INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.38' (ECDSA) to the list of known hosts. 2018/04/07 02:35:29 fuzzer started 2018/04/07 02:35:30 dialing manager at 10.128.0.26:38639 2018/04/07 02:35:35 kcov=true, comps=false 2018/04/07 02:35:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000540)="6e65742f6970365f6d725f7669660002fa79d7f8fb47eb95e6de2bde24eea7bf48438d42f89b189cca78bbfd94afcf7397f450b58bc2f639d5b8521aaed21a11d21ea879bcfcb7ae2e45d15180bdee4c2eb1464c7fd1b4c3c055233bbc9b34842a7fac52e3ec2d0794dc7d355ffcc321fc0b1a779ee0fdd751f6ef6174b763aa55ad9b71fbc61ef6fa9fe66452d6237f8a90e4d773672d290c08f13f3ccd2096d70e9a2c121056bc8f4e21bf96574cd91d4e162a2a153ec69a720f9a1e7b61f12c46f249d5acd03e6176e6c57d6c25609514983dd49d69b5ee22086deb623b88338f36ea200000b415a6932af0ac") pread64(r0, &(0x7f0000000200)=""/193, 0xc1, 0x0) 2018/04/07 02:35:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b02230600fe8000000000000000000000000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYBLOB="c7bbf5e43b00807e"], &(0x7f00000002c0)) 2018/04/07 02:35:38 executing program 7: 2018/04/07 02:35:38 executing program 4: mkdir(&(0x7f000022d000)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000240)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) 2018/04/07 02:35:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) poll(&(0x7f0000000140)=[{r0, 0x2018}], 0x1, 0x0) 2018/04/07 02:35:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="13ca2c070009000045"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/07 02:35:38 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001500)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000002880)={0x14, 0x6, 0x1, 0x701}, 0x14}, 0x1}, 0x0) 2018/04/07 02:35:38 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) timer_create(0x0, &(0x7f00000003c0)={0x0, 0x1e, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000400)) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x24d, &(0x7f00000003c0)}}, {{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000500), 0xfffffeb6}], 0x1, &(0x7f0000000000)}}], 0x40000000000001c, 0x0) syzkaller login: [ 40.997517] ip (3753) used greatest stack depth: 54672 bytes left [ 41.333367] ip (3783) used greatest stack depth: 54408 bytes left [ 42.643926] ip (3901) used greatest stack depth: 54200 bytes left [ 44.533724] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.551326] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.690071] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.769712] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.821636] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.857900] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.867822] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.089463] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.371068] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.381419] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.566834] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.584727] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.671925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.734158] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.796991] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.849423] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.083988] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.090262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.102603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.159654] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.165946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.178543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.327143] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.333426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.344646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.371951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.382984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.404591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.434304] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.443217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.476452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.542957] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.549481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.560692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.603744] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.613123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.643281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.664616] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.673878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.700070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 