INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2018/04/07 08:19:44 fuzzer started 2018/04/07 08:19:44 dialing manager at 10.128.0.26:38639 2018/04/07 08:19:50 kcov=true, comps=false 2018/04/07 08:19:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair(0x1, 0x400000000803, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000200)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040)}, 0x20) 2018/04/07 08:19:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000080)='j', &(0x7f0000000140)=""/35}, 0x18) 2018/04/07 08:19:53 executing program 7: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) read(r0, &(0x7f0000004f45)=""/187, 0xbb) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000013ffc)=0xff, 0x2de) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000010ff8)=@fragment, 0x8) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 08:19:53 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0xffffffffffffffe8) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x9, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x411) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x4e20, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 08:19:53 executing program 4: mmap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) 2018/04/07 08:19:53 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000a00000)={0x73, 0x79, 0x7a}, &(0x7f0000facfff)="01", 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000240)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000000140)=""/5, 0x5, &(0x7f00000001c0)={&(0x7f0000000180)={'rmd160\x00'}}) 2018/04/07 08:19:53 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000e75ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) creat(&(0x7f0000dd5000)='./file0/bus\x00', 0x0) mount(&(0x7f0000121ff8)='./file0\x00', &(0x7f000081bff4)='./file0/bus\x00', &(0x7f000094bff9)='mqueue\x00', 0x0, &(0x7f0000a67000)) inotify_init() unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/07 08:19:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@getlink={0x34, 0x12, 0x11, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'lo\x00'}]}, 0x34}, 0x1}, 0x0) syzkaller login: [ 41.894250] ip (3760) used greatest stack depth: 54656 bytes left [ 42.369279] ip (3804) used greatest stack depth: 54408 bytes left [ 43.368863] ip (3904) used greatest stack depth: 54200 bytes left [ 45.235168] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.422249] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.570246] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.593979] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.613661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.630011] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.732731] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.862394] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.208155] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.223575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.268583] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.360187] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.442231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.481177] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.567564] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.687809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.918223] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.924508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.933606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.976190] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.984181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.997960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.051222] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.058703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.076583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.161876] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.168156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.177474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.209274] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.215528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.226858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.257563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.263833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.292188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.406714] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.412986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.425745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.462436] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.468851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.484950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 