INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. 2018/04/07 05:49:21 fuzzer started 2018/04/07 05:49:22 dialing manager at 10.128.0.26:38639 2018/04/07 05:49:28 kcov=true, comps=false 2018/04/07 05:49:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f00000021c0)={&(0x7f0000001740)=@can={0x1d}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001ac0)="09bef8eca8222c753768317f199cc5d2f8bc8e14a6b26b37dd8d50d883b239", 0x1f}], 0x1, &(0x7f0000001c80)=[{0x108, 0x1, 0x8000, "0648eaa2d515d53fbb4e9000b59c339f54f6553e702de9fe6bac595150bcc2386f894977f4cdec4b98449811a5dc97980cde54cfaf16235e440a42f0adedb1de56c89c3b97d53c9d17fbbb50a94ab0a4b0abd9832d20a8fef80cb1f6e386094dc1ca3c591b2df20115f9143ff22b61f8f6c86d67055b44e1ec5c4fc23efa64c60f8d41fb8b2dbcc988de8e14fc85f1ec6055a7c5ae9d10d5550369790a006fa5fef6e85276891251357f4d2a69c02237f7de651dd1bf5de9f1451e6e07ac66b64bc91af14449aeeafd6c2c500ee9a2cb39029a255821d390ee610fd76136f6dd46c48d1fd157eb82cfe258a8be908824fcec3791196fc526"}, {0x68, 0x117, 0x1, "6e30b24fe7d66c560febdb41a9fc395b440aa99219a62bc59b2f4329bd2965d7604fcae7c0b5a50f7a198869e27fa7016ce483d7b38df7c1c9c9a552b072dd80167da4150444b78f7c13f20376a4983c4f"}, {0x48, 0x0, 0xfff, "ba0e9f6a43411397398f2b076e86a2bd1c50f96ed68f0e7cc3c1e6a1a3a4c2292110f76c279aa25e5f7fa7456b286b13bc5c933be8"}, {0x20, 0x84, 0x7, "9866975142c43ffe83bcd0ca09edf8"}, {0xb0, 0x13f, 0x40ad, "175d2b23828c5128c7ea38106b958b19f5b60c676c21429d30808dc424f1ab667fe3f206464b18fe76cab4eeb443ad1cfb6b8c014ad6cb63170411ac2908a12cab8eed8d9f47e590782b0adf0e0c37299194018bda2ddbecbad4c35cea6db09925ce4d29b8089357ebe5c032b60d3151603e5f462f5e311ab1a8c600cf3d3fa43d5c1d6f12d7966b40de4269a979d9260f5acd4b78b7c384256e"}], 0x288, 0x40000}, 0x20000000) 2018/04/07 05:49:31 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)="737461747573002530acd253a34dc05b6ccb06a3f0192a3c1828b2c37051a6998c1b7be520769e15a4ca32a92388211e1e30da957d5823c0b63864fe0900000000000000000000000000000000") prctl$setname(0xf, &(0x7f0000000240)="aa4c519825d6eba3b21497f0930a0b1ee4e8fbd7bb546c2069f341f703d119a47770f4646128bfc64ba4") pread64(r1, &(0x7f0000000100)=""/202, 0xca, 0x0) 2018/04/07 05:49:31 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000bfdfdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0xd}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2=0xe0000002}]}]}, 0x20}, 0x1}, 0x0) 2018/04/07 05:49:31 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000180), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000000)=0x3f, 0x4) 2018/04/07 05:49:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000000140), &(0x7f0000950000)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f000026a000)={r0, &(0x7f0000886f44), &(0x7f0000000040)=""/203}, 0x18) 2018/04/07 05:49:31 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{}, 'port0\x00', 0x0, 0x802, 0x0, 0x4, 0x7c89, 0x8001}) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 05:49:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x2, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r0, &(0x7f0000000400), &(0x7f0000000480)='('}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000380)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000200), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000180), &(0x7f0000000380)}, 0x20) 2018/04/07 05:49:31 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000aa1000)='/dev/ptmx\x00', 0x882001, 0x0) write(r0, &(0x7f000030af9e)="2f7f4be2b36c5526a5534195cbffffffffffff0917fff1ed8f549f1b496490f3f2afa9fd016f97ea68e0ff360fd55801f986ce867fff0900000000000000000000097f39147a2c89311b32b0f6687ef5f00d0558fc81901464d8ff1dbf13", 0x5e) ioctl$TCSETA(r0, 0x5402, &(0x7f0000000080)) syzkaller login: [ 45.046574] ip (3800) used greatest stack depth: 54672 bytes left [ 46.180412] ip (3909) used greatest stack depth: 54560 bytes left [ 46.228303] ip (3910) used greatest stack depth: 54200 bytes left [ 