INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.29' (ECDSA) to the list of known hosts. 2018/04/14 13:32:27 fuzzer started 2018/04/14 13:32:27 dialing manager at 10.128.0.26:36243 2018/04/14 13:32:33 kcov=true, comps=false 2018/04/14 13:32:36 executing program 0: 2018/04/14 13:32:36 executing program 1: 2018/04/14 13:32:36 executing program 7: 2018/04/14 13:32:36 executing program 4: 2018/04/14 13:32:36 executing program 2: 2018/04/14 13:32:36 executing program 3: 2018/04/14 13:32:36 executing program 5: 2018/04/14 13:32:36 executing program 6: syzkaller login: [ 42.363945] ip (3775) used greatest stack depth: 54672 bytes left [ 43.222793] ip (3862) used greatest stack depth: 54200 bytes left [ 43.481791] ip (3887) used greatest stack depth: 53976 bytes left [ 43.818991] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.825477] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.856947] device bridge_slave_0 entered promiscuous mode [ 43.938398] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.944875] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.992960] device bridge_slave_0 entered promiscuous mode [ 44.045896] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.052387] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.081542] device bridge_slave_1 entered promiscuous mode [ 44.115869] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.122416] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.163310] device bridge_slave_0 entered promiscuous mode [ 44.184786] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.191269] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.212972] device bridge_slave_0 entered promiscuous mode [ 44.230303] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.236755] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.262937] device bridge_slave_0 entered promiscuous mode [ 44.275882] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.283332] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.289762] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.315964] device bridge_slave_0 entered promiscuous mode [ 44.341608] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.348131] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.366336] device bridge_slave_1 entered promiscuous mode [ 44.383786] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.390231] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.408106] device bridge_slave_0 entered promiscuous mode [ 44.418590] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.425108] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.441477] device bridge_slave_1 entered promiscuous mode [ 44.454288] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.460767] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.477764] device bridge_slave_0 entered promiscuous mode [ 44.495636] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.502152] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.519672] device bridge_slave_1 entered promiscuous mode [ 44.529217] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.535703] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.543652] device bridge_slave_1 entered promiscuous mode [ 44.555965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.564251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.573904] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.580406] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.627433] device bridge_slave_1 entered promiscuous mode [ 44.634122] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.640580] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.670954] device bridge_slave_1 entered promiscuous mode [ 44.687793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.699504] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.705959] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.723554] device bridge_slave_1 entered promiscuous mode [ 44.731959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.749333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.756614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.824757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.887555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.905347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.913695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.970272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.988763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.035644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.101450] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.143705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.494221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.689602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.733821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.842734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.879845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.966684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.010829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.019661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.058682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.070573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.183454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.190929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