08:20:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000a00000)={0x73, 0x79, 0x7a}, &(0x7f0000facfff)="01", 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000240)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000480)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000100)={&(0x7f0000000140)={'crc32c-intel\x00'}}) 2018/04/07 08:20:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f00000002c0)=@bridge_getlink={0x28, 0x12, 0x72b, 0x0, 0x0, {0x7}, [@IFLA_TXQLEN={0x8, 0xd}]}, 0x28}, 0x1}, 0x0) 2018/04/07 08:20:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000a00000)={0x73, 0x79, 0x7a}, &(0x7f0000facfff)="01", 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000240)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000480)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000100)={&(0x7f0000000140)={'crc32c-intel\x00'}}) 2018/04/07 08:20:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1a2, @time, 0x0, {}, 0x0, 0xfffffffffffffffd}) 2018/04/07 08:20:10 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000080)}, 0x10) 2018/04/07 08:20:10 executing program 7: 2018/04/07 08:20:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000d69ff0)=[{&(0x7f000019ffff)='2', 0x1}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 2018/04/07 08:20:10 executing program 3: 2018/04/07 08:20:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) write(r0, &(0x7f00000001c0)="4f7ad0c9edffe9486f1748144523c0c253773e00fd4c8ebb02dcf50bbc54c90c0ea17b1b4262f411b2ef8c11b3837564025833c9fe3d139ff2dde97e4a38530987ce54445f206169516ceb2cbc6575de1a8c88e413", 0x55) r1 = syz_open_pts(r0, 0x41) writev(r1, &(0x7f0000000080)=[{&(0x7f0000dcb000)="14", 0x1}], 0x1) ioctl$TCSETS(r1, 0x5402, &(0x7f0000a30fdc)) 2018/04/07 08:20:11 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000000100)={0x224, 0x5, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0xff}) ptrace(0x4207, r1) tkill(r1, 0x10000000012) ptrace(0x4208, r1) 2018/04/07 08:20:11 executing program 7: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/04/07 08:20:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r0, &(0x7f0000d69ff0)=[{&(0x7f000019ffff)='2', 0x1}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 2018/04/07 08:20:11 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) uname(&(0x7f0000000040)=""/81) 2018/04/07 08:20:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:11 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x2, [@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002]}, 0x18) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast1=0xe0000001, @multicast1=0xe0000001]}, 0x18) 2018/04/07 08:20:11 executing program 5: clone(0x0, &(0x7f0000b6c000), &(0x7f00008a3000), &(0x7f000057c000), &(0x7f0000ac4000)) ustat(0x5, &(0x7f0000000040)) 2018/04/07 08:20:11 executing program 1: r0 = memfd_create(&(0x7f0000029000)='\\\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000032ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000000)) 2018/04/07 08:20:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:11 executing program 2: mkdir(&(0x7f000000e000)='./control\x00', 0x0) mount(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00', &(0x7f00000000c0)='rootfs\x00', 0x0, &(0x7f0000000100)) 2018/04/07 08:20:11 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'gre0\x00', @ifru_mtu}) 2018/04/07 08:20:11 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0x0) 2018/04/07 08:20:11 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_cmd={0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x8}}) 2018/04/07 08:20:12 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1) writev(r0, &(0x7f0000002700)=[{&(0x7f00000003c0)='0', 0x1}, {&(0x7f00000023c0)="bfa03b7b47bcdc3fff182dc1549902bb6c85b6fe1b1c43cbe968d9dda4f1a79914e62692d4ee940b4bfb473b7345361412eccc38110e50a1e3923f72896aeeb151489153ee726b42b826e403ba8f7254f67e1d785408aadab6ce00ae25272702df34d48f413965b1a986dc2acb9c644c936cb6a1d4191f82ade46adc148081e147a4c96c919a7a73e706da5c39127e29aa837a6d368c38806ec050884006c677a8d368ea1637d5415795f7b6cdfd681a522ee8a95900c85805c33065e3a9ee872abbcdd02a27267421753b6e1c31f69ae053d57f42de4a3fd80b6e786508eaff33eda477809063a6cdf9a7da1e2a", 0xee}, {&(0x7f0000002580)="e10fca9da871881d35ea9b4cbcf91c82f77b21589a824b455a0fff292097b1251eed93f750c27a81ff3905beeb12070340ab77b36c378a54dde570e994ddec01c8a9c29fa5e78a8d750ae68953f7b6f6e2ed89ba526d9e74ad6cd78b89f976c5da29eae3e8b5b2c9c727518d056272f3aeca90d1055f6d", 0x77}, {&(0x7f0000002640)="272adbb497a51ba441413ee965990f4e065a7e41a21327aa567b5efdbec61f17a57b6f3d37574b8b368134b1b27cae7c9255c820efd8f0a2f90967e2a555e99d117aebb3b658bbbd89af922157cf2e7085e6b326e1888016330a469df504a5a7fb9b954312f42b562b9c9eceb8f057c877d5ae87217ba30047a874d1e1cfc11be53ac4778fa02d5472a1fdd6126acf17d7b7fba04d05eab5f82145d74c45f0722c2551bbba65eaae44c83cd3a0a5f70b1f23d95f6efc", 