INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2018/04/07 00:04:21 fuzzer started 2018/04/07 00:04:22 dialing manager at 10.128.0.26:38639 2018/04/07 00:04:28 kcov=true, comps=false 2018/04/07 00:04:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='..', 0x0, 0x0) lseek(r1, 0xfffffffffffffffc, 0x2) getdents64(r1, &(0x7f00000010c0)=""/4096, 0x1000) 2018/04/07 00:04:30 executing program 2: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) close(r0) 2018/04/07 00:04:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @my}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000665fe0)={"dbc78fc0a6caa717004720a0a32b5f0d", {0x4, 0x0, 0x0, "e0b618b5a2e0"}}) clone(0x0, &(0x7f0000592ffe), &(0x7f0000bb3000), &(0x7f0000362000), &(0x7f000046e000)) dup3(r0, r1, 0x0) 2018/04/07 00:04:30 executing program 3: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc35, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x8, 0x0, "ff4fa18b6b271e0988f619d32b08fadff4bb977a7fac775ad010647a65734d5273e3ec345108ec632d3a87d0526a31a1cf87113dc4bf9c894e5c4ed1e218b7c58b8c440c80a400c553573dd49f5373d4"}, 0xd8) 2018/04/07 00:04:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/07 00:04:30 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c461f0000000000000000000000020006000000000000000000380000000000000000000000000020000100000000000000000000000100000008000000000000000000000000000000000000000000000000000000"], 0x58) uselib(&(0x7f0000000140)='./file0\x00') 2018/04/07 00:04:30 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="f90b8e", 0x3}], 0x1) recvmsg(r2, &(0x7f0000000d00)={&(0x7f0000000b80)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/34, 0x22}, 0x2) 2018/04/07 00:04:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="180000000b0601000000007ce09ba5b0fe4d00fdfffbff00"], 0x18}, 0x1}, 0x0) syzkaller login: [ 42.688413] ip (3792) used greatest stack depth: 54672 bytes left [ 43.013086] ip (3821) used greatest stack depth: 54408 bytes left [ 43.959582] ip (3908) used greatest stack depth: 54200 bytes left [ 45.372154] ip (4029) used greatest stack depth: 53976 bytes left [ 45.893249] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.958535] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.023136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.058728] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.108469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.154220] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.397708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.416145] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.830711] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.008239] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.018851] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.027528] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.036101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.045489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.354406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.602290] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.608557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.620993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.675705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.682732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.695416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.728354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.769882] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.776149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.785897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.839610] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.845846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.856716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.877582] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.885079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.907281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.936183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.964507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.982574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.176391] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.182653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.193783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.681896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.688162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.709569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 