INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. 2018/04/16 23:00:43 fuzzer started 2018/04/16 23:00:44 dialing manager at 10.128.0.26:43021 2018/04/16 23:00:50 kcov=true, comps=false 2018/04/16 23:00:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:00:54 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$netlink(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000000200)=[@cred={0x20, 0x1, 0x2}], 0x20}, 0x0) 2018/04/16 23:00:54 executing program 7: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002840)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000002940)=0xe8) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000001e80), &(0x7f0000002240)=0x58, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000002300)=""/140) r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fsetxattr(r0, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) 2018/04/16 23:00:54 executing program 3: syslog(0x3, &(0x7f0000000080)=""/42, 0x2a) 2018/04/16 23:00:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/226) 2018/04/16 23:00:54 executing program 5: 2018/04/16 23:00:54 executing program 6: 2018/04/16 23:00:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r0, &(0x7f0000f46000)=[{&(0x7f0000120000)=""/4096, 0x1000}], 0x1) syzkaller login: [ 45.718592] ip (3741) used greatest stack depth: 54688 bytes left [ 46.429601] ip (3801) used greatest stack depth: 54312 bytes left [ 47.405312] ip (3893) used greatest stack depth: 54200 bytes left [ 47.666652] ip (3913) used greatest stack depth: 53656 bytes left [ 47.922759] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.929359] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.975210] device bridge_slave_0 entered promiscuous mode [ 48.019496] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.026139] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.045531] device bridge_slave_0 entered promiscuous mode [ 48.060272] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.066824] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.106518] device bridge_slave_0 entered promiscuous mode [ 48.123223] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.129791] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.144842] device bridge_slave_0 entered promiscuous mode [ 48.157400] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.163954] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.183281] device bridge_slave_0 entered promiscuous mode [ 48.200776] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.207338] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.225451] device bridge_slave_0 entered promiscuous mode [ 48.235723] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.242272] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.253616] device bridge_slave_1 entered promiscuous mode [ 48.265180] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.271749] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.291631] device bridge_slave_0 entered promiscuous mode [ 48.325663] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.332233] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.354938] device bridge_slave_1 entered promiscuous mode [ 48.365570] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.372153] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.386881] device bridge_slave_1 entered promiscuous mode [ 48.398477] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.404973] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.433156] device bridge_slave_1 entered promiscuous mode [ 48.440487] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.447116] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.480508] device bridge_slave_1 entered promiscuous mode [ 48.496930] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.503468] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.524598] device bridge_slave_1 entered promiscuous mode [ 48.553724] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.560255] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.570257] device bridge_slave_0 entered promiscuous mode [ 48.585815] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.593723] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.601437] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.607973] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.634175] device bridge_slave_1 entered promiscuous mode [ 48.657258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.667588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.675762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.747659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.791846] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.811159] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.817713] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.860907] device bridge_slave_1 entered promiscuous mode [ 