0xb6}], 0x4) 2018/04/07 08:20:12 executing program 5: futex(&(0x7f0000000000), 0x5, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x81000000) 2018/04/07 08:20:12 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') sendfile(r0, r0, &(0x7f00008eb000)=0x440, 0x63) 2018/04/07 08:20:12 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:12 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', @ifru_names='bridge0\x00'}) 2018/04/07 08:20:12 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000b28000)={0x1, {&(0x7f000074a000)=""/207, 0xcf, &(0x7f000072bfce)=""/50, 0x0, 0x2}}, 0x68) write$vnet(r0, &(0x7f00005ebf98)={0x1, {&(0x7f0000f29fe4)=""/28, 0x1c, &(0x7f0000e9afb7)=""/73, 0x0, 0x3}}, 0x68) 2018/04/07 08:20:12 executing program 5: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000013ffc)=0x2, 0x2ba) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 08:20:12 executing program 1: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x4e20, 0x0, @empty, 0x25}]}, &(0x7f00007b7ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x2, 0x0, 0xb, 0x7a}], {0x95}}, &(0x7f0000c43000)='syzkaller\x00', 0x0, 0x126c, &(0x7f000087d000)=""/4096}, 0x19) 2018/04/07 08:20:12 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:12 executing program 2: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000380)="00ad838df49e8ab9d4e179c7a65995596ddb23b7bf1f81b4d2e557c8d4763dbe51ac32be0c356a17dc41a3ff7abc5030dbaaed0465912720566d344ab631f4f376bde58c8d01de9255cde4f49dc0912684519bdd448d6494ca1f012d27f99eb3dfed91b279f9a65566250deb98a3335cc5b44416055443d6151174b09334ecc7893f3d868da2f3a5a9761fecc462eff7c36c4439f2df4f53797ac9177f15a58fb7d628cf639477d50125f57528dba56bca02c2f7a94ec25a7e7002e3cfe4c6a445f7ed5f30f63615b9f7d7646d8998ea8d05ff0425afdc10eb49b0b4c92aa022bc4459b72d488c22c64d4f5fd47226811d05", 0xf2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) setitimer(0x0, &(0x7f00000001c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) 2018/04/07 08:20:12 executing program 7: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, 0x8) 2018/04/07 08:20:12 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:12 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='[*[\x00', 0x0) write(r0, &(0x7f0000000000)="f7ea42337eb805da8d24d09f3c2100580900ccd45da0739a805009", 0x1b) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f0000000140)) 2018/04/07 08:20:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x6b, 0xa, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000000000), &(0x7f0000009fa5)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000008000)={r0, &(0x7f0000014000)}, 0x10) 2018/04/07 08:20:12 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x12, &(0x7f0000000000)="2ac03f5d", 0x4) 2018/04/07 08:20:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:12 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000002ffc), &(0x7f0000004ffc)=0x134) 2018/04/07 08:20:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000072fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x2000000000002}, {{0x77359400}}], 0x30) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000100)=0x7) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)) 2018/04/07 08:20:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:12 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000072fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x2000000000002}, {{0x77359400}}], 0x30) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000140)=""/200) 2018/04/07 08:20:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:12 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:12 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='mqueue\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/04/07 08:20:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000002ffc), &(0x7f0000004ffc)=0x134) 2018/04/07 08:20:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000), 0x1) 2018/04/07 08:20:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000000005, 0x2, 0xa, 0xffffffff00000006}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000180)=""/231}, 0x18) 2018/04/07 08:20:13 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00002f8000)={0x0, 0x0, {0x1, 0x0, 0x0, 0x8000000}}) 2018/04/07 08:20:13 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:13 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = syz_open_procfs(0x0, &(0x7f00009b6ff9)='ns/ipc\x00') setns(r0, 0x0) 2018/04/07 08:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000994000)=[{&(0x7f0000fb4fc6)="3900000011000947008061e1c30700ff070000000200000045efffff08009b0019001a000f000000e80000000000000004e9ff0006000d0005", 0x39}], 0x1) 2018/04/07 08:20:13 