48.159116] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.286723] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.414286] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.426655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.436440] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.520400] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.536127] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.567394] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.192016] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.395897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.460861] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.490381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.554299] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.678724] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.744017] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.755759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.979916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.986247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.996931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.213336] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.219673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.230009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.255214] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.264473] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.271939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.283810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.313251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.339891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.359598] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.366838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.391585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.594009] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.600343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.608420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.625971] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.640651] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.664135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.684826] ip (4950) used greatest stack depth: 53976 bytes left [ 58.713253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.743980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.774119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.794493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/07 05:49:48 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) read(r1, &(0x7f0000000040)=""/172, 0xac) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0x40085400, &(0x7f0000000000)={0x7}) 2018/04/07 05:49:48 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{}, 'port0\x00', 0x0, 0x802, 0x0, 0x4, 0x7c89, 0x8001}) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) 2018/04/07 05:49:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x83}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/07 05:49:48 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 2018/04/07 05:49:48 executing program 1: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000553000)=[{&(0x7f0000c0c000)="580000001400190000bb4b01040d8c56020600000000e076489643d818fe58a2bc4a0381001dffffffff0000000006007ffff51000174100005bffff001ce1ed900000000000000006b736231be86efd121f00ec6b0f536e", 0x58}], 0x1) 2018/04/07 05:49:48 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000387000), 0x4) recvmmsg(r2, &(0x7f0000005b00)=[{{&(0x7f00000044c0)=@nfc_llcp, 0x80, &(0x7f00000059c0), 0x0, &(0x7f0000005a40)=""/187, 0xbb}}], 0x1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 2018/04/07 05:49:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f00000002c0)={@broadcast=0xffffffff, @broadcast=0xffffffff}, 0x0) 2018/04/07 05:49:48 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000d1cff8)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x31) [ 59.862408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/07 05:49:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000000)={'\x00', @ifru_ivalue}) 2018/04/07 05:49:49 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000d7efec)={0x14, 0x3, 0x2, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 