INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.42' (ECDSA) to the list of known hosts. 2018/04/12 13:02:45 fuzzer started 2018/04/12 13:02:45 dialing manager at 10.128.0.26:41677 2018/04/12 13:02:51 kcov=true, comps=false 2018/04/12 13:02:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) 2018/04/12 13:02:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000013c0)={'TPROXY\x00'}, &(0x7f0000001400)=0x1e) 2018/04/12 13:02:54 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000815000)={0x0, 0x0}) 2018/04/12 13:02:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe5ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) 2018/04/12 13:02:54 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0x1000}) 2018/04/12 13:02:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00008b2000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) flistxattr(r0, &(0x7f0000000100)=""/207, 0xcf) 2018/04/12 13:02:54 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000013000), &(0x7f0000002000)=0x14) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/12 13:02:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000330000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000855ff8)='./file0\x00', &(0x7f0000000200)='ufs\x00', 0x0, &(0x7f0000bd9fff)) syzkaller login: [ 41.721605] ip (3755) used greatest stack depth: 54672 bytes left [ 42.921317] ip (3876) used greatest stack depth: 54544 bytes left [ 43.003803] ip (3882) used greatest stack depth: 54200 bytes left [ 43.038449] ip (3885) used greatest stack depth: 53976 bytes left [ 45.108878] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.171865] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.191953] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.200172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.306604] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.365171] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.453275] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.578712] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.950231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.062305] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.094932] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.195649] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.412971] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.452776] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.507253] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.516819] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.711600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.717909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.732672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.908880] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.915157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.926615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.951862] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.963864] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.984569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.999622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.037512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.070603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.161950] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.170096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.190846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.238563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.244976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.257619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.305935] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.312236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.331794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.409528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.415812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.424806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 13:03:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f00000000c0)) 2018/04/12 13:03:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) unshare(0x400) recvmmsg(r0, &(0x7f0000dd9fc0), 0x0, 0x0, 0x0) 2018/04/12 13:03:12 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, &(0x7f0000000040), &(0x7f0000000c00)=ANY=[@ANYBLOB="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"]}, 0x348) 2018/04/12 13:03:12 executing program 7: r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000001200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) sendmmsg(r0, &(0x7f0000003080)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14, &(0x7f0000000480), 0x0, &(0x7f0000000500)}}, {{0x0, 0x0, &(0x7f0000002940), 0x0, &(0x7f0000002980)}}], 0x2, 0x0) 2018/04/12 13:03:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r0, &(0x7f0000002fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004fe0)=[{&(0x7f0000006000)="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", 0x5b5}], 0x1, &(0x7f0000006000)}, 0x0) 2018/04/12 13:03:12 executing program 5: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x10001, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/12 13:03:12 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000013000), &(0x7f0000002000)=0x14) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/12 13:03:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000001ffa)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x1, 0x4) 2018/04/12 13:03:12 executing program 2: r0 = socket(0x1f, 0x80003, 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000200)=""/135, &(0x7f00000000c0)=0x87) 2018/04/12 13:03:12 executing program 5: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x10001, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/12 13:03:12 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000b70000)=[{}], 0x1, 0x0) 2018/04/12 13:03:12 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x1b8, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000080), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'gretap0\x00', 'nr0\x00', 'vcan0\x00', 'bpq0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xb0, 0xb0, 0x128, [@devgroup={'devgroup\x00', 0x18}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "756a2e858e29155c1ccba70383cc498c3703a3248ad53c6102a999a10ffd69d74d40248e1075e5cffa50e5cbd512ded31e493126a6a5330380b79de22dab563a"}}}}]}]}, 0x230) 2018/04/12 13:03:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x2}, 0x2c) 2018/04/12 