.200658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.230518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.286532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.357436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.749913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.883841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.962374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.058615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.122920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.161660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.190700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.199650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.215442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.251969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.260110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.267964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.278632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.324604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.366435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.375766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.391270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.425877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.436689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.445117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.457748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.496648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.505745] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.516226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.523932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.531246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.548269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.582832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.644994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.652422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.663751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.702221] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.716370] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.728712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.759563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.766657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.790583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.811395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.818826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.835479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.855915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.863399] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.870508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.889962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.905843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.920990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.942845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.950144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.973015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.994785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.006190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.013602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.038472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.064348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.086757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.104287] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.123528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.132322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.149006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.176789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.214752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.238725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.265545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.285777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.938234] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.944737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.951562] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.958014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.029167] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.035633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.077884] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.084372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.091262] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.097726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.177918] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.228507] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.234992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.241802] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.248276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.263778] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.270913] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.277345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.284214] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.290666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.328933] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.344745] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.351205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.358101] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.364559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.421496] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.428372] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.434833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.441651] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.448137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.457350] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.639469] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.645936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.652791] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.659244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.674370] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.690308] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.696766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.703592] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.710102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.750898] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.040146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.060007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.099684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.123639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.138588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.149727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.160621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.504540] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.523397] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.533825] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.628411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.722238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.735630] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.923622] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.227143] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.233530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.244928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.292929] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.304802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.318584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.343204] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.367626] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.374096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.386259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.472185] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.478437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.488864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.550757] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.557669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.572434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.608165] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.619562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.635591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.835865] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.842166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.854625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.081556] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.087815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.099883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/14 13:33:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000001940f5d3d6f48d972ec90af1cf9ea58584ad0e0000000000000000"], 0x8) setsockopt$inet6_buf(r0, 0x29, 0x40000003b, &(0x7f0000000100), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x8000400, @empty, 0x20}, 0x1c) fcntl$setstatus(r0, 0x4, 0x800) 2018/04/14 13:33:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x81) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f250", 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000001c0)={0x3, r3}) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f00000002c0)={0x0, r2}) r4 = accept$alg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendmmsg$alg(r4, &(0x7f0000004880)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, &(0x7f0000000100)}], 0x1, 0x0) 2018/04/14 13:33:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0xffffffffffffb26e, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000001a40)={&(0x7f0000000200)=@setlink={0x2c, 0x13, 0x521, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_TXQLEN={0x8, 0xd}, @IFLA_XDP={0x4, 0x2b}]}, 0x2c}, 0x1}, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x1e}, 0x49, r1}) 2018/04/14 13:33:03 executing program 6: syz_emit_ethernet(0xc9, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [{[{0x9100, 0x80000001, 0x9, 0x2}], {0x8100, 0x8b, 0x9a58, 0x3}}], {@llc_tr={0x11, {@llc={0xfe, 0x8e, "b4fd", "9433ff6f72bdb491f951b7a4992f1dac4beeee10c5586f1a2977b13cce9181387184d15765910008687152b8966fb83eb8289e42577682eeede66fdb4b859661700281283fb13bc377ac6434f31145a66286466d2be769b944fdf78bf158e1a5db4633969aa18df20aafc2b73b6c6a7068fe422c1ac932cbe405dc7253eb5ada5e97ee500d058038d6217c2415bacc3024f9978b0d2230d8bc3c5e46e9a676ea0aecfa5bd6b071ffbadfefd099a82d"}}}}}, &(0x7f0000000180)={0x1, 