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400, 0x1}, &(0x7f000001d000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000), &(0x7f0000048000), 0x0) 2018/04/07 08:20:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/91, 0x286) [ 59.196749] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) 2018/04/07 08:20:13 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:13 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:13 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001aff4)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/04/07 08:20:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:14 executing program 3: madvise(&(0x7f0000098000/0x10000)=nil, 0x10000, 0x12) mbind(&(0x7f00000a0000/0x13000)=nil, 0x13000, 0x200000001, &(0x7f0000000000), 0x2, 0x0) clone(0x0, &(0x7f0000141000), &(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000080)) 2018/04/07 08:20:14 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)=@bridge_newneigh={0x30, 0x1c, 0x409, 0x0, 0x0, {0xa, 0x0, 0x0, r1}, [@NDA_DST_IPV6={0x14, 0x1, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x30}, 0x1}, 0x0) 2018/04/07 08:20:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='ns\x00') getdents(r0, &(0x7f0000a7cfe8)=""/24, 0x11b) getdents64(r0, &(0x7f000000af97)=""/105, 0x69) 2018/04/07 08:20:14 executing program 6: memfd_create(&(0x7f000000e000)='\x00 ', 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') pread64(r0, &(0x7f00000000c0)=""/126, 0x7e, 0x0) 2018/04/07 08:20:14 executing program 2: r0 = socket(0x10, 0x8400000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000000200)=0xc) setreuid(r1, 0x0) 2018/04/07 08:20:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:14 executing program 5: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) write$evdev(r0, &(0x7f00000000c0)=[{{}, 0x0, 0x0, 0x80000000}], 0x18) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000)) 2018/04/07 08:20:14 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r0, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) 2018/04/07 08:20:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x286) 2018/04/07 08:20:14 executing program 6: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x0, 0x8}, 'port1\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 08:20:14 executing program 7: mkdir(&(0x7f0000030ffa)='./bus\x00', 0x0) r0 = open(&(0x7f000001dff4)='./bus/file0\x00', 0x880c0, 0x0) truncate(&(0x7f000003c000)='./bus/file0\x00', 0xe88c) mmap(&(0x7f0000004000/0xc000)=nil, 0xc000, 0x3, 0x12, r0, 0x0) lstat(&(0x7f0000005ff4)='./bus/file0\x00', &(0x7f000003bfbc)) lseek(r0, 0x0, 0x3) 2018/04/07 08:20:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8e18) sendfile(r1, r2, &(0x7f00007ed000), 0x2b) 2018/04/07 08:20:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000b0c000)='net/dev\x00') sendfile(r0, r0, &(0x7f000032c000)=0xfffffff, 0xdb) 2018/04/07 08:20:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x2, &(0x7f0000000ff0)=[{0x28, 0x0, 0x0, 0xfffffffffffff00c}, {0x80000006}]}, 0x10) sendto(r0, &(0x7f0000fbe000), 0xfd27, 0x0, 0x0, 0xb6) 2018/04/07 08:20:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_targets\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)="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") sendfile(r1, r0, &(0x7f000030fff8), 0x10001) 2018/04/07 08:20:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1aa1", 0x2}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0x80, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/175, 0xaf}], 0x1, &(0x7f0000ec7000)}, 0x0) [ 60.728319] ================================================================== [ 60.735745] BUG: KMSAN: uninit-value in sha_transform+0x58ec/0x6320 [ 60.742148] CPU: 1 PID: 5360 Comm: syz-executor1 Not tainted 4.16.0+ #81 [ 60.748976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.758321] Call Trace: [ 60.760915] dump_stack+0x185/0x1d0 [ 60.764547] ? sha_transform+0x58ec/0x6320 [ 60.768781] kmsan_report+0x142/0x240 [ 60.772581] __msan_warning_32+0x6c/0xb0 [ 60.776641] sha_transform+0x58ec/0x6320 [ 60.780708] ? kmsan_set_origin_inline+0x6b/0x120 [ 60.785552] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 60.791005] ? __msan_poison_alloca+0x15c/0x1d0 [ 60.795677] ? shash_async_update+0x290/0x360 [ 60.800180] crypto_sha1_update+0x4cb/0x5b0 [ 60.804516] ? crypto_hash_walk_first+0x210/0x380 [ 60.809361] ? shash_async_update+0x225/0x360 [ 60.813861] ? rmd320_transform+0x7f10/0x7f10 [ 60.818356] shash_async_update+0x290/0x360 [ 60.822675] ? shash_async_init+0x270/0x270 [ 60.826993] hash_sendpage+0x904/0xe10 [ 60.830877] ? hash_recvmsg+0xd50/0xd50 [ 60.834858] sock_sendpage+0x1de/0x2c0 [ 60.838752] pipe_to_sendpage+0x31b/0x430 [ 60.842903] ? sock_fasync+0x2b0/0x2b0 [ 