INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. 2018/04/07 01:58:46 fuzzer started 2018/04/07 01:58:46 dialing manager at 10.128.0.26:38639 2018/04/07 01:58:52 kcov=true, comps=false 2018/04/07 01:58:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f000002dcd8)=@raw={"05000000020002000000000000000000180000000303000000ff3f00", 0x9, 0x3, 0x1, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f000002bfd0), {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "c14000e57af108cc6c74028119fb719d84b855ae79c03bcd889e253bc457"}}, {{@uncond, 0x0, 0xa8, 0x349}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x328) 2018/04/07 01:58:55 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r0, &(0x7f00002daff0)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96", 0x1, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$netlink(r1, &(0x7f0000915000)={&(0x7f00005c9000)=@kern={0x10}, 0xc, &(0x7f0000525000)=[{&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) 2018/04/07 01:58:55 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r2}, {r1}], 0x2, &(0x7f0000000280)={0x77359400}, &(0x7f0000000100), 0x8) 2018/04/07 01:58:55 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f10ffc)=0x3f, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) listen(r0, 0x0) 2018/04/07 01:58:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000723ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) connect$inet(r0, &(0x7f0000d37ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) read(r0, &(0x7f0000001080)=""/161, 0xa1) shutdown(r0, 0x0) 2018/04/07 01:58:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, &(0x7f0000000900)=[{&(0x7f0000000240)="47578bf7b2a6f516074dc21d4956897cce3b9e9f403cb35e2ebf7826d40569de130221a02b7bf7e10f07b8bc8b767e527263ea512b97a123b390af8b90d8fced532feacabf9c0f5af346914a24dca576a936759219bc6130dd2f5e134a0ccd6cb2b6ca38ad0114f2635f9a91158736da65e6277124f23b5a4f77ada409bf6c9947ce1fb0e95126a5", 0x88, 0x3}, {&(0x7f0000000400)="85815e3134a4b294b6fc88a30d81f2bb0272705e54f3960efed0d1d7447ecaa70807edc85574de82f2c46ee17cba110a838f6f8789b027aa9ea5389bd020d70eba9ba0b34f205905f349feabc8f01710", 0x50, 0x20}, {&(0x7f0000000500)="b3237446c5246d274f04de91c5046eeae4e8e72de2b9646b873c919f35ca1467dff2159877007e75a4dd9f4eed238d0e3731213ab854927dc6e2990e574a894cb9e7f13cd227d714a67d7c7d52f0f0e36a80320070985fc1a50d32ce2ec722c02dc17d2c6e99dc0ada006f4251d4f2b0e7d2cdfa189008db4f715614363a7ac7b3e64c3686337e85403bb95f30ae896691940c", 0x93, 0x3}, {&(0x7f0000000640)="addb8eac7ea0ae855ffbee2811d14183a5322c21764e3219f2a33212a5704dc218dcbaee8255a3cdb2bf5ec2cd82cee7e92b7ca61a7abd8336fa05583e2b4b604a823dda3ecbb6ddec15dc0fa8abb6d3c317f7d9c63a85f4aa8f6e9851fa5f006ef4cca08b9614c3724e3137775bba5fc6c42c60fc421f7bfc80f7bc5b8f244bd31cfa7948ba09ebe66d776a231deb0da2aab54a2a60708ef87f9d0aa29d4657419b6466a377036ef9b8", 0xaa, 0x40a2}, {&(0x7f0000000800)="9bcdba5e31996f3f95387dafb662294e0113ae6bc7e5fd60ee3f998e2585aa934359791aefc7b31b0e9b957d5c1d8fae3d69d2a1fc7eb0049dc4ac53eb0998894548ffcccef435202c39f87c1bfe059dca20a0b21b1c8c542450da3f124195044f0bf18f3300026f181db06d34f1d77671172d3d82e192a2543b49319af3459a474a142d6a92b231e8dbcadabc6d2533e5f3a3d6dbafb14c92a984eff6fb97008461f209ef27cb88dcf65676c6c91ed40c76768ce5be82e7b678317841698126f24d93e485e4c5a5d84029475b0a2a862b8d86a1a4f096fe7bb0f0d4be993418f01a00cb6400a6", 0xe7}], 0x2000001, &(0x7f0000000a00)={[{@flushoncommit='flushoncommit', 0x2c}, {@noautodefrag='noautodefrag', 0x2c}, {@commit={'commit', 0x3d, [0x36, 0x37, 0x0, 0x2d, 0x35]}, 0x2c}, {@nodatacow='nodatacow', 0x2c}, {@discard='discard', 0x2c}, {@datasum='datasum', 0x2c}]}) 2018/04/07 01:58:55 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000f97000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') sendfile(r0, r2, &(0x7f0000000240)=0x4f, 0xb7f) 2018/04/07 01:58:55 executing program 6: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000014c0)={[{@resize_size={'resize', 0x3d, [0x37]}, 0x2c}]}) syzkaller login: [ 43.976766] ip (3785) used greatest stack depth: 54672 bytes left [ 44.344695] ip (3818) used greatest stack depth: 54408 bytes left [ 45.300960] ip (3914) used greatest stack depth: 53960 bytes left [ 