2018/04/07 05:49:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065000)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000402ff2)={&(0x7f0000000140)={0x1c, 0xa, 0x6, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4}]}]}, 0x1c}, 0x1}, 0x0) 2018/04/07 05:49:49 executing program 7: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)) 2018/04/07 05:49:49 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) fallocate(r0, 0x1, 0x0, 0x4000003) readv(r0, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/4096, 0xffc4}], 0x1) sendfile(r0, r0, 0x0, 0x6) 2018/04/07 05:49:49 executing program 4: r0 = socket(0x2, 0xa, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) [ 60.352752] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/07 05:49:50 executing program 2: mkdir(&(0x7f0000771000)='./file0\x00', 0x0) mount(&(0x7f0000900ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)=""/40, 0x28) 2018/04/07 05:49:50 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000326000)={&(0x7f000066fff4)={0x10}, 0xc, &(0x7f0000cb5000)={&(0x7f00007cc000)={0x14, 0x2, 0x2, 0x7a8b566d789388b3}, 0x14}, 0x1}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040), 0x10) 2018/04/07 05:49:50 executing program 5: r0 = socket(0x10, 0x400000802, 0x0) write(r0, &(0x7f0000ff6fe1)="1f0000004a00070100021b0a000008ff0a3f801719ffe320e60000fe441951", 0x1f) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000ff3000)=0x5, 0x4) recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000000)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000013c0)}, 0x0) 2018/04/07 05:49:50 executing program 7: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x2) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x1) flock(r1, 0x1) 2018/04/07 05:49:50 executing program 3: perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x4) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 2018/04/07 05:49:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0x0, 0x33, &(0x7f00002c5000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/07 05:49:50 executing program 4: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) unshare(0x28060400) 2018/04/07 05:49:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)={[0x30]}, 0x1) [ 61.132719] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 2018/04/07 05:49:50 executing program 5: prctl$setmm(0x23, 0xe, &(0x7f0000ab6000/0xc000)=nil) 2018/04/07 05:49:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)={[0x30]}, 0x1) 2018/04/07 05:49:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)={[0x30]}, 0x1) 2018/04/07 05:49:50 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000e46ffc)) 2018/04/07 05:49:50 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2000004, 0x44031, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000516fbc)="00806e0240246d04653d098a4335ddf8a409a4f9e24ead41295ef68da251a43f732a2d65e8330025dc66b9dbe36dd6a13bf8a10d80013223d174c0aea1c3f3147cc40006") syz_open_procfs(0x0, &(0x7f0000000000)='nYt/osced\x00') 2018/04/07 05:49:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0x0, 0x33, &(0x7f00002c5000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/07 05:49:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0x0, 0x33, &(0x7f00002c5000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/07 05:49:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x7, 0xb}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) 2018/04/07 05:49:50 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/07 05:49:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0x40000000000000ff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) sendto$inet(r0, &(0x7f00000002c0), 0x2e2, 0x0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/07 05:49:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0x0, 0x33, &(0x7f00002c5000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/07 05:49:50 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2000004, 