60.846794] ? propagate_umount+0x3a30/0x3a30 [ 60.851290] __splice_from_pipe+0x49a/0xf30 [ 60.855616] ? generic_splice_sendpage+0x2a0/0x2a0 [ 60.860546] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 60.865912] generic_splice_sendpage+0x1c6/0x2a0 [ 60.870673] ? iter_file_splice_write+0x1710/0x1710 [ 60.875694] ? iter_file_splice_write+0x1710/0x1710 [ 60.880712] direct_splice_actor+0x19b/0x200 [ 60.885124] splice_direct_to_actor+0x764/0x1040 [ 60.889880] ? do_splice_direct+0x540/0x540 [ 60.894201] ? security_file_permission+0x28f/0x4b0 [ 60.899219] ? rw_verify_area+0x35e/0x580 [ 60.903374] do_splice_direct+0x335/0x540 [ 60.907526] do_sendfile+0x1067/0x1e40 [ 60.911428] SYSC_sendfile64+0x1b3/0x300 [ 60.915494] SyS_sendfile64+0x64/0x90 [ 60.919297] do_syscall_64+0x309/0x430 [ 60.923191] ? SYSC_sendfile+0x320/0x320 [ 60.927258] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 60.932447] RIP: 0033:0x455259 [ 60.935633] RSP: 002b:00007fac5cf90c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 60.943339] RAX: ffffffffffffffda RBX: 00007fac5cf916d4 RCX: 0000000000455259 [ 60.950607] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 60.957870] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 60.965134] R10: 0000000000008e18 R11: 0000000000000246 R12: 00000000ffffffff [ 60.972400] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 60.979675] [ 60.981297] Uninit was created at: [ 60.984842] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 60.989857] kmsan_alloc_page+0x82/0xe0 [ 60.993830] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 60.998581] alloc_pages_vma+0xcc8/0x1800 [ 61.002734] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 61.007751] shmem_getpage_gfp+0x35db/0x5770 [ 61.012162] shmem_fallocate+0xde2/0x1610 [ 61.016309] vfs_fallocate+0x9dc/0xde0 [ 61.020195] SYSC_fallocate+0x119/0x1d0 [ 61.024166] SyS_fallocate+0x64/0x90 [ 61.027875] do_syscall_64+0x309/0x430 [ 61.031765] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.036942] ================================================================== [ 61.044295] Disabling lock debugging due to kernel taint [ 61.049737] Kernel panic - not syncing: panic_on_warn set ... [ 61.049737] [ 61.057109] CPU: 1 PID: 5360 Comm: syz-executor1 Tainted: G B 4.16.0+ #81 [ 61.065241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.074592] Call Trace: [ 61.077180] dump_stack+0x185/0x1d0 [ 61.080813] panic+0x39d/0x940 [ 61.084031] ? sha_transform+0x58ec/0x6320 [ 61.088266] kmsan_report+0x238/0x240 [ 61.092073] __msan_warning_32+0x6c/0xb0 [ 61.096137] sha_transform+0x58ec/0x6320 [ 61.100199] ? kmsan_set_origin_inline+0x6b/0x120 [ 61.105047] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 61.110500] ? __msan_poison_alloca+0x15c/0x1d0 [ 61.115165] ? shash_async_update+0x290/0x360 [ 61.119663] crypto_sha1_update+0x4cb/0x5b0 [ 61.123990] ? crypto_hash_walk_first+0x210/0x380 [ 61.128830] ? shash_async_update+0x225/0x360 [ 61.133328] ? rmd320_transform+0x7f10/0x7f10 [ 61.137824] shash_async_update+0x290/0x360 [ 61.142150] ? shash_async_init+0x270/0x270 [ 61.146473] hash_sendpage+0x904/0xe10 [ 61.150367] ? hash_recvmsg+0xd50/0xd50 [ 61.154349] sock_sendpage+0x1de/0x2c0 [ 61.158250] pipe_to_sendpage+0x31b/0x430 [ 61.162406] ? sock_fasync+0x2b0/0x2b0 [ 61.166302] ? propagate_umount+0x3a30/0x3a30 [ 61.170796] __splice_from_pipe+0x49a/0xf30 [ 61.175120] ? generic_splice_sendpage+0x2a0/0x2a0 [ 61.180053] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 61.185420] generic_splice_sendpage+0x1c6/0x2a0 [ 61.190188] ? iter_file_splice_write+0x1710/0x1710 [ 61.195212] ? iter_file_splice_write+0x1710/0x1710 [ 61.200233] direct_splice_actor+0x19b/0x200 [ 61.204646] splice_direct_to_actor+0x764/0x1040 [ 61.209404] ? do_splice_direct+0x540/0x540 [ 61.213733] ? security_file_permission+0x28f/0x4b0 [ 61.218761] ? rw_verify_area+0x35e/0x580 [ 61.222919] do_splice_direct+0x335/0x540 [ 61.227071] do_sendfile+0x1067/0x1e40 [ 61.230977] SYSC_sendfile64+0x1b3/0x300 [ 61.235048] SyS_sendfile64+0x64/0x90 [ 61.238854] do_syscall_64+0x309/0x430 [ 61.242742] ? SYSC_sendfile+0x320/0x320 [ 61.246811] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.251996] RIP: 0033:0x455259 [ 61.255179] RSP: 002b:00007fac5cf90c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 61.262884] RAX: ffffffffffffffda RBX: 00007fac5cf916d4 RCX: 0000000000455259 [ 61.270152] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 61.277412] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 61.284670] R10: 0000000000008e18 R11: 0000000000000246 R12: 00000000ffffffff [ 61.291937] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 61.299629] Dumping ftrace buffer: [ 61.303154] (ftrace buffer empty) [ 61.306840] Kernel Offset: disabled [ 61.310438] Rebooting in 86400 seconds..