47.229749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.239944] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.375875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.423599] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.454560] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.467699] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.573825] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.601738] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.892561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.976142] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.083173] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.142926] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.196175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.268593] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.313872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.470238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.595296] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.601521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.612495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.736652] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.742862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.752296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.823410] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.829718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.839712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.869137] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.877991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.910075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.017878] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.024174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.035965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.096275] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.102701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.112786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.150802] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.157087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.173561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.266273] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.272556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.286813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 01:59:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) 2018/04/07 01:59:12 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000f97000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') sendfile(r0, r2, &(0x7f0000000240)=0x4f, 0xb7f) 2018/04/07 01:59:12 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r0, &(0x7f00002daff0)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96", 0x1, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$netlink(r1, &(0x7f0000915000)={&(0x7f00005c9000)=@kern={0x10}, 0xc, &(0x7f0000525000)=[{&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) 2018/04/07 01:59:12 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='self&em1\\vmnet1\x00', 0x10, 0x0) lsetxattr(&(0x7f000008eff8)='./file0\x00', &(0x7f000067b000)=@known='user.syz\x00', &(0x7f0000a53ff0)='self&em1\\vmnet1\x00', 0x10, 0x0) 2018/04/07 01:59:12 executing program 2: clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x13ad9e113c1e2c, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240), &(0x7f0000000340)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f00000004c0), 0x28) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000280), 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/07 01:59:12 executing program 6: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}], 0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000000)="ddc735550cc906b57a8da7bc5697c6a7c4217fbe6d5e525564dab1f8717894418c2cfee067618a5d839c90", 0x2b) 2018/04/07 01:59:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') syz_open_procfs(0x0, &(0x7f0000000100)='ns/mnt\x00') getegid() 2018/04/07 01:59:12 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000080)="0000000201000000000000010400000000000000", 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240), &(0x7f0000000400)) [ 58.923554] Invalid argument reading file caps for ./file0 2018/04/07 01:59:13 executing program 7: syz_emit_ethernet(0x19f, &(0x7f0000ea7cfa)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c000e2", 0x3, 0x11, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@echo_reply={0x81}}}}}}, 0x0) [ 58.963692] Invalid argument reading file caps for ./file0 2018/04/07 01:59:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="cf", 0x1, 0x20000084, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x5, 0x7fff}, 0x14) sendto$inet(r0, &(0x7f0000000240)="82", 0x1, 0x0, &(0x7f0000000400)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/07 01:59:13 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r0, &(0x7f00002daff0)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96", 0x1, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$netlink(r1, &(0x7f0000915000)={&(0x7f00005c9000)=@kern={0x10}, 0xc, &(0x7f0000525000)=[{&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) 2018/04/07 01:59:13 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00002e8f1e)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d6696b208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8040705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x0, &(0x7f0000848ff0)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) sendto(r1, &(0x7f0000000280)="cc85b99848843fe9ece3f67752a29974b17d2fcf3ea429fbf742efaf3cdca84b00595620f6bdd34ca0ff68441f706e81bd9a5165fdb5635001d163e4dba0b542a14be5c13aee9eca2af16c06f0793b00639395e4206a0ccf5101a04d66012c2079dca79ffccedccd5de3bfdc52fb13d6204738af5ff6f7ccbb92d7b193490df51b8927f3702079a28bb7b9ac3bea2b556c8ca2e524666e6c0271de8d57ee7cd0dacf8e0b17e8c94ecdb3152e61fe979549a00091d9a8d4fc9fe5744c893ee4bfcb56dceab9b79d457966502faa47739e67e9363c23fc9d0af498ac1a9b673d2df6c8", 0xe2, 0x5, &(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}}, 0x80) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) recvmmsg(r1, &(0x7f0000003540)=[{{&(0x7f0000000a80)=@nfc_llcp, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000dc0)=""/4096, 0x1000}], 0x1, &(0x7f0000001e00)=""/57, 0x39}}], 0x1, 0x100, &(0x7f0000003640)) 2018/04/07 01:59:13 executing program 3: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebda, 0x8, 0x0, 0x4, 0x0, 0xe58, 0x0, 0x0, 0x0, 0x2, 0x0, 0x31c, 0x0, 0x0, 0xb07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d4, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x10000, 0xffff}, 0x0, 0x1, 0x9, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000023c0)="56125a44390d7cbbdf2badd5dd2d5f172bb70a406049a6bd45e38faed5fa5eebd4db40dc83e1e469b14592f615f4cd1a683b4cfe6f5740278c2e9cb8759912681abb") mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000002300)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000002680)={0xffffffffffffffff, r0}) perf_event_open(&(0x7f00000024c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4410, 0xf, 0x0, 0x1, 0x0, 0x5, 0x66ae4d0f, 0xfbea, 0x0, 0x0, 0x1f, 0xa3, 0x5bf, 0x1000, 0xfffffffffffff001, 0x3, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x0, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000011c0), &(0x7f0000001300)=""/4096}, 0x28) 2018/04/07 01:59:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000340)) [ 64.627812] oom_reaper: reaped process 5099 (syz-executor6), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 64.666703] rsyslogd invoked oom-killer: gfp_mask=0x14200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 64.678142] rsyslogd cpuset=/ mems_allowed=0 [ 64.682651] CPU: 0 PID: 3457 Comm: rsyslogd Not tainted 4.16.0+ #81 [ 64.689063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.698432] Call Trace: [ 64.701059] dump_stack+0x185/0x1d0 [ 64.704718] dump_header+0x2cc/0x16f0 [ 64.708557] ? __msan_poison_alloca+0x15c/0x1d0 [ 64.713226] ================================================================== [ 64.720582] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 64.727324] CPU: 0 PID: 3457 Comm: rsyslogd Not tainted 4.16.0+ #81 [ 64.733713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.743051] Call Trace: [ 64.745634] dump_stack+0x14a/0x1d0 [ 64.749257] ? kernel_text_address+0x248/0x3a0 [ 64.753828] kmsan_report+0x142/0x240 [ 64.757623] __msan_warning_32+0x6c/0xb0 [ 64.761678] kernel_text_address+0x248/0x3a0 [ 64.766081] __kernel_text_address+0x34/0xe0 [ 