0x4, [0xbe4, 0x52a, 0xb48, 0x6a4]}) r0 = socket$inet(0x2, 0x7, 0x0) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/105) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f000018f000)=ANY=[@ANYBLOB="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"], 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x9f, 0x400) utimensat(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x0, 0x7530}}, 0x0) 2018/04/14 13:33:03 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000040)=@can={0x0, 0x0}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/169, 0xa9}, {&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f00000002c0)=""/221, 0xdd}], 0x4, &(0x7f0000000400)=""/177, 0xb1, 0x2}, 0x20) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={@mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @empty, 0x1, 0x100, 0x10001, 0x400, 0x7, 0xc0400000, r1}) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f61fe4)={0xa, 0x4e20}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x6) bind$inet6(r3, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x2}, 0x1c) 2018/04/14 13:33:03 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x28402, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x100, 0x4) r1 = socket(0x10, 0x400000802, 0x0) write(r1, &(0x7f0000ff6fe1)="1f0000004a00070100021b0a000008ff0a3f801719ffe320e60000fe441951", 0x1f) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3}) readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/237, 0xed}], 0x3ab) 2018/04/14 13:33:03 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) syz_emit_ethernet(0xd5, &(0x7f0000c22000)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4124, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, @icmp=@timestamp={0xd}}}}}, &(0x7f0000ea3000)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) connect$packet(r0, &(0x7f0000000200)={0x11, 0x1c, r1, 0x1, 0x5, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}}, 0x14) 2018/04/14 13:33:03 executing program 1: r0 = gettid() r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xb74, 0x4000) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x4, 0x1, 0x2, 0x800}, {0xffff, 0x6, 0x9, 0x7fffffff}, {0x800, 0x5dda, 0x1, 0xfb9a}, {0xdf, 0x10001, 0x8001, 0x1}, {0x10001, 0xc8dc, 0x0, 0xf60}, {0x9, 0x2, 0x1ff}, {0x3, 0x5ef, 0x0, 0x2}]}) exit(0x0) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x80000000}) 2018/04/14 13:33:03 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$VT_RELDISP(r1, 0x5605) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000040)) ioctl$TIOCSBRK(r2, 0x40044591) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000080)=""/29) pause() 2018/04/14 13:33:03 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x800) connect$inet(r0, &(0x7f0000000100)={0x2}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) poll(&(0x7f0000000000)=[{r0, 0x8}, {r0, 0x21a6}, {}, {r0, 0x200}], 0x4, 0xff) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @dev}, &(0x7f0000000180)=0xc) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000002c0)={0xfe, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f0000000300)={r4, 0xffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x7) 2018/04/14 13:33:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x0, 0x8000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000d39000)=[{}]}, 0x8) 2018/04/14 13:33:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) bind(r0, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14}}}, 0x80) 2018/04/14 13:33:03 executing program 6: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) fcntl$addseals(r0, 0x409, 0x6) io_setup(0xffffffffbffffffe, &(0x7f0000000180)=0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0xbe3f, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x1, r2, 0x10000, 0x100000000}) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) 2018/04/14 13:33:03 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSBRK(r0, 0x5409, 0x5) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3, &(0x7f0000000080)={0x100}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000cab000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendto(r2, &(0x7f0000000080), 0x0, 0x1ffffffffffd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000940)=@assoc_value, &(0x7f0000000980)=0x8) write$binfmt_elf64(r2, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x7b04, 0xff, 0x3, 0x80000000, 0x2, 0x3, 0x95c6, 0x234, 0x40, 0x32b, 0x5, 0x81, 0x38, 0x1, 0x1, 0xfff, 0x7}, [{0x60000007, 0xfc00000000000000, 0x7ff, 0xffff, 0x4, 0x4, 0x6, 0xfe9}, {0x5, 0x1, 0xc4fe, 0x4, 0x9, 0x3, 0x1, 0xc80f}], "632a61b2a406b554eca5488d111c2f9a684f0ca98774e91f1ccb134bfdf0470bd2d2cbb73e2733eaae252adc7dc5250e882c6e65e6f05e024113e8af1ce3e420643c4eafd009d8e711f821c8ff516746c5c9be9e75e7fed46d033ee1b2e8ac432a7f96d62c6d2b0da50ce2dc1da806fd1c4cd4f1a462322e1da3daa77be6ddf43a753b20e353bbdc9f2269b2e874ad3004bc556377d6f677ab22520474f5f9e61b0f426cef1409ae53bd28338ddebab6214ab7f3f491aeb71bcee630eba1eb05292d1ae55c41c4d116aefc4fc3e4", [[], [], [], [], [], [], []]}, 0x87e) 2018/04/14 13:33:03 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x3}, 0x202) listen(r0, 0x1008007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = accept(r1, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000100)=0xe70c, &(0x7f0000000140)=0x4) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) 