02:35:55 executing program 6: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000de8000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffb}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000de7ffc)) 2018/04/07 02:35:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000540)="6e65742f6970365f6d725f7669660002fa79d7f8fb47eb95e6de2bde24eea7bf48438d42f89b189cca78bbfd94afcf7397f450b58bc2f639d5b8521aaed21a11d21ea879bcfcb7ae2e45d15180bdee4c2eb1464c7fd1b4c3c055233bbc9b34842a7fac52e3ec2d0794dc7d355ffcc321fc0b1a779ee0fdd751f6ef6174b763aa55ad9b71fbc61ef6fa9fe66452d6237f8a90e4d773672d290c08f13f3ccd2096d70e9a2c121056bc8f4e21bf96574cd91d4e162a2a153ec69a720f9a1e7b61f12c46f249d5acd03e6176e6c57d6c25609514983dd49d69b5ee22086deb623b88338f36ea200000b415a6932af0ac") pread64(r0, &(0x7f0000000200)=""/193, 0xc1, 0x0) 2018/04/07 02:35:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000180)={0x14, 0x1, 0x8, 0x800000005}, 0x14}, 0x1}, 0x0) 2018/04/07 02:35:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 2018/04/07 02:35:55 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f00000011c0)='IPVS\x00') 2018/04/07 02:35:55 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f000001aff4)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000afd000)=[{&(0x7f0000309f9d)=""/1, 0x1}], 0x1) close(r0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000a00ff8)={0xffffffffffffffff, 0xffffffffffffffff}) read(r2, &(0x7f000038b000)=""/1, 0x1000000b6) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom(r3, &(0x7f0000017000), 0x0, 0x0, &(0x7f000002cff0)=@alg={0x26, 'hash\x00', 0x0, 0x0, "6c7a0700000c19e30000000000001302000000000000e2ffffffffffffff0000000000000000000000000000000000000000200000000000000000000e000800"}, 0x58) fcntl$setown(r2, 0x8, r1) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x13) 2018/04/07 02:35:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(r0, &(0x7f0000006dc0)={&(0x7f0000006980)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x14, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)='v', 0x1}], 0x1, &(0x7f0000001840)=ANY=[]}, 0x0) 2018/04/07 02:35:55 executing program 4: r0 = memfd_create(&(0x7f000001cffb)='.\x00', 0x0) ioctl$sock_ipx_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'eql\x00', {0x4, 0x5, 0x6d9, "2000000064f0", 0xd}}) r1 = syz_open_dev$sndseq(&(0x7f0000042ff3)='/dev/snd/seq\x00', 0x0, 0x20002) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000041f74)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0xfffffffffffffffe, 0x0, @tick=0x7, {}, {}, @note={0x0, 0x100000001, 0x0, 0x10001}}], 0xffffffffffffffed) 2018/04/07 02:35:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000540)="6e65742f6970365f6d725f7669660002fa79d7f8fb47eb95e6de2bde24eea7bf48438d42f89b189cca78bbfd94afcf7397f450b58bc2f639d5b8521aaed21a11d21ea879bcfcb7ae2e45d15180bdee4c2eb1464c7fd1b4c3c055233bbc9b34842a7fac52e3ec2d0794dc7d355ffcc321fc0b1a779ee0fdd751f6ef6174b763aa55ad9b71fbc61ef6fa9fe66452d6237f8a90e4d773672d290c08f13f3ccd2096d70e9a2c121056bc8f4e21bf96574cd91d4e162a2a153ec69a720f9a1e7b61f12c46f249d5acd03e6176e6c57d6c25609514983dd49d69b5ee22086deb623b88338f36ea200000b415a6932af0ac") pread64(r0, &(0x7f0000000200)=""/193, 0xc1, 0x0) 2018/04/07 02:35:56 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f00000003c0)="60f84b3a", 0x4}], 0x1, 0x0) 2018/04/07 02:35:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/04/07 02:35:56 executing program 1: mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x266b084257ded2f2, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfebc, 0x20000004, &(0x7f00000002c0)={0xa}, 0x1c) 2018/04/07 02:35:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="cf010917f70100009603000081000000e0030000519f0000000000000000000008c9687ff35e190469243b736847e9fb701ab0ac37a8c04c1c4985b4d942819eb153cca4952d51568aa9ae9b34cf8744c45a67c9360b78678a8fb8648eca210a2ac57bcac6a742cea1e84fdaa9afbe4a1d2320bdb89d99258069d0703cb74e51efd8adbac659f008e16d980073fff655"], 0x90) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 02:35:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xffffffffffffff7c}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 2018/04/07 02:35:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(generic-gcm-aesni)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x60, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/07 02:35:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2000000000000008, &(0x7f0000aca000), 0x4) shutdown(r0, 0x1) 2018/04/07 02:35:56 