48.872668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.882588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.894449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.909927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.921632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.935256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.112961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.123082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.371941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.791647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.928133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.960238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.989614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.001402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.010582] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.030691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.163721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.178293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.191505] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.201406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.248997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.257545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.383949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.436067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.437926] ip (4096) used greatest stack depth: 53640 bytes left [ 50.650794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 51.004345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.233143] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.248652] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.298850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.308201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.321153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.371122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.451115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.473292] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.483713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.491159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.507698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.544332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.557860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.571765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.582951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.694579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.710508] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.717874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.731801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.759560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.779790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.798392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.815264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.829313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.837898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.847457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.876881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.909686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.938585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.958540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.966905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.974250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.983325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.992396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.001989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.022216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.030886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.046861] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.073278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.083816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.114702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.147898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.174635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.191882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.201119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.214382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 52.224261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.240971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.252557] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.262135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.278169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.300917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.313710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.321138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.342880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.389832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.425380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.463294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.475276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.496414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.680501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.687930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.701868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.398538] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.405138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.412140] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.418657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.436624] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.443791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.553163] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.559713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.566646] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.573178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.618120] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.663826] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.670372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.677310] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.683796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.749159] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.791666] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.798229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.805240] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.811782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.864138] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.877114] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.883664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.890580] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.897148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.942764] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.952386] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.958941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.965914] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.972439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.989264] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.007478] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.014026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.021021] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.027595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.087123] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.305642] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.312187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.319148] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.325706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.382786] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.457172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.473278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.513206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.551181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.590424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.613550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.628277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.427666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.613538] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.627257] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.676304] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.742582] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.839439] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.077967] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.252596] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.258926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.275227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.309612] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.370324] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.376865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.385256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.508311] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.514662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.526707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.561463] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.567966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.578714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.647227] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.653574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.664871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.710498] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.717907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.734808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.010912] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.020859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.034341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.196144] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.202569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.216156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/16 23:01:22 executing program 6: 2018/04/16 23:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xffffffffffffffe0}, {0x16}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffe0, 0x9}, &(0x7f0000000100)=0x10) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f000086c000)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000885ff8)='./file0\x00', &(0x7f0000735000), &(0x7f0000abffd0)) seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) r0 = open(&(0x7f000022b000)='./file0\x00', 0x401, 0x0) accept4$llc(r0, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x80000) 2018/04/16 23:01:23 executing program 7: r0 = socket$inet(0x2, 0x3, 0x10) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000a19000)=0x6, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000ff7000), 0x0, 0x0, &(0x7f000066354c)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/16 23:01:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430545a540dc1c149b7b81579f6a41c51f7d51933090082ab867dac761faf"}) 2018/04/16 23:01:23 executing program 6: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144a000ae9", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002a80)={0x0, 0x0, &(0x7f00000029c0), 