2018/04/14 13:33:03 executing program 3: unshare(0x2000600) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000013000)=[{&(0x7f0000008000)="8b", 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000001140)={0x10000, 0xa0, 0x6, 0xbf, &(0x7f0000000040)=""/191, 0x20, &(0x7f0000000100)=""/32, 0x1000, &(0x7f0000000140)=""/4096}) 2018/04/14 13:33:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0xfe7b) socket$inet6(0xa, 0xa, 0x7) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x4, 0x1e8c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in={0x2, 0x4e23, @loopback=0x7f000001}, @in={0x2, 0x4e21}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, @in6={0xa, 0x4e21, 0x80, @local={0xfe, 0x80, [], 0xaa}, 0x65}, @in6={0xa, 0x4e21, 0xac2, @local={0xfe, 0x80, [], 0xaa}, 0x1ff}], 0x78) 2018/04/14 13:33:03 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040), 0x0) fcntl$dupfd(r0, 0x406, r0) pipe2(&(0x7f0000000000), 0x4000) fchdir(r0) 2018/04/14 13:33:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) write(r0, &(0x7f0000000140), 0x1015e) 2018/04/14 13:33:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001b40)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000001b00)={&(0x7f0000000040)=ANY=[@ANYBLOB="c00000001b00010300000000000000007f000001000000000000000000000000e000000100000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xc0}, 0x1}, 0x0) 2018/04/14 13:33:04 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=""/122, 0x7a}, {&(0x7f0000000280)=""/130, 0x82}], 0x2, 0x0, 0x0, 0x3}, 0x40000000) syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x4000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'erspan0\x00', 0x5402}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) 2018/04/14 13:33:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xc0000001}) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000300)=@int=0x1000, 0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) 2018/04/14 13:33:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x65) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x101100) ioctl$KDSETMODE(r2, 0x4b3a, 0x2f02) signalfd4(r0, &(0x7f0000000040)={0x3}, 0x8, 0x80800) write(r1, &(0x7f00000000c0), 0x0) 2018/04/14 13:33:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$VT_RELDISP(r1, 0x5605) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000040)) ioctl$TIOCSBRK(r2, 0x40044591) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000080)=""/29) pause() 2018/04/14 13:33:04 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3, 0x204, 0x400, 0x1, 0x0}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000440)={r2, 0x2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e21, 0x3ff, @mcast2={0xff, 0x2, [], 0x1}}}, 0x3, 0x6}, &(0x7f0000000380)=0x90) r3 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0xf5) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002880)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000002a80)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000002b80)=0xe8) accept4$packet(r0, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002c00)=0x14, 0x800) accept4$packet(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002c80)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000002e00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002dc0)={&(0x7f0000002cc0)={0xd8, r4, 0x0, 0x70bd26, 0x25dfdbfd, {0x2}, [{{0x8, 0x1, r5}, {0x4, 0x2}}, {{0x8, 0x1, r6}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}]}}]}, 0xd8}, 0x1, 0x0, 0x0, 0xc000}, 0x24000000) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2=0xe0000002}, {0x307, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x40, {0x2, 0x4e20, @rand_addr=0x7}, 'veth0_to_bridge\x00'}) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000140)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x3, [@rand_addr, @empty, @dev={0xac, 0x14, 0x14}]}, 0x1c) setsockopt$inet_mreqn(r3, 0x0, 0x25, &(0x7f0000000200)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/14 13:33:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r1, 0x2d, "5243e573373f220f086b5ecba07db3bcc9e1e5adfe02dbca0484e08051e163668d9cd2d7bef8a8a7e930d65fdc"}, &(0x7f0000000180)=0x35) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r1}, &(0x7f0000000040)=0xc) 2018/04/14 13:33:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x2000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x47f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/153) 2018/04/14 13:33:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0x3c, 0x1036, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'veth1_to_team\x00', r2}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x2000000004) 2018/04/14 13:33:04 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000000c0)='SE Linux', &(0x7f0000000100)='nem0\x00', &(0x7f0000000140)='\\systemem0md5sumkeyringsystem$+!:lovmnet0eth0-ppp0.