0x44031, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000516fbc)="00806e0240246d04653d098a4335ddf8a409a4f9e24ead41295ef68da251a43f732a2d65e8330025dc66b9dbe36dd6a13bf8a10d80013223d174c0aea1c3f3147cc40006") syz_open_procfs(0x0, &(0x7f0000000000)='nYt/osced\x00') 2018/04/07 05:49:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r0}, 0x7) 2018/04/07 05:49:50 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x5, "8fc9ba4a2e"}, &(0x7f0000000100)=0xd) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write(r1, &(0x7f0000000180), 0xff4d) 2018/04/07 05:49:50 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000ff6fcb)="2400000020000bf0006b000420edfc0002250008010000080010ffea08000100000000b7", 0x24) 2018/04/07 05:49:50 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) dup2(r0, r2) ioctl$TIOCGLCKTRMIOS(r2, 0x5412, &(0x7f0000000000)) [ 62.038613] skbuff: bad partial csum: csum=19130/46 len=3712 2018/04/07 05:49:51 executing program 4: r0 = socket(0x1e, 0x80001, 0x0) listen$netrom(r0, 0x0) connect$ax25(r0, &(0x7f0000875000)={0x1e, {"03491f0700"}}, 0x10) 2018/04/07 05:49:51 executing program 7: mkdir(&(0x7f0000796000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r1) 2018/04/07 05:49:51 executing program 3: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x2, 0x400000008, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) 2018/04/07 05:49:51 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xdb}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/07 05:49:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000015e15)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) 2018/04/07 05:49:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0x0, 0x33, &(0x7f00002c5000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/07 05:49:51 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/07 05:49:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b48000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000b78ff0)="a23364fd", 0x4) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x1ff) sendfile(r1, r2, &(0x7f0000000240)=0x13, 0x6) 2018/04/07 05:49:51 executing program 5: setrlimit(0x0, &(0x7f0000000000)) setrlimit(0x0, &(0x7f0000000100)={0x400000082, 0xf38}) 2018/04/07 05:49:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) [ 62.404075] ================================================================== [ 62.411516] BUG: KMSAN: uninit-value in __crc32c_pcl_intel_finup+0x3b2/0x4b0 [ 62.418708] CPU: 0 PID: 5240 Comm: syz-executor0 Not tainted 4.16.0+ #81 [ 62.425542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.434896] Call Trace: [ 62.437495] dump_stack+0x185/0x1d0 [ 62.441134] ? __crc32c_pcl_intel_finup+0x3b2/0x4b0 [ 62.446167] kmsan_report+0x142/0x240 [ 62.449997] __msan_warning_32+0x6c/0xb0 [ 62.454099] __crc32c_pcl_intel_finup+0x3b2/0x4b0 [ 62.458970] crc32c_pcl_intel_finup+0xb5/0xe0 [ 62.463475] ? crc32c_pcl_intel_update+0x500/0x500 [ 62.468406] shash_ahash_finup+0x468/0xa30 [ 62.472748] shash_ahash_digest+0x5c6/0x600 [ 62.477086] shash_async_digest+0x11c/0x1b0 [ 62.481421] crypto_ahash_op+0x89a/0xc10 [ 62.485486] ? __kmalloc+0x23c/0x350 [ 62.489201] ? shash_async_finup+0x1b0/0x1b0 [ 62.493610] ? shash_async_finup+0x1b0/0x1b0 [ 62.498028] crypto_ahash_digest+0xe4/0x160 [ 62.502365] hash_sendpage+0xb40/0xe10 [ 62.506269] ? hash_recvmsg+0xd50/0xd50 [ 62.510252] sock_sendpage+0x1de/0x2c0 [ 62.514157] pipe_to_sendpage+0x31b/0x430 [ 62.518462] ? sock_fasync+0x2b0/0x2b0 [ 62.522360] ? propagate_umount+0x3a30/0x3a30 [ 62.526846] __splice_from_pipe+0x49a/0xf30 [ 62.531155] ? generic_splice_sendpage+0x2a0/0x2a0 [ 62.536084] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 62.541438] generic_splice_sendpage+0x1c6/0x2a0 [ 62.546185] ? iter_file_splice_write+0x1710/0x1710 [ 62.551188] ? iter_file_splice_write+0x1710/0x1710 [ 62.556189] direct_splice_actor+0x19b/0x200 [ 62.560798] splice_direct_to_actor+0x764/0x1040 [ 62.565555] ? do_splice_direct+0x540/0x540 [ 62.569864] ? security_file_permission+0x28f/0x4b0 [ 62.574872] ? rw_verify_area+0x35e/0x580 [ 62.579006] do_splice_direct+0x335/0x540 [ 62.583146] do_sendfile+0x1067/0x1e40 [ 62.587034] SYSC_sendfile64+0x1b3/0x300 [ 