Warning: Permanently added '10.128.0.185' (ECDSA) to the list of known hosts. 2018/12/17 21:01:50 parsed 1 programs 2018/12/17 21:01:56 executed programs: 0 syzkaller login: [ 74.986209] IPVS: ftp: loaded support on port[0] = 21 [ 75.451013] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.457505] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.465428] device bridge_slave_0 entered promiscuous mode [ 75.495742] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.502304] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.509758] device bridge_slave_1 entered promiscuous mode [ 75.540178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.569394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 75.658237] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 75.692771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 75.834519] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.842841] team0: Port device team_slave_0 added [ 75.872614] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.880444] team0: Port device team_slave_1 added [ 75.910530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.944637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.978388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.013383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.307409] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.314055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.320902] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.327518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.382248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.482009] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.581264] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.587530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.595977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.695312] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.371965] ================================================================== [ 78.379372] BUG: KMSAN: uninit-value in check_6rd+0x65a/0x710 [ 78.385287] CPU: 0 PID: 6837 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #2 [ 78.392388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.401743] Call Trace: [ 78.404338] dump_stack+0x1c9/0x220 [ 78.407967] kmsan_report+0x12d/0x290 [ 78.411769] __msan_warning+0x76/0xc0 [ 78.415575] check_6rd+0x65a/0x710 [ 78.419126] sit_tunnel_xmit+0xb58/0x34d0 [ 78.423307] ? dev_hard_start_xmit+0xb3/0xc80 [ 78.427792] ? __dev_queue_xmit+0x3173/0x3cf0 [ 78.432286] ? ipip6_tunnel_uninit+0x800/0x800 [ 78.436864] dev_hard_start_xmit+0x627/0xc80 [ 78.441289] __dev_queue_xmit+0x3173/0x3cf0 [ 78.445639] dev_queue_xmit+0x4b/0x60 [ 78.449434] ? __netdev_pick_tx+0x1290/0x1290 [ 78.453922] packet_sendmsg+0x7cbd/0x9200 [ 78.458068] ? kmsan_memcpy_memmove_metadata+0x1a9/0xf30 [ 78.463510] ? kmsan_memcpy_metadata+0xb/0x10 [ 78.468003] ? sock_write_iter+0x102/0x4f0 [ 78.472233] ? __se_sys_write+0x17a/0x370 [ 78.476389] ? do_syscall_64+0xcd/0x110 [ 78.480364] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 78.485721] ? vmalloc_to_page+0x585/0x6c0 [ 78.489963] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 78.495330] ? aa_sk_perm+0x7ab/0x9e0 [ 78.499205] ? compat_packet_setsockopt+0x360/0x360 [ 78.504234] sock_write_iter+0x3f4/0x4f0 [ 78.508305] ? sock_read_iter+0x4e0/0x4e0 [ 78.512444] __vfs_write+0x888/0xb80 [ 78.516187] vfs_write+0x4b4/0x900 [ 78.519738] __se_sys_write+0x17a/0x370 [ 78.523718] __x64_sys_write+0x4a/0x70 [ 78.527601] do_syscall_64+0xcd/0x110 [ 78.531419] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 78.536611] RIP: 0033:0x457669 [ 78.539798] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.558692] RSP: 002b:00007ffc9092dd48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 78.566391] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 78.573654] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 78.580917] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 78.588211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002a3a914 [ 78.595483] R13: 00000000004c605f R14: 00000000004dabe0 R15: 00000000ffffffff [ 78.602772] [ 78.604386] Uninit was created at: [ 78.607924] kmsan_internal_poison_shadow+0x92/0x150 [ 78.613034] kmsan_kmalloc+0xa1/0x100 [ 78.616841] kmsan_slab_alloc+0xe/0x10 [ 78.620716] __kmalloc_node_track_caller+0xf06/0x1120 [ 78.625908] __alloc_skb+0x318/0xa40 [ 78.629613] alloc_skb_with_frags+0x1c9/0xa80 [ 78.634130] sock_alloc_send_pskb+0xb5d/0x1140 [ 78.638710] packet_sendmsg+0x66a2/0x9200 [ 78.642863] sock_write_iter+0x3f4/0x4f0 [ 78.646916] __vfs_write+0x888/0xb80 [ 78.650621] vfs_write+0x4b4/0x900 [ 78.654158] __se_sys_write+0x17a/0x370 [ 78.658124] __x64_sys_write+0x4a/0x70 [ 78.662010] do_syscall_64+0xcd/0x110 [ 78.665812] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 78.670983] ================================================================== [ 78.678323] Disabling lock debugging due to kernel taint [ 78.683780] Kernel panic - not syncing: panic_on_warn set ... [ 78.689679] CPU: 0 PID: 6837 Comm: syz-executor0 Tainted: G B 4.20.0-rc5+ #2 [ 78.698181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.707528] Call Trace: [ 78.710123] dump_stack+0x1c9/0x220 [ 78.713764] panic+0x3f0/0x98f [ 78.716990] kmsan_report+0x290/0x290 [ 78.720795] __msan_warning+0x76/0xc0 [ 78.724614] check_6rd+0x65a/0x710 [ 78.728182] sit_tunnel_xmit+0xb58/0x34d0 [ 78.732359] ? dev_hard_start_xmit+0xb3/0xc80 [ 78.736846] ? __dev_queue_xmit+0x3173/0x3cf0 [ 78.741335] ? ipip6_tunnel_uninit+0x800/0x800 [ 78.745912] dev_hard_start_xmit+0x627/0xc80 [ 78.750339] __dev_queue_xmit+0x3173/0x3cf0 [ 78.754704] dev_queue_xmit+0x4b/0x60 [ 78.758518] ? __netdev_pick_tx+0x1290/0x1290 [ 78.763005] packet_sendmsg+0x7cbd/0x9200 [ 78.767179] ? kmsan_memcpy_memmove_metadata+0x1a9/0xf30 [ 78.772638] ? kmsan_memcpy_metadata+0xb/0x10 [ 78.777164] ? sock_write_iter+0x102/0x4f0 [ 78.781403] ? __se_sys_write+0x17a/0x370 [ 78.785547] ? do_syscall_64+0xcd/0x110 [ 78.789516] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 78.794872] ? vmalloc_to_page+0x585/0x6c0 [ 78.799133] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 78.804518] ? aa_sk_perm+0x7ab/0x9e0 [ 78.808375] ? compat_packet_setsockopt+0x360/0x360 [ 78.813388] sock_write_iter+0x3f4/0x4f0 [ 78.817487] ? sock_read_iter+0x4e0/0x4e0 [ 78.821632] __vfs_write+0x888/0xb80 [ 78.825365] vfs_write+0x4b4/0x900 [ 78.828944] __se_sys_write+0x17a/0x370 [ 78.832935] __x64_sys_write+0x4a/0x70 [ 78.836846] do_syscall_64+0xcd/0x110 [ 78.840659] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 78.845855] RIP: 0033:0x457669 [ 78.849042] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.867941] RSP: 002b:00007ffc9092dd48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 78.875673] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 78.882943] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 78.890218] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 78.897481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002a3a914 [ 78.904741] R13: 00000000004c605f R14: 00000000004dabe0 R15: 00000000ffffffff [ 78.912977] Kernel Offset: disabled [ 78.916606] Rebooting in 86400 seconds..