0x0, &(0x7f0000002a00)=""/85, 0x55}, 0x0) 2018/04/16 23:01:23 executing program 5: mkdir(&(0x7f0000b17ff8)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000060cff8)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x402, r0) exit(0x0) getdents(r0, &(0x7f0000cdb000)=""/98, 0x62) 2018/04/16 23:01:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) 2018/04/16 23:01:23 executing program 3: perf_event_open(&(0x7f00000bf000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x20) 2018/04/16 23:01:23 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) syz_open_pts(0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000380)=""/121) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)="2f6578650000000c05901caf02d9543cb25ad3b3a5efdc02a232b8000000") fchown(r0, 0x0, 0x0) 2018/04/16 23:01:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) unshare(0x40600) fadvise64(r0, 0x0, 0x0, 0x0) [ 72.265547] audit: type=1326 audit(1523919683.264:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5776 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0xffff0000 2018/04/16 23:01:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430545a540dc1c149b7b81579f6a41c51f7d51933090082ab867dac761faf"}) 2018/04/16 23:01:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000482000)="be", 0x1, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000dd9000)="b7", 0x1, 0x0, &(0x7f00007a5000)={0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000)='c', 0x1, 0x1, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:01:23 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140)={0x0, r1+10000000}, &(0x7f00000001c0), 0x8) 2018/04/16 23:01:23 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) unshare(0x40600) write$binfmt_aout(r0, &(0x7f0000000140), 0x20) [ 73.081426] audit: type=1326 audit(1523919684.080:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5776 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 [ 73.100966] audit: type=1326 audit(1523919684.080:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5776 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455329 code=0x0 [ 73.120461] audit: type=1326 audit(1523919684.080:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5776 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45814a code=0x0 2018/04/16 23:01:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') getdents(r0, &(0x7f0000000000), 0x0) 2018/04/16 23:01:24 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) 2018/04/16 23:01:24 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) syz_open_pts(0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000380)=""/121) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)="2f6578650000000c05901caf02d9543cb25ad3b3a5efdc02a232b8000000") fchown(r0, 0x0, 0x0) 2018/04/16 23:01:24 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140)={0x0, r1+10000000}, &(0x7f00000001c0), 0x8) 2018/04/16 23:01:24 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430545a540dc1c149b7b81579f6a41c51f7d51933090082ab867dac761faf"}) 2018/04/16 23:01:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000482000), 0x0, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) 2018/04/16 23:01:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) unshare(0x40600) fadvise64(r0, 0x0, 0x0, 0x0) 2018/04/16 23:01:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) 2018/04/16 23:01:24 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) inotify_rm_watch(r0, r1) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) setfsuid(0x0) 2018/04/16 23:01:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000005cc0)={&(0x7f0000005c80)=@ipv6_newroute={0x1c, 0x18, 0x711, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:01:24 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, 0x0, 0x200, 0x0, 0x0, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x20}, 0x1}, 0x0) r2 = creat(&(0x7f0000000180)='./file1\x00', 0x0) fallocate(r2, 0x8, 0x0, 0x2260000) 2018/04/16 23:01:24 executing program 1: r0 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) preadv(r0, &(0x7f0000450000)=[{&(0x7f0000000080)=""/175, 0x376}], 0x1, 0x0) timer_create(0x0, &(0x7f0000580000)={0x0, 0x12, 0x0, @thr={&(0x7f0000f44000), &(0x7f0000ff5fd2)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) 2018/04/16 23:01:24 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) sendto$inet(r0, &(0x7f0000865000), 0x0, 0x0, &(0x7f0000fd9ff0)={0x2, 0x200004e20, @rand_addr}, 0x10) 2018/04/16 23:01:24 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430545a540dc1c149b7b81579f6a41c51f7d51933090082ab867dac761faf"}) 2018/04/16 23:01:24 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140)={0x0, r1+10000000}, &(0x7f00000001c0), 0x8) 2018/04/16 23:01:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:01:25 executing program 5: syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004f0000250000000000069078ffffffff000000007a934e2004019078007ff5240032330e"], &(0x7f0000000040)) 2018/04/16 23:01:25 executing program 2: mount(&(0x7f0000000280)='..', &(0x7f0000000080)='..', &(0x7f0000000780)='pipefs\x00', 0xfffffffffffffffc, &(0x7f0000000180)) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140)={0x0, r1+10000000}, &(0x7f00000001c0), 0x8) 2018/04/16 23:01:25 executing program 4: mkdir(&(0x7f0000000080)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", &(0x7f0000000240)='./file0\x00') 2018/04/16 23:01:25 executing program 