^A\x00', &(0x7f0000000180)='/dev/sequencer\x00', &(0x7f00000001c0)='\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='SE Linux', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='SE Linux', &(0x7f0000000340)='/dev/sequencer\x00'], 0x400) 2018/04/14 13:33:04 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x2691d0877f1cca9b}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x36, "27e06443cb47ec229514cc965ba0c5e77c1cfe8d8951818c4f3bf46890ea0b7526ca4c9249b01fcc517894576a5ea46b2b1e50e13fd6"}, &(0x7f0000000180)=0x3e) socket(0x5, 0x80000, 0x4c) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000001c0)={0x7f, 0x200, 0xf06, 0x4f}, 0x10) ioctl$TUNSETLINK(r1, 0x400454cd, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) 2018/04/14 13:33:04 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x311, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x80000) write$cgroup_int(r1, &(0x7f0000000140)={[0x2d, 0x32]}, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x8, 0x1f4, 0x6, 0xdd, 0x0, 0x9, 0x80301, 0x2, 0x400, 0x4, 0xaac7, 0x4, 0x93, 0xfffffffffffffffa, 0x3, 0x4, 0x1, 0x1, 0x2da, 0x4000000000000000, 0x0, 0x0, 0x4, 0x3, 0x9, 0x6, 0x80000000, 0x7, 0x9, 0x9, 0x7fff, 0x100000001, 0x584, 0x8001, 0x97a, 0x20, 0x0, 0x1000, 0x4, @perf_config_ext={0x1, 0x8001}, 0x0, 0x7, 0x81, 0x7, 0x7fffffff, 0x2, 0xcb}, r2, 0xe, r0, 0x8) 2018/04/14 13:33:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = semget$private(0x0, 0x0, 0x1) semop(r1, &(0x7f00000013c0), 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/169, 0xa9}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f00000001c0)=""/56, 0x38}], 0x4) fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) r2 = gettid() r3 = getpgrp(r2) capset(&(0x7f00000013c0)={0x20071026, r3}, &(0x7f0000001400)={0x800, 0x10000000009, 0x3, 0x8, 0x6, 0x800}) getpgid(r3) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f00000002c0)=""/197, 0xfffffffffffffd57, &(0x7f0000000100)=""/131, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x5452, &(0x7f0000001440)=0xf7) 2018/04/14 13:33:05 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002940)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="88c6bd92421710d735ad7948d20fff9915dcdf6e06aca8e9903a066d3c78ab4c7c15b98ae42234d3ae9c53fce4824ffd8e2179b73d202fc96ecd84fedcfb21ae4e2753a926cd7ebf12416a8b4157a18a2468af109219e62b53c17285cb34e01c2643ccd4af06182084c71683a80272cc", 0x70}], 0x1, &(0x7f00000013c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/14 13:33:05 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8081, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="0180c20000000180c2000000080045000030000000000067907800000000050000002200907800000000450001000000000000000000ac14ffbb00000000"], &(0x7f0000000040)) 2018/04/14 13:33:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x511000) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x8, 0x13, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0070eefff924f6fd977db6cdf2a2d42b003395dc5f9a56b483b2cb2ebed4213414c4d956d1df68dc17863021df3c890340c9e5613da0305acec695019d6f16cb1202785e267ff7d853f1cacc7e8ee0922d9d4c5765004ee0e875d10110140dbf54c73095f96489860b38b5bba15e78025affffffffb88f52c1e8aeceaaac0086b0310000000000000000000000d245920a35b4237974533163a3dc11ffae6b"], &(0x7f0000001140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0x7}}, 0x4, 0x8}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x6}, 0x8) 2018/04/14 13:33:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000007c80)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000007c40)=ANY=[@ANYBLOB="2400000019000700490f0010b075e8b4c748dc2000000000000a0000001241abb9920000"], 0x24}, 0x1}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000003880)='/dev/input/mice\x00', 0x0, 0x800000000040000) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000003700)=""/139) fchmod(r0, 0x110) sendmsg$nl_route(r0, &(0x7f0000003840)={&(0x7f00000036c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003800)={&(0x7f00000037c0)=@ipv4_delroute={0x24, 0x19, 0x300, 0x70bd25, 0x25dfdbfd, {0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7, 0xfe, 0xf, 0x400}, [@RTA_GATEWAY={0x8, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) recvmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/92, 0x5c}, {&(0x7f0000000080)=""/218, 0xda}, {&(0x7f0000000180)=""/95, 0x5f}, {&(0x7f0000000280)=""/6, 0x6}], 0x4, &(0x7f0000000300)=""/188, 0xbc, 0xfe}, 0x5}, {{&(0x7f00000003c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000440)=""/86, 0x56}, {&(0x7f00000004c0)=""/52, 0x9f}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/157, 0x9d}, {&(0x7f00000015c0)=""/172, 0xac}, {&(0x7f0000001680)=""/15, 0xf}, {&(0x7f00000016c0)=""/29, 0x1d}], 0x7, &(0x7f0000001780)=""/132, 0x84, 0x2}, 0xf2}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001840)=""/65, 0x41}, {&(0x7f00000018c0)=""/146, 0x92}, {&(0x7f0000001980)=""/187, 0xbb}, {&(0x7f0000001a40)=""/109, 0x6d}, {&(0x7f0000001ac0)=""/252, 0xfc}, {&(0x7f0000001bc0)=""/28, 0x1c}, {&(0x7f0000001c00)=""/217, 0xd9}, {&(0x7f0000001d00)=""/223, 0xdf}, {&(0x7f0000001e00)=""/142, 0x8e}, {&(0x7f0000001ec0)=""/77, 0x4d}], 0xa, &(0x7f0000002000)=""/162, 0xa2, 0x40}, 0x8}, {{&(0x7f00000020c0)=@in={0x0, 0x0, @dev}, 0x80, &(0x7f0000003400)=[{&(0x7f0000002140)=""/182, 0xb6}, {&(0x7f0000002200)=""/103, 0x67}, {&(0x7f0000002280)=""/243, 0xf3}, {&(0x7f0000002380)=""/45, 0x2d}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/28, 0x1c}], 0x6, &(0x7f0000003480)=""/197, 0xc5, 0x20}, 0x2}], 0x4, 0x40, &(0x7f0000003680)={0x0, 0x989680}) [ 68.282283] ================================================================== [ 68.289698] BUG: KMSAN: uninit-value in gf128mul_init_4k_lle+0x212/0x5c0 [ 68.296530] CPU: 0 PID: 5896 Comm: syz-executor7 Not tainted 4.16.0+ #83 [ 68.303354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.312699] Call