}, 0x1}, 0x0) 2018/04/10 01:31:58 executing program 6: 2018/04/10 01:31:58 executing program 3: 2018/04/10 01:31:58 executing program 1: 2018/04/10 01:31:58 executing program 4: 2018/04/10 01:31:58 executing program 2: 2018/04/10 01:31:58 executing program 7: 2018/04/10 01:31:58 executing program 4: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0xffffffffffffff8e) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f0000000100), 0x361, 0x10400003) 2018/04/10 01:31:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, 0x1c) sendmsg$key(r0, &(0x7f0000000280)={0x20480, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in=@local={0xac, 0x14, 0x14, 0xaa}}]}, 0x38}, 0x1}, 0x0) 2018/04/10 01:31:58 executing program 6: r0 = socket(0x11, 0x803, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000100)=0x3, 0x4) r1 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000fc8000)}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'wlc\x00', 0x0, 0xffffffffffff4449, 0x49}, 0x2c) recvmmsg(r0, &(0x7f0000000000), 0x400000000000304, 0x0, 0x0) 2018/04/10 01:31:58 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6009000000303a0000000000000000000000000000000000ff020000000000000000000000000001830090780000000060a9718800000000000000000000000000000000000000010000000000000000000000000000000192eec0b4278a3169f055e62e07baa0f0dbcc5d54d6654587adce5bc162d47f4e07e072b96298"], 0x0) 2018/04/10 01:31:58 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x200000000000003, 0x1) sendto$inet(r0, &(0x7f0000000080)="0500decc0b60201a", 0x8, 0x0, &(0x7f0000000000)={0x2}, 0x10) 2018/04/10 01:31:58 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000a82ff0)) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x27, 0x331, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 2018/04/10 01:31:58 executing program 5: r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'ip6tnl0\x00', 0x9519}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) close(r0) 2018/04/10 01:31:58 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7a}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x85}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4000f0, 0x6f6000, 0x1, &(0x7f0000000a80)) [ 56.754358] ================================================================== [ 56.761791] BUG: KMSAN: uninit-value in is_valid_bugaddr+0x17f/0x1a0 [ 56.768288] CPU: 0 PID: 5095 Comm: syz-executor6 Not tainted 4.16.0+ #82 [ 56.775121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.784477] Call Trace: [ 56.787071] dump_stack+0x185/0x1d0 [ 56.790702] ? is_valid_bugaddr+0x17f/0x1a0 [ 56.795021] kmsan_report+0x142/0x240 [ 56.798830] __msan_warning_32+0x6c/0xb0 [ 56.802888] ? kmsan_copy_to_user+0x141/0x160 [ 56.807383] ? kmsan_copy_to_user+0x141/0x160 [ 56.811878] is_valid_bugaddr+0x17f/0x1a0 [ 56.816025] ? report_bug+0x4b/0x880 [ 56.819739] ? kmsan_copy_to_user+0x141/0x160 [ 56.824235] report_bug+0x6f/0x880 [ 56.827780] ? __msan_poison_alloca+0x15c/0x1d0 [ 56.832450] ? do_invalid_op+0x46/0x50 [ 56.836337] ? kmsan_copy_to_user+0x141/0x160 [ 56.840832] ? do_error_trap+0xac/0x600 [ 56.844811] ? do_invalid_op+0x46/0x50 [ 56.848697] ? kmsan_copy_to_user+0x141/0x160 [ 56.853196] do_error_trap+0x1aa/0x600 [ 56.857093] ? skb_copy_datagram_iter+0x443/0xf70 [ 56.861936] ? _copy_to_iter+0x95/0x28f0 [ 56.866025] do_invalid_op+0x46/0x50 [ 56.869744] invalid_op+0x1b/0x40 [ 56.873196] RIP: 0010:kmsan_copy_to_user+0x141/0x160 [ 56.878291] RSP: 0018:ffff880167b0f790 EFLAGS: 00010202 [ 56.883650] RAX: ffff8801d4051d80 RBX: ffff880167b0f808 RCX: 0000000000000010 [ 56.890914] RDX: 00007ffffffff000 RSI: ffff880167b0f808 RDI: ffff444900000000 [ 56.898183] RBP: ffff880167b0f7d8 R08: 000000000000008b R09: 0000000000000002 [ 56.905436] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000010 [ 56.912691] R13: ffff444900000000 R14: 0000000000000000 R15: 0000000000000000 [ 56.919969] put_cmsg+0x4b5/0x870 [ 56.923408] packet_recvmsg+0x1b13/0x1cc0 [ 56.927545] sock_recvmsg+0x1d0/0x230 [ 56.931326] ? packet_sendmsg+0x8a10/0x8a10 [ 56.935629] ___sys_recvmsg+0x3fb/0x810 [ 56.939591] ? __fget_light+0x56/0x710 [ 56.943456] ? __fdget+0x4e/0x60 [ 