00:04:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/07 00:04:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000029000)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0xd19, 0x0, 0x0, {0xa}}, 0x1c}, 0x1}, 0x0) 2018/04/07 00:04:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="f90b8e", 0x3}], 0x1) recvmsg(r2, &(0x7f0000000d00)={&(0x7f0000000b80)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/34, 0x22}, 0x2) [ 57.262755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/07 00:04:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='..', 0x0, 0x0) lseek(r1, 0xfffffffffffffffc, 0x2) getdents64(r1, &(0x7f00000010c0)=""/4096, 0x1000) 2018/04/07 00:04:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="f90b8e", 0x3}], 0x1) recvmsg(r2, &(0x7f0000000d00)={&(0x7f0000000b80)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/34, 0x22}, 0x2) 2018/04/07 00:04:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="f90b8e", 0x3}], 0x1) recvmsg(r2, &(0x7f0000000d00)={&(0x7f0000000b80)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/34, 0x22}, 0x2) 2018/04/07 00:04:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="f90b8e", 0x3}], 0x1) recvmsg(r2, &(0x7f0000000d00)={&(0x7f0000000b80)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/34, 0x22}, 0x2) 2018/04/07 00:04:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x12, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 'syz_tun\x00'}) 2018/04/07 00:04:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="cb97ebcc4162edb38b5af0ca52287897", 0x10}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/07 00:04:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @my}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000665fe0)={"dbc78fc0a6caa717004720a0a32b5f0d", {0x4, 0x0, 0x0, "e0b618b5a2e0"}}) clone(0x0, &(0x7f0000592ffe), &(0x7f0000bb3000), &(0x7f0000362000), &(0x7f000046e000)) dup3(r0, r1, 0x0) 2018/04/07 00:04:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) sendfile(r1, r2, &(0x7f0000000200)=0xff0f, 0x400) [ 58.075579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/07 00:04:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='..', 0x0, 0x0) lseek(r1, 0xfffffffffffffffc, 0x2) getdents64(r1, &(0x7f00000010c0)=""/4096, 0x1000) [ 58.205911] ================================================================== [ 58.213326] BUG: KMSAN: uninit-value in crc32_le+0xac0/0xcd0 [ 58.219133] CPU: 0 PID: 5104 Comm: syz-executor5 Not tainted 4.16.0+ #81 [ 58.225964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.235316] Call Trace: [ 58.237907] dump_stack+0x185/0x1d0 [ 58.241540] ? crc32_le+0xac0/0xcd0 [ 58.245178] kmsan_report+0x142/0x240 [ 58.248986] __msan_warning_32+0x6c/0xb0 [ 58.253051] crc32_le+0xac0/0xcd0 [ 58.256525] ? page_mapping+0x300/0x480 [ 58.260519] crc32_pclmul_le+0x156/0x340 [ 58.264596] crc32_pclmul_update+0xb6/0x120 [ 58.268930] ? crc32_pclmul_init+0xe0/0xe0 [ 58.273171] shash_async_update+0x290/0x360 [ 58.277501] ? shash_async_init+0x270/0x270 [ 58.281835] hash_sendpage+0x904/0xe10 [ 58.285739] ? hash_recvmsg+0xd50/0xd50 [ 58.289722] sock_sendpage+0x1de/0x2c0 [ 58.293626] pipe_to_sendpage+0x31b/0x430 [ 58.297789] ? sock_fasync+0x2b0/0x2b0 [ 58.301696] ? propagate_umount+0x3a30/0x3a30 2018/04/07 00:04:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x100000d, 0x32, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000001faf)="54f914a0d2c0692f424ebda9d0d59e51d8cfebca9650098bd2998b536de5ae4385432d1895ebc413d9889751d60264d2901cb0d1569dfac9249b61cd52e5f12a1c928c4bb573d18be7f79dfbfdff18b401", 0x51, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) bind$inet6(r0, &(0x7f0000001ffd)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x20) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) [ 58.306204] __splice_from_pipe+0x49a/0xf30 [ 58.310542] ? generic_splice_sendpage+0x2a0/0x2a0 [ 58.315482] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 58.320854] generic_splice_sendpage+0x1c6/0x2a0 [ 58.325627] ? iter_file_splice_write+0x1710/0x1710 [ 58.330658] ? iter_file_splice_write+0x1710/0x1710 [ 58.335683] direct_splice_actor+0x19b/0x200 [ 58.340114] splice_direct_to_actor+0x764/0x1040 [ 58.344877] ? do_splice_direct+0x540/0x540 [ 58.349204] ? security_file_permission+0x28f/0x4b0 [ 58.354248] ? rw_verify_area+0x35e/0x580 [ 58.358414] do_splice_direct+0x335/0x540 [ 58.362577] do_sendfile+0x1067/0x1e40 [ 58.366490] SYSC_sendfile64+0x1b3/0x300 [ 58.370568] SyS_sendfile64+0x64/0x90 [ 58.374380] do_syscall_64+0x309/0x430 [ 58.378280] ? SYSC_sendfile+0x320/0x320 [ 58.382346] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 58.387524] RIP: 0033:0x455259 [ 58.390699] RSP: 002b:00007f4436730c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 58.398395] RAX: ffffffffffffffda RBX: 00007f44367316d4 RCX: 0000000000455259 [ 58.405653] RDX: 0000000020000200 RSI: 0000000000000015 RDI: 0000000000000014 [ 58.412914] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 58.420169] R10: 0000000000000400 R11: 0000000000000246 R12: 00000000ffffffff [ 58.427425] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 58.434703] [ 58.436313] Uninit was created at: [ 58.439843] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 58.444842] kmsan_alloc_page+0x82/0xe0 [ 58.448804] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 58.453545] alloc_pages_vma+0xcc8/0x1800 [ 58.457682] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 58.462687] shmem_getpage_gfp+0x35db/0x5770 [ 58.467085] shmem_fallocate+0xde2/0x1610 [ 58.471218] vfs_fallocate+0x9dc/0xde0 [ 58.475101] SYSC_fallocate+0x119/0x1d0 [ 58.479063] SyS_fallocate+0x64/0x90 [ 58.482765] do_syscall_64+0x309/0x430 [ 58.486641] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 58.491811] ================================================================== [ 58.499155] Disabling lock debugging due to kernel taint [ 58.504586] Kernel panic - not syncing: panic_on_warn set ... [ 58.504586] [ 58.511944] CPU: 0 PID: 5104 Comm: syz-executor5 Tainted: G B 4.16.0+ #81 [ 58.520068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.529405] Call Trace: [ 58.531988] dump_stack+0x185/0x1d0 [ 58.535604] panic+0x39d/0x940 [ 58.538797] ? crc32_le+0xac0/0xcd0 [ 58.542412] kmsan_report+0x238/0x240 [ 58.546202] __msan_warning_32+0x6c/0xb0 [ 58.550258] crc32_le+0xac0/0xcd0 [ 58.553703] ? page_mapping+0x300/0x480 [ 58.557674] crc32_pclmul_le+0x156/0x340 [ 58.561726] crc32_pclmul_update+0xb6/0x120 [ 58.566040] ? crc32_pclmul_init+0xe0/0xe0 [ 58.570265] shash_async_update+0x290/0x360 [ 58.574576] ? shash_async_init+0x270/0x270 [ 58.578885] hash_sendpage+0x904/0xe10 [ 58.582764] ? hash_recvmsg+0xd50/0xd50 [ 58.586728] sock_sendpage+0x1de/0x2c0 [ 58.590608] pipe_to_sendpage+0x31b/0x430 [ 58.594749] ? sock_fasync+0x2b0/0x2b0 [ 58.598627] ? propagate_umount+0x3a30/0x3a30 [ 58.603113] __splice_from_pipe+0x49a/0xf30 [ 58.607422] ? generic_splice_sendpage+0x2a0/0x2a0 [ 58.612345] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 58.617699] generic_splice_sendpage+0x1c6/0x2a0 [ 58.622446] ? iter_file_splice_write+0x1710/0x1710 [ 58.627451] ? iter_file_splice_write+0x1710/0x1710 [ 58.632458] direct_splice_actor+0x19b/0x200 [ 58.636860] splice_direct_to_actor+0x764/0x1040 [ 58.641693] ? do_splice_direct+0x540/0x540 [ 58.646006] ? security_file_permission+0x28f/0x4b0 [ 58.651025] ? rw_verify_area+0x35e/0x580 [ 58.655169] do_splice_direct+0x335/0x540 [ 58.659308] do_sendfile+0x1067/0x1e40 [ 58.663193] SYSC_sendfile64+0x1b3/0x300 [ 58.667251] SyS_sendfile64+0x64/0x90 [ 58.671042] do_syscall_64+0x309/0x430 [ 58.674918] ? SYSC_sendfile+0x320/0x320 [ 58.678968] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 58.684146] RIP: 0033:0x455259 [ 58.687318] RSP: 002b:00007f4436730c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 58.695013] RAX: ffffffffffffffda RBX: 00007f44367316d4 RCX: 0000000000455259 [ 58.702276] RDX: 0000000020000200 RSI: 0000000000000015 RDI: 0000000000000014 [ 58.709534] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 58.716788] R10: 0000000000000400 R11: 0000000000000246 R12: 00000000ffffffff [ 58.724047] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 58.731805] Dumping ftrace buffer: [ 58.735329] (ftrace buffer empty) [ 58.739020] Kernel Offset: disabled [ 58.742631] Rebooting in 86400 seconds..