13:03:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='khreaded\x00', 0x1) 2018/04/12 13:03:12 executing program 0: statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) 2018/04/12 13:03:13 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000013000), &(0x7f0000002000)=0x14) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/12 13:03:13 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x39}}) 2018/04/12 13:03:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)={[{@check_strict='check=strict', 0x2c}, {@nfs='nfs', 0x2c}]}) 2018/04/12 13:03:13 executing program 1: r0 = socket(0x2, 0x3, 0x40000000000000ff) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000000)="36000000000040071901000000000000de008859eff71d45", 0x18, 0x0, &(0x7f00000001c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/12 13:03:13 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x14}}) 2018/04/12 13:03:13 executing program 0: r0 = socket$netlink(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8929, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b}}) 2018/04/12 13:03:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}], 0x20) 2018/04/12 13:03:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065b000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cdf944e36380ba6f5f48c46037000100", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000066c0)=[{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)}, {0x0, 0x0, &(0x7f0000000780)}], 0x2, 0x0) 2018/04/12 13:03:13 executing program 0: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f000001a000/0x1000)=nil, 0x1000, 0x0) 2018/04/12 13:03:13 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_gstrings={0x1b, 0x8}}) 2018/04/12 13:03:13 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000fdb000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) dup2(r2, r1) [ 58.588281] ================================================================== [ 58.595706] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 58.601770] CPU: 1 PID: 5176 Comm: syz-executor4 Not tainted 4.16.0+ #83 [ 58.608611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.617963] Call Trace: [ 58.620571] dump_stack+0x185/0x1d0 [ 58.624209] ? vmac_setkey+0x337/0x940 [ 58.628096] kmsan_report+0x142/0x240 [ 58.631903] ? aes_set_key+0x260/0x260 [ 58.635798] __msan_warning_32+0x6c/0xb0 [ 58.639858] ? aes_set_key+0x260/0x260 [ 58.643749] vmac_setkey+0x337/0x940 [ 58.647473] ? vmac_final+0x3f80/0x3f80 [ 58.651448] shash_async_setkey+0x337/0x4c0 [ 58.655774] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 58.661144] ? trace_kmalloc+0xb6/0x2b0 [ 58.665127] ? shash_async_digest+0x1b0/0x1b0 [ 58.669626] crypto_ahash_setkey+0x31a/0x470 [ 58.674044] hash_setkey+0x8b/0xa0 [ 58.677585] alg_setsockopt+0x6c5/0x740 [ 58.681565] ? hash_release+0x50/0x50 [ 58.685365] ? alg_accept+0xd0/0xd0 [ 58.688998] SYSC_setsockopt+0x4b8/0x570 [ 58.693070] SyS_setsockopt+0x76/0xa0 [ 58.696875] do_syscall_64+0x309/0x430 [ 58.700772] ? SYSC_recv+0xe0/0xe0 [ 58.704322] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 58.709504] RIP: 0033:0x455279 [ 58.712688] RSP: 002b:00007fc7ec25bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 58.720393] RAX: ffffffffffffffda RBX: 00007fc7ec25c6d4 RCX: 0000000000455279 [ 58.727654] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 58.734923] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 58.742189] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 58.749455] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 58.756724] [ 58.758347] Local variable description: ----out.i@vmac_setkey [ 58.764222] Variable was created at: [ 58.767941] vmac_setkey+0x93/0x940 [ 58.771566] shash_async_setkey+0x337/0x4c0 [ 58.775877] ================================================================== [ 58.783230] Disabling lock debugging due to kernel taint [ 58.788677] Kernel panic - not syncing: panic_on_warn set ... [ 58.788677] [ 58.796047] CPU: 1 PID: 5176 Comm: syz-executor4 Tainted: G B 4.16.0+ #83 [ 58.804186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.813541] Call Trace: [ 58.816143] dump_stack+0x185/0x1d0 [ 58.819777] panic+0x39d/0x940 [ 58.823002] ? vmac_setkey+0x337/0x940 [ 58.826888] kmsan_report+0x238/0x240 [ 58.830685] ? aes_set_key+0x260/0x260 [ 58.834572] __msan_warning_32+0x6c/0xb0 2018/04/12 13:03:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)={0x14, 0x22, 0x109, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 2018/04/12 13:03:13 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x103081, 0x0) write$tun(r0, &(0x7f0000000100)={@void, @void, @llc={@snap={0xffffff92, 0x0, "1f", "cf66ae"}}}, 0x8) 2018/04/12 13:03:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00001afff8)={0x0, 0x2000000002}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000c60000)={0x3}, 0x10) write(r0, &(0x7f000052c000)="c6", 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000810000)={0x0, 0x1}, 0x8) 2018/04/12 13:03:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/04/12 13:03:13 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl$VHOST_SET_VRING_ERR(r0, 0x31f, &(0x7f0000000040)={0xffffffff00000042}) [ 58.838634] ? aes_set_key+0x260/0x260 [ 58.842527] vmac_setkey+0x337/0x940 [ 58.846251] ? vmac_final+0x3f80/0x3f80 [ 58.850225] shash_async_setkey+0x337/0x4c0 [ 58.854544] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 58.859911] ? trace_kmalloc+0xb6/0x2b0 [ 58.863889] ? shash_async_digest+0x1b0/0x1b0 [ 58.868387] crypto_ahash_setkey+0x31a/0x470 [ 58.872800] hash_setkey+0x8b/0xa0 [ 58.876348] alg_setsockopt+0x6c5/0x740 [ 58.880330] ? hash_release+0x50/0x50 [ 58.884132] ? alg_accept+0xd0/0xd0 [ 58.887765] SYSC_setsockopt+0x4b8/0x570 [ 58.891841] SyS_setsockopt+0x76/0xa0 [ 58.895641] do_syscall_64+0x309/0x430 [ 58.899542] ? SYSC_recv+0xe0/0xe0 [ 58.903087] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 58.908272] RIP: 0033:0x455279 [ 58.911456] RSP: 002b:00007fc7ec25bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 58.919162] RAX: ffffffffffffffda RBX: 00007fc7ec25c6d4 RCX: 0000000000455279 [ 58.926432] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 58.933706] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 58.940977] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 58.948249] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 58.955986] Dumping ftrace buffer: [ 58.959515] (ftrace buffer empty) [ 58.963198] Kernel Offset: disabled [ 58.966803] Rebooting in 86400 seconds..