56.946804] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 56.952148] ? __fget_light+0x6b9/0x710 [ 56.956111] __sys_recvmmsg+0x54e/0xdb0 [ 56.960070] ? __msan_poison_alloca+0x15c/0x1d0 [ 56.964726] SYSC_recvmmsg+0x212/0x3e0 [ 56.968597] SyS_recvmmsg+0x76/0xa0 [ 56.972204] do_syscall_64+0x309/0x430 [ 56.976075] ? __sys_recvmmsg+0xdb0/0xdb0 [ 56.980208] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 56.985379] RIP: 0033:0x455259 [ 56.988545] RSP: 002b:00007f430f274c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 56.996231] RAX: ffffffffffffffda RBX: 00007f430f2756d4 RCX: 0000000000455259 [ 57.003479] RDX: 0400000000000304 RSI: 0000000020000000 RDI: 0000000000000013 [ 57.010728] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 57.017978] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 57.025225] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000000 [ 57.032473] [ 57.034079] Local variable description: ----flags.i.i.i.i@enter_lazy_tlb [ 57.040891] Variable was created at: [ 57.044587] enter_lazy_tlb+0x30/0x120 [ 57.048455] __schedule+0x5e6/0x730 [ 57.052053] ================================================================== [ 57.059384] Disabling lock debugging due to kernel taint [ 57.064807] Kernel panic - not syncing: panic_on_warn set ... [ 57.064807] [ 57.072151] CPU: 0 PID: 5095 Comm: syz-executor6 Tainted: G B 4.16.0+ #82 [ 57.080269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.089684] Call Trace: [ 57.092252] dump_stack+0x185/0x1d0 [ 57.095862] panic+0x39d/0x940 [ 57.099058] ? is_valid_bugaddr+0x17f/0x1a0 [ 57.103358] kmsan_report+0x238/0x240 [ 57.107144] __msan_warning_32+0x6c/0xb0 [ 57.111186] ? kmsan_copy_to_user+0x141/0x160 [ 57.115659] ? kmsan_copy_to_user+0x141/0x160 [ 57.120133] is_valid_bugaddr+0x17f/0x1a0 [ 57.124260] ? report_bug+0x4b/0x880 [ 57.127953] ? kmsan_copy_to_user+0x141/0x160 [ 57.132425] report_bug+0x6f/0x880 [ 57.135953] ? __msan_poison_alloca+0x15c/0x1d0 [ 57.140601] ? do_invalid_op+0x46/0x50 [ 57.144467] ? kmsan_copy_to_user+0x141/0x160 [ 57.148942] ? do_error_trap+0xac/0x600 [ 57.152899] ? do_invalid_op+0x46/0x50 [ 57.156764] ? kmsan_copy_to_user+0x141/0x160 [ 57.161243] do_error_trap+0x1aa/0x600 [ 57.165118] ? skb_copy_datagram_iter+0x443/0xf70 [ 57.169940] ? _copy_to_iter+0x95/0x28f0 [ 57.173990] do_invalid_op+0x46/0x50 [ 57.177689] invalid_op+0x1b/0x40 [ 57.181122] RIP: 0010:kmsan_copy_to_user+0x141/0x160 [ 57.186201] RSP: 0018:ffff880167b0f790 EFLAGS: 00010202 [ 57.191541] RAX: ffff8801d4051d80 RBX: ffff880167b0f808 RCX: 0000000000000010 [ 57.198791] RDX: 00007ffffffff000 RSI: ffff880167b0f808 RDI: ffff444900000000 [ 57.206043] RBP: ffff880167b0f7d8 R08: 000000000000008b R09: 0000000000000002 [ 57.213291] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000010 [ 57.220538] R13: ffff444900000000 R14: 0000000000000000 R15: 0000000000000000 [ 57.227802] put_cmsg+0x4b5/0x870 [ 57.231247] packet_recvmsg+0x1b13/0x1cc0 [ 57.235385] sock_recvmsg+0x1d0/0x230 [ 57.239164] ? packet_sendmsg+0x8a10/0x8a10 [ 57.243468] ___sys_recvmsg+0x3fb/0x810 [ 57.247428] ? __fget_light+0x56/0x710 [ 57.251293] ? __fdget+0x4e/0x60 [ 57.254732] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 57.260072] ? __fget_light+0x6b9/0x710 [ 57.264043] __sys_recvmmsg+0x54e/0xdb0 [ 57.268003] ? __msan_poison_alloca+0x15c/0x1d0 [ 57.272662] SYSC_recvmmsg+0x212/0x3e0 [ 57.276533] SyS_recvmmsg+0x76/0xa0 [ 57.280145] do_syscall_64+0x309/0x430 [ 57.284023] ? __sys_recvmmsg+0xdb0/0xdb0 [ 57.288160] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 57.293327] RIP: 0033:0x455259 [ 57.296493] RSP: 002b:00007f430f274c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 57.304183] RAX: ffffffffffffffda RBX: 00007f430f2756d4 RCX: 0000000000455259 [ 57.311434] RDX: 0400000000000304 RSI: 0000000020000000 RDI: 0000000000000013 [ 57.318680] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 57.325931] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 57.333188] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000000 [ 57.340860] Dumping ftrace buffer: [ 57.344372] (ftrace buffer empty) [ 57.348056] Kernel Offset: disabled [ 57.351654] Rebooting in 86400 seconds..