[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 29.507488] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.730158] random: sshd: uninitialized urandom read (32 bytes read) [ 34.020370] random: sshd: uninitialized urandom read (32 bytes read) [ 35.367268] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. [ 40.840447] random: sshd: uninitialized urandom read (32 bytes read) 2018/06/13 12:41:03 fuzzer started [ 42.262068] random: cc1: uninitialized urandom read (8 bytes read) 2018/06/13 12:41:06 dialing manager at 10.128.0.26:37601 2018/06/13 12:41:11 syscalls: 1643 2018/06/13 12:41:11 code coverage: enabled 2018/06/13 12:41:11 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: errno 524 2018/06/13 12:41:11 setuid sandbox: enabled 2018/06/13 12:41:11 namespace sandbox: enabled 2018/06/13 12:41:11 fault injection: enabled 2018/06/13 12:41:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/06/13 12:41:11 net packed injection: enabled 12:41:18 executing program 0: socketpair(0x4, 0x0, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @dev, @multicast1}, &(0x7f00000000c0)=0xc) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x1d, r2}, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x5, 0x0, 0x1, {0x77359400}, {0x77359400}, {0x2, 0x4, 0x10001, 0x7}, 0x1, @canfd={{0x1, 0x40, 0x4, 0xfff}, 0x29, 0x1, 0x0, 0x0, "52d3311a12f2464bbf428ebec83bced7422b8753af450f8440a8de15ee5d0fe6d6c7525c71f5bd15c6c5bcfd138938013b7fc38e9052c8277bfb28bbf6a3c905"}}, 0x80}, 0x1, 0x0, 0x0, 0x90}, 0x4080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000240)="cfd4059a68959c1fb1a01205", &(0x7f0000000280)="2643a0b0bd0e09e02b0686ae3a621ae00a71fbe4a256b83685646f12cee59dcf1f232d735c7f217b4d202bc442c793cbc5450b333a32185b1b857027ce3aa7ff50ceeb2acde698928184f7d79669b41ca56458ce0a2e1a3fc6c1ccddc53be9a43c303f13b13c7719d1ab1671b74e893ae5b1d2592d9ebafd13852a65d6aa499396126c287f", 0x3}, 0x20) r3 = gettid() ptrace$getregs(0xe, r3, 0x1000000, &(0x7f0000000380)=""/128) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000400)={{0xa, 0x4e20, 0x8, @loopback={0x0, 0x1}, 0x7ff}, {0xa, 0x4e23, 0x200, @local={0xfe, 0x80, [], 0xaa}, 0x5}, 0x7, [0xffffffffffffff2e, 0x7, 0x9, 0xfffffffffffffffe, 0x400, 0x7, 0x1, 0x1]}, 0x5c) sendfile(r1, r0, &(0x7f0000000480), 0x5) r4 = semget(0x3, 0x2, 0x100) semctl$IPC_RMID(r4, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000004c0)=0x2, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000500)={0x6, 0x3, 0xf, 0x8, 0x4, 0x8}) openat$cgroup_int(r1, &(0x7f0000000540)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000000580)=""/234) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000680)) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000006c0)={@mcast1={0xff, 0x1, [], 0x1}, @empty, @dev={0xfe, 0x80, [], 0x1c}, 0x3, 0x3, 0x6, 0x100, 0x0, 0x100, r2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mq_getsetattr(r0, &(0x7f0000000780)={0xfff, 0x6, 0x80000000, 0x5d, 0xffffffffffffffe1, 0x7, 0x5, 0x3}, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f00000007c0)=0x10001, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000800)={0x7d, 0x14, [0x6834, 0x841, 0x5, 0x2, 0x3]}) getegid() setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000840)="c7e4edac39c02662495cabba43f7c50f9e5e3128f4f3448786313fce327caf299e5f10b7fb752c2b508a4afbdb420efa6a13d43344cefcb93e87789bf6fa45f1718ad2af62f876e215df6e130e93fbddf0ab7b1dea46e27c2ce3b2e6bd179c4567d7e9fdc9ed4e1b4b314168c298501f075b2aa50478ee82412410420e20a0c12aceaf5bcc9578e29d14ee6dcf17ff83fef2333319c7e3886ec394bdece9a18ac98664ac6dfbff9d5e9dc2ce7ccca9bbeaecc403adbde7ebbabd9958e6f6ab787a2cb6986bdc4da630acc9a81cef8d6f37d06888c1f2e8b4739f8592d1f26a3ee6", 