64.770489] show_trace_log_lvl+0x954/0x1030 [ 64.774891] ? oom_kill_process+0x341/0x2160 [ 64.779304] show_stack+0xfc/0x150 [ 64.782835] ? print_worker_info+0x1b0/0x660 [ 64.787235] dump_stack+0x185/0x1d0 [ 64.790856] dump_header+0x2cc/0x16f0 [ 64.794654] ? __msan_poison_alloca+0x15c/0x1d0 [ 64.799318] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 64.804759] ? ___ratelimit+0x67f/0x760 [ 64.808726] oom_kill_process+0x341/0x2160 [ 64.812954] ? oom_evaluate_task+0x851/0xb60 [ 64.817360] out_of_memory+0x1700/0x1da0 [ 64.821426] __alloc_pages_nodemask+0x4ee3/0x5dc0 [ 64.826285] alloc_pages_current+0x6b5/0x970 [ 64.830689] __page_cache_alloc+0x95/0x320 [ 64.834915] filemap_fault+0x1618/0x24e0 [ 64.838981] ext4_filemap_fault+0xbb/0x130 [ 64.843209] ? ext4_page_mkwrite+0x2a30/0x2a30 [ 64.847783] handle_mm_fault+0x58fe/0x7ba0 [ 64.852017] ? filemap_fault+0x24e0/0x24e0 [ 64.856256] __do_page_fault+0xec4/0x1a10 [ 64.860407] ? page_fault+0x45/0x50 [ 64.864023] do_page_fault+0xd3/0x260 [ 64.867821] ? page_fault+0x2f/0x50 [ 64.871436] page_fault+0x45/0x50 [ 64.874880] RIP: 0033:0x7fc5f6d421fd [ 64.878576] RSP: 002b:00007fc5f42e1e30 EFLAGS: 00010293 [ 64.883926] RAX: 0000000000000071 RBX: 0000000000c37ce0 RCX: 00007fc5f6d421fd [ 64.891187] RDX: 0000000000000fff RSI: 00007fc5f5b165a0 RDI: 0000000000000004 [ 64.898445] RBP: 0000000000000000 R08: 0000000000c23260 R09: 0000000004000001 [ 64.905707] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 64.912965] R13: 00007fc5f42e29c0 R14: 00007fc5f7387040 R15: 0000000000000003 [ 64.920227] [ 64.921840] Local variable description: ----c.i.i.i.i.i@mem_cgroup_soft_limit_reclaim [ 64.929787] Variable was created at: [ 64.933499] mem_cgroup_soft_limit_reclaim+0x13f/0x2480 [ 64.938852] do_try_to_free_pages+0xda1/0x1f80 [ 64.943415] ================================================================== [ 64.950758] Disabling lock debugging due to kernel taint [ 64.956193] Kernel panic - not syncing: panic_on_warn set ... [ 64.956193] [ 64.963551] CPU: 0 PID: 3457 Comm: rsyslogd Tainted: G B 4.16.0+ #81 [ 64.971244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.980586] Call Trace: [ 64.983173] dump_stack+0x14a/0x1d0 [ 64.986797] panic+0x39d/0x940 [ 64.990001] ? kernel_text_address+0x248/0x3a0 [ 64.994572] kmsan_report+0x238/0x240 [ 64.998366] __msan_warning_32+0x6c/0xb0 [ 65.002426] kernel_text_address+0x248/0x3a0 [ 65.006831] __kernel_text_address+0x34/0xe0 [ 65.011232] show_trace_log_lvl+0x954/0x1030 [ 65.015634] ? oom_kill_process+0x341/0x2160 [ 65.020046] show_stack+0xfc/0x150 [ 65.023581] ? print_worker_info+0x1b0/0x660 [ 65.027982] dump_stack+0x185/0x1d0 [ 65.031605] dump_header+0x2cc/0x16f0 [ 65.035406] ? __msan_poison_alloca+0x15c/0x1d0 [ 65.040071] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 65.045516] ? ___ratelimit+0x67f/0x760 [ 65.049486] oom_kill_process+0x341/0x2160 [ 65.053716] ? oom_evaluate_task+0x851/0xb60 [ 65.058119] out_of_memory+0x1700/0x1da0 [ 65.062183] __alloc_pages_nodemask+0x4ee3/0x5dc0 [ 65.067042] alloc_pages_current+0x6b5/0x970 [ 65.071446] __page_cache_alloc+0x95/0x320 [ 65.075673] filemap_fault+0x1618/0x24e0 [ 65.079740] ext4_filemap_fault+0xbb/0x130 [ 65.083976] ? ext4_page_mkwrite+0x2a30/0x2a30 [ 65.088549] handle_mm_fault+0x58fe/0x7ba0 [ 65.092777] ? filemap_fault+0x24e0/0x24e0 [ 65.097008] __do_page_fault+0xec4/0x1a10 [ 65.101157] ? page_fault+0x45/0x50 [ 65.104778] do_page_fault+0xd3/0x260 [ 65.108573] ? page_fault+0x2f/0x50 [ 65.112190] page_fault+0x45/0x50 [ 65.115629] RIP: 0033:0x7fc5f6d421fd [ 65.119327] RSP: 002b:00007fc5f42e1e30 EFLAGS: 00010293 [ 65.124677] RAX: 0000000000000071 RBX: 0000000000c37ce0 RCX: 00007fc5f6d421fd [ 65.131933] RDX: 0000000000000fff RSI: 00007fc5f5b165a0 RDI: 0000000000000004 [ 65.139193] RBP: 0000000000000000 R08: 0000000000c23260 R09: 0000000004000001 [ 65.144930] syz-executor6: vmalloc: allocation failure, allocated 848527360 of 6277406720 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 65.146448] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 65.146456] R13: 00007fc5f42e29c0 R14: 00007fc5f7387040 R15: 0000000000000003 [ 65.146894] Dumping ftrace buffer: [ 65.146898] (ftrace buffer empty) [ 65.146901] Kernel Offset: disabled [ 65.185812] Rebooting in 86400 seconds..