[ 51.020912] audit: type=1800 audit(1545314577.067:25): pid=6325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.529987] kauditd_printk_skb: 3 callbacks suppressed [ 52.530015] audit: type=1800 audit(1545314578.577:29): pid=6325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 52.554767] audit: type=1800 audit(1545314578.587:30): pid=6325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.35' (ECDSA) to the list of known hosts. 2018/12/20 14:03:10 fuzzer started 2018/12/20 14:03:15 dialing manager at 10.128.0.26:46613 syzkaller login: [ 69.367546] ld (6482) used greatest stack depth: 53728 bytes left 2018/12/20 14:03:15 syscalls: 1 2018/12/20 14:03:15 code coverage: enabled 2018/12/20 14:03:15 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 14:03:15 setuid sandbox: enabled 2018/12/20 14:03:15 namespace sandbox: enabled 2018/12/20 14:03:15 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 14:03:15 fault injection: enabled 2018/12/20 14:03:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 14:03:15 net packet injection: enabled 2018/12/20 14:03:15 net device setup: enabled 14:03:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000110009e369001b00810800000700fd3f16000000450001070000001419001a000400230007000f000200000400000083a8a5000200", 0x39}], 0x1) [ 85.712304] IPVS: ftp: loaded support on port[0] = 21 [ 87.073512] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.080076] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.088557] device bridge_slave_0 entered promiscuous mode [ 87.170827] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.177422] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.185711] device bridge_slave_1 entered promiscuous mode [ 87.266570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 87.347183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 87.598809] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 87.684779] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 87.769370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 87.776535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 87.860218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 87.867334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.124485] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 88.133189] team0: Port device team_slave_0 added [ 88.214942] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 88.223786] team0: Port device team_slave_1 added [ 88.323869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.433830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.533291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 88.540917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.550690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.635194] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 88.642856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.652170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:03:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1, "b09b6d5c2a91e414699d955ce83b632ad4049739030d61b6f37e405db505735e"}}}}}, 0x0) [ 89.701883] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.708473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.715655] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.722214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.731465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 89.737998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.762845] IPVS: ftp: loaded support on port[0] = 21 [ 92.145901] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.152603] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.160941] device bridge_slave_0 entered promiscuous mode [ 92.285987] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.292639] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.300862] device bridge_slave_1 entered promiscuous mode [ 92.402215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 92.589391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 92.964326] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 93.102455] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 93.687095] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 93.695708] team0: Port device team_slave_0 added [ 93.837509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 93.846161] team0: Port device team_slave_1 added 14:03:40 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') ioctl$VT_RELDISP(r0, 0xb701) [ 93.953610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.077493] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.189035] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 94.196735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.205960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.304567] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 94.312219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.321165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.658250] IPVS: ftp: loaded support on port[0] = 21 [ 96.051445] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.058068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.065282] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.071880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.081007] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 96.087607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.328091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.010127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 97.207829] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.214413] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.222742] device bridge_slave_0 entered promiscuous mode [ 97.383941] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.390485] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.398745] device bridge_slave_1 entered promiscuous mode [ 97.561116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 97.601314] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 97.607699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.616263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.741753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 98.130864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 98.292251] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 98.352647] 8021q: adding VLAN 0 to HW filter on device team0 [ 98.457560] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 98.464664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 98.669573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 98.676650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 99.152183] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 99.160791] team0: Port device team_slave_0 added [ 99.338329] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 99.346856] team0: Port device team_slave_1 added [ 99.482624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 99.489622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 99.498590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.645339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 99.652487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.661402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.809601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 99.817385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.826481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.979983] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 99.987701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.997013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.731405] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.738038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.745207] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.751825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.761264] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 