0xe1) ioctl$VT_WAITACTIVE(r0, 0x5607) modify_ldt$read(0x0, &(0x7f0000000940)=""/172, 0xac) geteuid() r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4181, 0x0) ioctl$TTUNGETFILTER(r0, 0x801054db, &(0x7f0000000a40)=""/4096) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000001a40)) 12:41:18 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) getpriority(0x0, r2) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0)={[0x36, 0x39, 0x32, 0x34]}, 0x4) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/155, 0x9b}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/111, 0x6f}, {&(0x7f0000000280)=""/92, 0x5c}, {&(0x7f0000000300)=""/85, 0x55}], 0x5) setsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000400)={@empty, @dev={0xac, 0x14, 0x14, 0xf}}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000440)={0x0, 0xf5a3, 0x0, 0x5, 0x6, 0x3}, &(0x7f0000000480)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0xffffffff7fffffff, 0x2}, 0x90) capset(&(0x7f0000000580)={0x39980732, r2}, &(0x7f00000005c0)={0x8, 0x101, 0x800, 0x3, 0x1, 0x60}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000700)={0x11, 0x0, r5, 0x1, 0x7, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xd}}, 0x14) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000740)={0x2, [0x6, 0x9]}, &(0x7f0000000780)=0x8) bind$vsock_stream(r3, &(0x7f00000007c0)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000800)={'bridge_slave_0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}) prctl$void(0x15) getpgid(r2) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000840)={&(0x7f0000ffc000/0x2000)=nil, 0x9, 0x0, 0x8c, &(0x7f0000ffc000/0x3000)=nil, 0xeff}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000880)='veth0_to_team\x00', 0x10) keyctl$join(0x1, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/autofs\x00', 0xa400, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000900)=0x8, 0x4) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000980)={0x6, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}]}) ioctl$TCGETA(r1, 0x5405, &(0x7f00000009c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000a00)={r4, 0x92bf}, &(0x7f0000000a40)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000a80)={'team0\x00', r5}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_bt_cmtp_CMTPCONNADD(r6, 0x400443c8, &(0x7f0000000ac0)={r7, 0x9}) readv(r0, &(0x7f0000000e40)=[{&(0x7f0000000b00)=""/227, 0xe3}, {&(0x7f0000000c00)=""/38, 0x26}, {&(0x7f0000000c40)=""/123, 0x7b}, {&(0x7f0000000cc0)=""/16, 0x10}, {&(0x7f0000000d00)=""/49, 0x31}, {&(0x7f0000000d40)=""/13, 0xd}, {&(0x7f0000000d80)=""/179, 0xb3}], 0x7) [ 55.309126] Not allocated shadow for addr ffff8801d3974000 (page ffffea000af58b80) [ 55.316888] Attempted to access 1566 bytes [ 55.321148] ------------[ cut here ]------------ [ 55.325898] kernel BUG at mm/kmsan/kmsan.c:1378! [ 55.330664] invalid opcode: 0000 [#1] SMP PTI [ 55.335157] Dumping ftrace buffer: [ 55.338687] (ftrace buffer empty) [ 55.342392] Modules linked in: [ 55.345592] CPU: 0 PID: 4502 Comm: syz-fuzzer Not tainted 4.17.0+ #6 [ 55.352082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.361456] RIP: 0010:kmsan_get_shadow_address+0x1ce/0x1f0 [ 55.367085] RSP: 0018:ffff8801afb5e6f0 EFLAGS: 00010082 [ 55.372450] RAX: 