7: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000280)=@abs={0x1}, 0x66) 2018/04/16 23:01:25 executing program 0: perf_event_open(&(0x7f00002b5f88)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/239) 2018/04/16 23:01:25 executing program 1: r0 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) preadv(r0, &(0x7f0000450000)=[{&(0x7f0000000080)=""/175, 0x376}], 0x1, 0x0) timer_create(0x0, &(0x7f0000580000)={0x0, 0x12, 0x0, @thr={&(0x7f0000f44000), &(0x7f0000ff5fd2)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) 2018/04/16 23:01:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:01:25 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000002280)='cpuset.mems\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/174, 0xae) 2018/04/16 23:01:25 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000776000)=[{&(0x7f00000004c0)="240000005e00030207fffd946fa283bc0ae6e6000000ee8903a201000000999801000000", 0x24}], 0x1}, 0x0) 2018/04/16 23:01:25 executing program 4: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x82) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000001) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/16 23:01:25 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x100000000000000, 0x0, 0x0, 0x0, 0x460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140), &(0x7f00000001c0), 0x8) 2018/04/16 23:01:25 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/66, 0x42) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000880)={0x0, &(0x7f0000000780)=""/224}) 2018/04/16 23:01:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:01:25 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}, 0x2}) 2018/04/16 23:01:25 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000040)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x5, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2018/04/16 23:01:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140), &(0x7f00000001c0), 0x8) 2018/04/16 23:01:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) 2018/04/16 23:01:26 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}, 0x2}) 2018/04/16 23:01:26 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000300), 0x4) 2018/04/16 23:01:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:01:26 executing program 1: r0 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) preadv(r0, &(0x7f0000450000)=[{&(0x7f0000000080)=""/175, 0x376}], 0x1, 0x0) timer_create(0x0, &(0x7f0000580000)={0x0, 0x12, 0x0, @thr={&(0x7f0000f44000), &(0x7f0000ff5fd2)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) 2018/04/16 23:01:26 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x31, &(0x7f0000000140), &(0x7f00000001c0), 0x8) 2018/04/16 23:01:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2b) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, 0x1c) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000b80)="2c92a890325a0e772585edd0636ff9c6af78f08e4bb0de45b0fd1dc6674c6fe162826904c38f0af58be7cc2949f739cbf566b699af5ac46589f43b4130246c3d3fa318dfcaf20fe64f32f606b2a88108b354c03f795f6f762c97a72d50b19191b2490dffd0aa6ecf1e2ab88794afab566ba12ea4506fd5f03be44d92baf3413a889c61bcbdfac681a8494b5c9bca9bfaa0244c70c17190823fd367079926c9dd8d5e63bc65693f725b4d0b39798b6d0fda859e1abc6b26d0ae97e11f327eb709951a7c87fbe7a6d63d98fccb3dea972a23157b1a97f9b6ced28f161d1f2dddc0bf60884dfc5cae270b77e8cf19b2abbb42abfaa3bf29b88c8a7e23f6fc50346a3da5bffcdc7a25c898edf574e7569ab2c09644709e3723e99f46d3c5e29447413f09211114cef7d311b94cba0a63f162994a36a4972e96347bde4ff1c5e8e333a9fcab9057ecefc9e961b712207a2017e07d3c4c3f04701e851ea1d077d8223394ab4e2946c07d14a0d38cdd5909e710294cd4f8b7953224265b93fdae2202c42ab076c0aecac311926925753f408a27f247dc463027ea7aa3fb7378024cee52c657019a88cdf762b00a7dc63153215c82f2914233707aea15c744aa2a531a4839112c3ddab8c0e224d050a048bf6266656de2efef83b37fce55ea9d7a6a558f6dce35c46ecc9aa139d526fdc6d1e5b4fbd083816027aaa8bf450e4b0777ccda08c5c63406d38e4cc08d8e0bcda20dad6f7be3713002811f25d568c8eca502c364727f2965114326a92b8333b8d29c1741e69742fba96a75ddc98cff7f0b61449fa1b468ec1620aac455025408047f0284a13f164bf223e635a8be678310fb1d9265799231458955f417a637aa7d1bb156da2419edfd561b5b3cb4db24dea937bee502027137fbd71fb96001b79884d6fd463041ecc3df6c9008002d2e7306ca55abdebbb31caf0a35f0dd8bf7370a95b0deb5e52c98e53f8c926ba522f3aa6e1c2958b7bc25483906751dc16bf0b1a176ba20c274042a956b33e5d9cfa4891d2a4d108a6c72b4235e59ed01057c5c2de7162b3a4b1e7d1bc8f60ee9eb2cc620f00e082c7566c06a1763846183364ff36d2cd18d99a03515cf2093ea22343701d9745e1525060d04c922a888549df55346b97b6dfb406cb750f87d43063cfb7933450e408330700469ebe4bb06cef9c568f10f2bcac31c21990b37fa22ca8afd2c2b328ce21270df2e92a81304e0f9284c39340cbfda7a81e8693bacf4ae32407c04c0ecb3e0eb639d7bbefd35f2782e91f7bc4e2b345fc88252ab375b2fb36d31c20e91dd88c850c32f82166e19d8373b7ab436fd56b5a3710872203ebacf68b32783bcfce494152f304a2fc2f1ba2285e3c69d15b4bf23272d5a96e35c997d6f4d2fbcb63600acb33e4b50a1c94835a346a78a129fb34e6b6c6e8f4e0f8473f9bd82a11986f2a6b9e1c7feffffffffffffff7719410883b5fd597a4ae7046a6d492d164e17d5082ade546a6b68eabb03633635a8ff207b0ec2a2ed73e89996aacaaff8b3dadb246a462a66b1b5a1bbc9c949ea5236d57383622fe513afc6fdd350c46032061a2ed2fd6d3a5f4a21b24f740bbd6a378edf004fe9b055e1aeb713a5c0a56ad130da8917e7d03490994d335ec6d3f266b8a111285582", 0x49c}], 0x1, &(0x7f0000000240)}, 0x0) [ 75.575873] ================================================================== [ 75.583350] BUG: KMSAN: uninit-value in gf128mul_init_4k_lle+0x212/0x5c0 [ 75.590216] CPU: 0 PID: 5927 Comm: syz-executor0 Not tainted 4.16.0+ #84 [ 75.597072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.606447] Call Trace: [ 75.609070] dump_stack+0x185/0x1d0 [ 75.612731] ? gf128mul_init_4k_lle+0x212/0x5c0 [ 75.617431] kmsan_report+0x142/0x240 [ 75.621261] __msan_warning_32+0x6c/0xb0 [ 75.625364] gf128mul_init_4k_lle+0x212/0x5c0 [ 75.629896] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 75.635332] ? ghash_setkey+0x56/0x280 [ 75.639236] ghash_setkey+0x185/0x280 [ 75.643084] ? ghash_final+0x1f0/0x1f0 [ 75.647109] shash_async_setkey+0x337/0x4c0 [ 75.651458] ? shash_async_digest+0x1b0/0x1b0 [ 75.655985] crypto_ahash_setkey+0x31a/0x470 [ 75.660429] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 75.665677] crypto_gcm_setkey+0xa3c/0xc10 [ 75.669952] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 75.674390] crypto_aead_setkey+0x373/0x4c0 [ 75.678744] aead_setkey+0xa0/0xc0 [ 75.682320] alg_setsockopt+0x6c5/0x740 [ 75.686375] ? aead_release+0x90/0x90 [ 75.690208] ? alg_accept+0xd0/0xd0 [ 75.693860] SYSC_setsockopt+0x4b8/0x570 [ 75.697949] SyS_setsockopt+0x76/0xa0 [ 75.701766] do_syscall_64+0x309/0x430 [ 75.705681] ? SYSC_recv+0xe0/0xe0 [ 75.709250] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.714462] RIP: 0033:0x455329 [ 75.717672] RSP: 002b:00007f2180e42c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 75.725408] RAX: ffffffffffffffda RBX: 00007f2180e436d4 RCX: 0000000000455329 [ 75.732675] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 75.739962] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 75.747336] R10: 00000000201ec000 R11: 0000000000000246 R12: 00000000ffffffff [ 75.754620] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 75.761895] [ 75.763508] Uninit was stored to memory at: [ 75.767838] kmsan_internal_chain_origin+0x12b/0x210 [ 75.772940] kmsan_memcpy_origins+0x11d/0x170 [ 75.777438] __msan_memcpy+0x19f/0x1f0 [ 75.781329] gf128mul_init_4k_lle+0x99/0x5c0 [ 75.785732] ghash_setkey+0x185/0x280 [ 75.789537] shash_async_setkey+0x337/0x4c0 [ 75.793868] crypto_ahash_setkey+0x31a/0x470 [ 75.798271] crypto_gcm_setkey+0xa3c/0xc10 [ 75.802507] crypto_aead_setkey+0x373/0x4c0 [ 75.806843] aead_setkey+0xa0/0xc0 [ 75.810395] alg_setsockopt+0x6c5/0x740 [ 75.814382] SYSC_setsockopt+0x4b8/0x570 [ 75.818467] SyS_setsockopt+0x76/0xa0 [ 75.822287] do_syscall_64+0x309/0x430 [ 75.826172] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.831363] Uninit was stored to memory at: [ 75.835710] kmsan_internal_chain_origin+0x12b/0x210 [ 75.840849] __msan_chain_origin+0x69/0xc0 [ 75.845100] __crypto_xor+0x23c/0x16b0 [ 75.848998] crypto_ctr_crypt_inplace+0x29a/0x3a0 [ 75.853860] crypto_ctr_crypt+0x54c/0x7d0 [ 75.858051] skcipher_encrypt_blkcipher+0x222/0x320 [ 75.863076] crypto_gcm_setkey+0x6a3/0xc10 [ 75.867336] crypto_aead_setkey+0x373/0x4c0 [ 75.871662] aead_setkey+0xa0/0xc0 [ 75.875202] alg_setsockopt+0x6c5/0x740 [ 75.879177] SYSC_setsockopt+0x4b8/0x570 [ 75.883234] SyS_setsockopt+0x76/0xa0 [ 75.887038] do_syscall_64+0x309/0x430 [ 75.890946] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.896140] Local variable description: ----vla@crypto_ctr_crypt_inplace [ 75.903089] Variable was created at: [ 75.906902] crypto_ctr_crypt_inplace+0x19a/0x3a0 [ 75.911740] crypto_ctr_crypt+0x54c/0x7d0 [ 75.915883] ================================================================== [ 75.923233] Disabling lock debugging due to kernel taint [ 75.928680] Kernel panic - not syncing: panic_on_warn set ... [ 75.928680] [ 75.936073] CPU: 0 PID: 5927 Comm: syz-executor0 Tainted: G B 4.16.0+ #84 [ 75.944221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.953569] Call Trace: [ 75.956162] dump_stack+0x185/0x1d0 [ 75.959786] panic+0x39d/0x940 [ 75.962985] ? gf128mul_init_4k_lle+0x212/0x5c0 [ 75.967657] kmsan_report+0x238/0x240 [ 75.971449] __msan_warning_32+0x6c/0xb0 [ 75.975526] gf128mul_init_4k_lle+0x212/0x5c0 [ 75.980032] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 75.985400] ? ghash_setkey+0x56/0x280 [ 75.989299] ghash_setkey+0x185/0x280 [ 75.993092] ? ghash_final+0x1f0/0x1f0 [ 75.996968] shash_async_setkey+0x337/0x4c0 [ 76.001296] ? shash_async_digest+0x1b0/0x1b0 [ 76.005789] crypto_ahash_setkey+0x31a/0x470 [ 76.010198] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 76.015393] crypto_gcm_setkey+0xa3c/0xc10 [ 76.019631] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 76.024041] crypto_aead_setkey+0x373/0x4c0 [ 76.028365] aead_setkey+0xa0/0xc0 [ 76.031905] alg_setsockopt+0x6c5/0x740 [ 76.035884] ? aead_release+0x90/0x90 [ 76.039680] ? alg_accept+0xd0/0xd0 [ 76.043307] SYSC_setsockopt+0x4b8/0x570 [ 76.047369] SyS_setsockopt+0x76/0xa0 [ 76.051170] do_syscall_64+0x309/0x430 [ 76.055052] ? SYSC_recv+0xe0/0xe0 [ 76.058592] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.063779] RIP: 0033:0x455329 [ 76.066969] RSP: 002b:00007f2180e42c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 76.074674] RAX: ffffffffffffffda RBX: 00007f2180e436d4 RCX: 0000000000455329 [ 76.081936] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 76.089213] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 76.096477] R10: 00000000201ec000 R11: 0000000000000246 R12: 00000000ffffffff [ 76.103754] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 76.111570] Dumping ftrace buffer: [ 76.115107] (ftrace buffer empty) [ 76.118806] Kernel Offset: disabled [ 76.122424] Rebooting in 86400 seconds..