101.768379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:03:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x47, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='\x00', 0xc2, 0x0, 0x0) 14:03:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000110009e369001b00810800000700fd3f16000000450001070000001419001a000400230007000f000200000400000083a8a5000200", 0x39}], 0x1) 14:03:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000110009e369001b00810800000700fd3f16000000450001070000001419001a000400230007000f000200000400000083a8a5000200", 0x39}], 0x1) [ 102.951719] IPVS: ftp: loaded support on port[0] = 21 [ 103.018134] 8021q: adding VLAN 0 to HW filter on device bond0 14:03:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)="39000000110009e369001b00810800000700fd3f16000000450001070000001419001a000400230007000f000200000400000083a8a5000200", 0x39}], 0x1) 14:03:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0xc, 0xa, 0x0, "17606e0f2b5c2bc9db5a0f9cc0fbda7643ed12de15d50361a077e48500"}) 14:03:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0xc, 0xa, 0x0, "17606e0f2b5c2bc9db5a0f9cc0fbda7643ed12de15d50361a077e48500"}) 14:03:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0xc, 0xa, 0x0, "17606e0f2b5c2bc9db5a0f9cc0fbda7643ed12de15d50361a077e48500"}) [ 103.861036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:03:50 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0xc, 0xa, 0x0, "17606e0f2b5c2bc9db5a0f9cc0fbda7643ed12de15d50361a077e48500"}) 14:03:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) acct(&(0x7f0000000340)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x40000000000001) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000005c0)=ANY=[], 0x0) dup2(r0, r1) [ 104.342675] hrtimer: interrupt took 32763 ns [ 104.362170] ================================================================== [ 104.369566] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 104.376210] CPU: 1 PID: 7097 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #8 [ 104.383331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.392713] Call Trace: [ 104.395327] dump_stack+0x173/0x1d0 [ 104.398994] kmsan_report+0x120/0x290 [ 104.402834] kmsan_internal_check_memory+0x9a7/0xa20 [ 104.408023] __msan_instrument_asm_load+0x8a/0x90 [ 104.412946] __siphash_aligned+0x512/0xae0 [ 104.417241] secure_ipv6_port_ephemeral+0x110/0x220 [ 104.422304] inet6_hash_connect+0x11f/0x1a0 [ 104.426672] tcp_v6_connect+0x20ba/0x2890 [ 104.430882] ? __msan_poison_alloca+0x1e0/0x270 [ 104.435637] ? tcp_v6_pre_connect+0x130/0x130 [ 104.440177] __inet_stream_connect+0x2f9/0x1340 [ 104.444865] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 104.449737] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 104.454459] tcp_sendmsg_locked+0x65d5/0x6be0 [ 104.459000] ? aa_label_sk_perm+0xda/0x940 [ 104.463283] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.468672] ? aa_label_sk_perm+0x6d6/0x940 [ 104.473035] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 104.478423] ? futex_wait+0x912/0xc40 [ 104.482310] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 104.487768] tcp_sendmsg+0xb2/0x100 [ 104.491450] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 104.496169] inet_sendmsg+0x54a/0x720 [ 104.500008] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.505392] ? security_socket_sendmsg+0x1bd/0x200 [ 104.510381] ? inet_getname+0x490/0x490 [ 104.514394] __sys_sendto+0x8c4/0xac0 [ 104.518295] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 104.523788] ? prepare_exit_to_usermode+0x114/0x420 [ 104.528821] ? syscall_return_slowpath+0x50/0x650 [ 104.533712] __se_sys_sendto+0x107/0x130 [ 104.537894] __x64_sys_sendto+0x6e/0x90 [ 104.541900] do_syscall_64+0xbc/0xf0 [ 104.545644] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 104.550847] RIP: 0033:0x457669 [ 104.554054] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.572996] RSP: 002b:00007f0181858c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 104.580721] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 104.588016] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 104.595297] RBP: 000000000072bf00 R08: 000000002031e000 R09: 000000000000001c [ 104.602611] R10: 0000000020000004 R11: 0000000000000246 R12: 00007f01818596d4 [ 104.610408] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 104.617726] [ 104.619368] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 104.626840] Variable was created at: [ 104.630579] secure_ipv6_port_ephemeral+0x6a/0x220 [ 104.635533] inet6_hash_connect+0x11f/0x1a0 [ 104.639861] [ 104.641522] Bytes 2-7 of 8 are uninitialized [ 104.645945] Memory access of size 8 starts at ffff88817a54f5f0 [ 104.651931] ================================================================== [ 104.659310] Disabling lock debugging due to kernel taint [ 104.664789] Kernel panic - not syncing: panic_on_warn set ... [ 104.670695] CPU: 1 PID: 7097 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #8 [ 104.671760] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 104.679191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.679214] Call Trace: [ 104.685504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.694666] dump_stack+0x173/0x1d0 [ 104.694698] panic+0x3ce/0x961 [ 104.694764] kmsan_report+0x285/0x290 [ 104.698551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.703873] kmsan_internal_check_memory+0x9a7/0xa20 [ 104.703925] __msan_instrument_asm_load+0x8a/0x90 [ 104.730943] __siphash_aligned+0x512/0xae0 [ 104.735239] secure_ipv6_port_ephemeral+0x110/0x220 [ 104.740296] inet6_hash_connect+0x11f/0x1a0 [ 104.744659] tcp_v6_connect+0x20ba/0x2890 [ 104.748859] ? __msan_poison_alloca+0x1e0/0x270 [ 104.753564] ? tcp_v6_pre_connect+0x130/0x130 [ 104.758077] __inet_stream_connect+0x2f9/0x1340 [ 104.762766] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 104.767666] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 104.772376] tcp_sendmsg_locked+0x65d5/0x6be0 [ 104.776895] ? aa_label_sk_perm+0xda/0x940 [ 104.781156] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.786536] ? aa_label_sk_perm+0x6d6/0x940 [ 104.790879] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 104.796264] ? futex_wait+0x912/0xc40 [ 104.800136] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 104.805548] tcp_sendmsg+0xb2/0x100 [ 104.809215] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 104.813909] inet_sendmsg+0x54a/0x720 [ 104.817746] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.823161] ? security_socket_sendmsg+0x1bd/0x200 [ 104.828141] ? inet_getname+0x490/0x490 [ 104.832158] __sys_sendto+0x8c4/0xac0 [ 104.836037] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 104.841511] ? prepare_exit_to_usermode+0x114/0x420 [ 104.846553] ? syscall_return_slowpath+0x50/0x650 [ 104.851423] __se_sys_sendto+0x107/0x130 [ 104.855546] __x64_sys_sendto+0x6e/0x90 [ 104.859558] do_syscall_64+0xbc/0xf0 [ 104.863300] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 104.868505] RIP: 0033:0x457669 [ 104.871718] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.890632] RSP: 002b:00007f0181858c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 104.898453] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 104.905739] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 104.913021] RBP: 000000000072bf00 R08: 000000002031e000 R09: 000000000000001c [ 104.920302] R10: 0000000020000004 R11: 0000000000000246 R12: 00007f01818596d4 [ 104.927586] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 104.935854] Kernel Offset: disabled [ 104.939484] Rebooting in 86400 seconds..