000000000000001e RBX: 0000000000000740 RCX: 0000000000000000 [ 55.379717] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 55.386988] RBP: ffff8801afb5e708 R08: 0000000000000000 R09: 0000000000000001 [ 55.394270] R10: 0000000000000000 R11: ffffffff86575770 R12: ffff8801d3974000 [ 55.401546] R13: 000000000000061e R14: 0000000000000001 R15: 000000000000061e [ 55.408816] FS: 000000c420028768(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 55.417038] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.422921] CR2: 000000c42015d000 CR3: 000000019be30000 CR4: 00000000001406f0 [ 55.430204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.437484] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.444759] Call Trace: [ 55.447364] kmsan_internal_unpoison_shadow+0x5c/0xe0 [ 55.452579] kmsan_unpoison_shadow+0x66/0xb0 [ 55.457023] virtqueue_get_buf_ctx+0x73f/0xa20 [ 55.461619] virtqueue_get_buf+0x72/0x90 [ 55.465693] start_xmit+0x293/0x29c0 [ 55.469414] ? packet_rcv+0x2210/0x2210 [ 55.473397] ? virtnet_close+0x2c0/0x2c0 [ 55.477461] dev_hard_start_xmit+0x5f6/0xc80 [ 55.481888] sch_direct_xmit+0x578/0x8f0 [ 55.485962] __qdisc_run+0x1822/0x3730 [ 55.489870] __dev_queue_xmit+0x2069/0x3540 [ 55.494385] dev_queue_xmit+0x4b/0x60 [ 55.498187] ip_finish_output2+0x12a8/0x1480 [ 55.502600] ip_finish_output+0xcbc/0x1000 [ 55.506850] ip_output+0x505/0x5d0 [ 55.510395] ? ip_mc_finish_output+0x3b0/0x3b0 [ 55.514967] ? ip_finish_output+0x1000/0x1000 [ 55.519445] ip_queue_xmit+0x1b0f/0x1d00 [ 55.523502] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 55.528935] ? __skb_clone+0x6ec/0x990 [ 55.532809] ? ip_output+0x5d0/0x5d0 [ 55.536510] tcp_transmit_skb+0x3db5/0x5350 [ 55.540825] tcp_write_xmit+0x2d81/0xb200 [ 55.544980] __tcp_push_pending_frames+0x124/0x400 [ 55.549894] tcp_push+0x803/0x8f0 [ 55.553335] tcp_sendmsg_locked+0x4eb1/0x6610 [ 55.557832] tcp_sendmsg+0xb2/0x100 [ 55.561443] ? tcp_sendmsg_locked+0x6610/0x6610 [ 55.566097] inet_sendmsg+0x3fc/0x760 [ 55.569882] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 55.575230] ? inet_getname+0x4a0/0x4a0 [ 55.579186] sock_write_iter+0x3bc/0x470 [ 55.583246] ? sock_read_iter+0x480/0x480 [ 55.587379] __vfs_write+0x808/0x9f0 [ 55.591096] vfs_write+0x467/0x8c0 [ 55.594627] __x64_sys_write+0x1bf/0x3e0 [ 55.598675] ? ksys_write+0x360/0x360 [ 55.602460] do_syscall_64+0x15b/0x230 [ 55.606333] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.611508] RIP: 0033:0x47fc44 [ 55.614679] RSP: 002b:000000c4349472b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 55.622367] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047fc44 [ 55.629621] RDX: 00000000000001b1 RSI: 000000c432d7b000 RDI: 0000000000000003 [ 55.636874] RBP: 000000c434947308 R08: 0000000000000000 R09: 0000000000000000 [ 55.644126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.651389] R13: 0000000000000040 R14: 0000000000000019 R15: 000000c42015c9c0 [ 55.658642] Code: 75 29 48 c7 c7 59 38 97 8a 31 c0 e8 fd 4c 80 ff 80 3c 25 f8 93 53 8b 00 75 11 48 c7 c7 89 38 97 8a 31 c0 4c 89 fe e8 e2 4c 80 ff <0f> 0b eb fe 48 3d ff ff ff 1f 0f 87 a2 fe ff ff 48 8b 1c 25 10 [ 55.677771] RIP: kmsan_get_shadow_address+0x1ce/0x1f0 RSP: ffff8801afb5e6f0 [ 55.684857] ---[ end trace b1b38ec03d5724e9 ]--- [ 55.689605] Kernel panic - not syncing: Fatal exception in interrupt [ 55.696574] Dumping ftrace buffer: [ 55.700099] (ftrace buffer empty) [ 55.703787] Kernel Offset: disabled [ 55.707392] Rebooting in 86400 seconds..