62.591084] SyS_sendfile64+0x64/0x90 [ 62.594868] do_syscall_64+0x309/0x430 [ 62.598740] ? SYSC_sendfile+0x320/0x320 [ 62.602798] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 62.607970] RIP: 0033:0x455259 [ 62.611140] RSP: 002b:00007fddf6bbcc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 62.618863] RAX: ffffffffffffffda RBX: 00007fddf6bbd6d4 RCX: 0000000000455259 [ 62.626115] RDX: 0000000020000240 RSI: 0000000000000015 RDI: 0000000000000014 [ 62.633364] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 62.640615] R10: 0000000000000006 R11: 0000000000000246 R12: 00000000ffffffff [ 62.647866] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 62.655121] [ 62.656727] Uninit was created at: [ 62.660252] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 62.665248] kmsan_alloc_page+0x82/0xe0 [ 62.669205] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 62.673939] alloc_pages_vma+0xcc8/0x1800 [ 62.678070] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 62.683066] shmem_getpage_gfp+0x35db/0x5770 [ 62.687457] shmem_fallocate+0xde2/0x1610 [ 62.691585] vfs_fallocate+0x9dc/0xde0 [ 62.695464] SYSC_fallocate+0x119/0x1d0 [ 62.699418] SyS_fallocate+0x64/0x90 [ 62.703115] do_syscall_64+0x309/0x430 [ 62.707160] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 62.712342] ================================================================== [ 62.719683] Disabling lock debugging due to kernel taint [ 62.725116] Kernel panic - not syncing: panic_on_warn set ... [ 62.725116] [ 62.732466] CPU: 0 PID: 5240 Comm: syz-executor0 Tainted: G B 4.16.0+ #81 [ 62.740583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.749914] Call Trace: [ 62.752496] dump_stack+0x185/0x1d0 [ 62.756108] panic+0x39d/0x940 [ 62.759303] ? __crc32c_pcl_intel_finup+0x3b2/0x4b0 [ 62.764300] kmsan_report+0x238/0x240 [ 62.768083] __msan_warning_32+0x6c/0xb0 [ 62.772130] __crc32c_pcl_intel_finup+0x3b2/0x4b0 [ 62.776959] crc32c_pcl_intel_finup+0xb5/0xe0 [ 62.781437] ? crc32c_pcl_intel_update+0x500/0x500 [ 62.786361] shash_ahash_finup+0x468/0xa30 [ 62.790581] shash_ahash_digest+0x5c6/0x600 [ 62.794893] shash_async_digest+0x11c/0x1b0 [ 62.799200] crypto_ahash_op+0x89a/0xc10 [ 62.803243] ? __kmalloc+0x23c/0x350 [ 62.806941] ? shash_async_finup+0x1b0/0x1b0 [ 62.811332] ? shash_async_finup+0x1b0/0x1b0 [ 62.815724] crypto_ahash_digest+0xe4/0x160 [ 62.820034] hash_sendpage+0xb40/0xe10 [ 62.823907] ? hash_recvmsg+0xd50/0xd50 [ 62.827870] sock_sendpage+0x1de/0x2c0 [ 62.831750] pipe_to_sendpage+0x31b/0x430 [ 62.835887] ? sock_fasync+0x2b0/0x2b0 [ 62.842135] ? propagate_umount+0x3a30/0x3a30 [ 62.846615] __splice_from_pipe+0x49a/0xf30 [ 62.850930] ? generic_splice_sendpage+0x2a0/0x2a0 [ 62.855845] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 62.861194] generic_splice_sendpage+0x1c6/0x2a0 [ 62.865938] ? iter_file_splice_write+0x1710/0x1710 [ 62.870937] ? iter_file_splice_write+0x1710/0x1710 [ 62.875937] direct_splice_actor+0x19b/0x200 [ 62.880335] splice_direct_to_actor+0x764/0x1040 [ 62.885959] ? do_splice_direct+0x540/0x540 [ 62.890269] ? security_file_permission+0x28f/0x4b0 [ 62.895277] ? rw_verify_area+0x35e/0x580 [ 62.899417] do_splice_direct+0x335/0x540 [ 62.903556] do_sendfile+0x1067/0x1e40 [ 62.907436] SYSC_sendfile64+0x1b3/0x300 [ 62.911483] SyS_sendfile64+0x64/0x90 [ 62.915266] do_syscall_64+0x309/0x430 [ 62.919141] ? SYSC_sendfile+0x320/0x320 [ 62.923186] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 62.928357] RIP: 0033:0x455259 [ 62.931526] RSP: 002b:00007fddf6bbcc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 62.939216] RAX: ffffffffffffffda RBX: 00007fddf6bbd6d4 RCX: 0000000000455259 [ 62.946466] RDX: 0000000020000240 RSI: 0000000000000015 RDI: 0000000000000014 [ 62.953715] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 62.960966] R10: 0000000000000006 R11: 0000000000000246 R12: 00000000ffffffff [ 62.968228] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 62.975882] Dumping ftrace buffer: [ 62.979400] (ftrace buffer empty) [ 62.983083] Kernel Offset: disabled [ 62.986684] Rebooting in 86400 seconds..