Trace: [ 68.315268] dump_stack+0x185/0x1d0 [ 68.318875] ? gf128mul_init_4k_lle+0x212/0x5c0 [ 68.323524] kmsan_report+0x142/0x240 [ 68.327304] __msan_warning_32+0x6c/0xb0 [ 68.331351] gf128mul_init_4k_lle+0x212/0x5c0 [ 68.335827] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 68.341171] ? ghash_setkey+0x56/0x280 [ 68.345046] ghash_setkey+0x185/0x280 [ 68.348834] ? ghash_final+0x1f0/0x1f0 [ 68.352710] shash_async_setkey+0x337/0x4c0 [ 68.357031] ? shash_async_digest+0x1b0/0x1b0 [ 68.361514] crypto_ahash_setkey+0x31a/0x470 [ 68.365903] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 68.371088] crypto_gcm_setkey+0xa3c/0xc10 [ 68.375317] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 68.379707] crypto_aead_setkey+0x373/0x4c0 [ 68.384019] aead_setkey+0xa0/0xc0 [ 68.387548] alg_setsockopt+0x6c5/0x740 [ 68.391511] ? aead_release+0x90/0x90 [ 68.395313] ? alg_accept+0xd0/0xd0 [ 68.398927] SYSC_setsockopt+0x4b8/0x570 [ 68.402983] SyS_setsockopt+0x76/0xa0 [ 68.406776] do_syscall_64+0x309/0x430 [ 68.410644] ? SYSC_recv+0xe0/0xe0 [ 68.414182] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 68.419360] RIP: 0033:0x455319 [ 68.422532] RSP: 002b:00007f422b5e6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 68.430225] RAX: ffffffffffffffda RBX: 00007f422b5e76d4 RCX: 0000000000455319 [ 68.437474] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 68.444723] RBP: 000000000072bea0 R08: 0000000000000020 R09: 0000000000000000 [ 68.451971] R10: 0000000020ff8000 R11: 0000000000000246 R12: 00000000ffffffff [ 68.459219] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 68.466475] [ 68.468089] Uninit was stored to memory at: [ 68.472400] kmsan_internal_chain_origin+0x12b/0x210 [ 68.477490] kmsan_memcpy_origins+0x11d/0x170 [ 68.481973] __msan_memcpy+0x19f/0x1f0 [ 68.485849] gf128mul_init_4k_lle+0x99/0x5c0 [ 68.490245] ghash_setkey+0x185/0x280 [ 68.494035] shash_async_setkey+0x337/0x4c0 [ 68.498362] crypto_ahash_setkey+0x31a/0x470 [ 68.502761] crypto_gcm_setkey+0xa3c/0xc10 [ 68.506983] crypto_aead_setkey+0x373/0x4c0 [ 68.511285] aead_setkey+0xa0/0xc0 [ 68.514801] alg_setsockopt+0x6c5/0x740 [ 68.518759] SYSC_setsockopt+0x4b8/0x570 [ 68.522799] SyS_setsockopt+0x76/0xa0 [ 68.526580] do_syscall_64+0x309/0x430 [ 68.530452] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 68.535620] Uninit was stored to memory at: [ 68.539923] kmsan_internal_chain_origin+0x12b/0x210 [ 68.545011] __msan_chain_origin+0x69/0xc0 [ 68.549239] __crypto_xor+0x23c/0x16b0 [ 68.553111] crypto_ctr_crypt_inplace+0x29a/0x3a0 [ 68.557930] crypto_ctr_crypt+0x54c/0x7d0 [ 68.562067] skcipher_encrypt_blkcipher+0x222/0x320 [ 68.567084] crypto_gcm_setkey+0x6a3/0xc10 [ 68.571302] crypto_aead_setkey+0x373/0x4c0 [ 68.575611] aead_setkey+0xa0/0xc0 [ 68.579131] alg_setsockopt+0x6c5/0x740 [ 68.583098] SYSC_setsockopt+0x4b8/0x570 [ 68.587139] SyS_setsockopt+0x76/0xa0 [ 68.590926] do_syscall_64+0x309/0x430 [ 68.594800] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 68.599967] Local variable description: ----vla@crypto_ctr_crypt_inplace [ 68.606789] Variable was created at: [ 68.610487] crypto_ctr_crypt_inplace+0x19a/0x3a0 [ 68.615308] crypto_ctr_crypt+0x54c/0x7d0 [ 68.619426] ================================================================== [ 68.626757] Disabling lock debugging due to kernel taint [ 68.632184] Kernel panic - not syncing: panic_on_warn set ... [ 68.632184] [ 68.639538] CPU: 0 PID: 5896 Comm: syz-executor7 Tainted: G B 4.16.0+ #83 [ 68.647659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.656997] Call Trace: [ 68.659576] dump_stack+0x185/0x1d0 [ 68.663196] panic+0x39d/0x940 [ 68.666395] ? gf128mul_init_4k_lle+0x212/0x5c0 [ 68.671054] kmsan_report+0x238/0x240 [ 68.674845] __msan_warning_32+0x6c/0xb0 [ 68.678895] gf128mul_init_4k_lle+0x212/0x5c0 [ 68.683373] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 68.688719] ? ghash_setkey+0x56/0x280 [ 68.692591] ghash_setkey+0x185/0x280 [ 68.696385] ? ghash_final+0x1f0/0x1f0 [ 68.700263] shash_async_setkey+0x337/0x4c0 [ 68.704568] ? shash_async_digest+0x1b0/0x1b0 [ 68.709055] crypto_ahash_setkey+0x31a/0x470 [ 68.713462] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 68.718645] crypto_gcm_setkey+0xa3c/0xc10 [ 68.722864] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 68.727253] crypto_aead_setkey+0x373/0x4c0 [ 68.731571] aead_setkey+0xa0/0xc0 [ 68.735108] alg_setsockopt+0x6c5/0x740 [ 68.739084] ? aead_release+0x90/0x90 [ 68.742876] ? alg_accept+0xd0/0xd0 [ 68.746924] SYSC_setsockopt+0x4b8/0x570 [ 68.750966] SyS_setsockopt+0x76/0xa0 [ 68.754746] do_syscall_64+0x309/0x430 [ 68.758631] ? SYSC_recv+0xe0/0xe0 [ 68.762170] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 68.767346] RIP: 0033:0x455319 [ 68.770518] RSP: 002b:00007f422b5e6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 68.778653] RAX: ffffffffffffffda RBX: 00007f422b5e76d4 RCX: 0000000000455319 [ 68.785903] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 68.793155] RBP: 000000000072bea0 R08: 0000000000000020 R09: 0000000000000000 [ 68.800408] R10: 0000000020ff8000 R11: 0000000000000246 R12: 00000000ffffffff [ 68.807659] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 68.815416] Dumping ftrace buffer: [ 68.818933] (ftrace buffer empty) [ 68.822618] Kernel Offset: disabled [ 68.826218] Rebooting in 86400 seconds..