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) capset(&(0x7f0000000680)={0x19980330}, &(0x7f00000006c0)) rmdir(&(0x7f0000000240)='./file0/bus\x00') 2018/04/07 02:35:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="cf010917f70100009603000081000000e0030000519f0000000000000000000008c9687ff35e190469243b736847e9fb701ab0ac37a8c04c1c4985b4d942819eb153cca4952d51568aa9ae9b34cf8744c45a67c9360b78678a8fb8648eca210a2ac57bcac6a742cea1e84fdaa9afbe4a1d2320bdb89d99258069d0703cb74e51efd8adbac659f008e16d980073fff655"], 0x90) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 02:35:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="cf010917f70100009603000081000000e0030000519f0000000000000000000008c9687ff35e190469243b736847e9fb701ab0ac37a8c04c1c4985b4d942819eb153cca4952d51568aa9ae9b34cf8744c45a67c9360b78678a8fb8648eca210a2ac57bcac6a742cea1e84fdaa9afbe4a1d2320bdb89d99258069d0703cb74e51efd8adbac659f008e16d980073fff655"], 0x90) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 02:35:56 executing program 3: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0xfffffffffffffe8c) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/route\x00') preadv(r0, &(0x7f0000000000), 0x200000000000022b, 0x10000003) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={0x0, 0x4}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x3}}, 0x0, 0x0, 0x0, 0x9}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000002c0)=0x88) 2018/04/07 02:35:56 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000487000)={@multicast2=0xe0000002, @loopback=0x7f000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) [ 56.876652] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) [ 56.880820] IPv4: Oversized IP packet from 127.0.0.1 [ 56.895464] device lo entered promiscuous mode [ 56.953763] IPv4: Oversized IP packet from 127.0.0.1 [ 56.960151] device lo left promiscuous mode 2018/04/07 02:35:57 executing program 2: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f000018f000)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "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"}}}}}, 0x0) poll(&(0x7f0000a5b000)=[{r0}], 0x1, 0x0) 2018/04/07 02:35:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="cf010917f70100009603000081000000e0030000519f0000000000000000000008c9687ff35e190469243b736847e9fb701ab0ac37a8c04c1c4985b4d942819eb153cca4952d51568aa9ae9b34cf8744c45a67c9360b78678a8fb8648eca210a2ac57bcac6a742cea1e84fdaa9afbe4a1d2320bdb89d99258069d0703cb74e51efd8adbac659f008e16d980073fff655"], 0x90) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 02:35:57 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000487000)={@multicast2=0xe0000002, @loopback=0x7f000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) 2018/04/07 02:35:57 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) capset(&(0x7f0000000680)={0x19980330}, &(0x7f00000006c0)) rmdir(&(0x7f0000000240)='./file0/bus\x00') 2018/04/07 02:35:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000487000)={@multicast2=0xe0000002, @loopback=0x7f000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) 2018/04/07 02:35:57 executing program 3: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='n', 0x1, 0xfffffffffffffffd) 2018/04/07 02:35:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xffffffffffffff7c}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) [ 57.208302] device lo entered promiscuous mode [ 57.228867] device lo entered promiscuous mode [ 57.240812] IPv4: Oversized IP packet from 127.0.0.1 2018/04/07 02:35:57 executing program 3: r0 = socket(0x11, 0x4000000000080003, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f0000000300), 0x3d9, &(0x7f0000000280)}}, {{&(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "99066c9aa4c2fbbf0aecb573b9d1bdc8be397716e627f0d1865ea32e0822c1026f14d27d9eb2214e9b34beb87de5d3aab05c161c037b28907fcb4fa979f696"}, 0x60, &(0x7f0000000f80), 0x0, &(0x7f0000002480)}}], 0x2, 0x0) 2018/04/07 02:35:57 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$evdev(r0, &(0x7f0000000140), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000015) 2018/04/07 02:35:58 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) capset(&(0x7f0000000680)={0x19980330}, &(0x7f00000006c0)) rmdir(&(0x7f0000000240)='./file0/bus\x00') 2018/04/07 02:35:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000487000)={@multicast2=0xe0000002, @loopback=0x7f000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) 2018/04/07 02:35:58 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2000000084) sendto$inet(r0, &(0x7f0000000180)="9d", 0x1, 0x8000, &(0x7f0000319ff0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="6f7c739e6928ef9c8603be1904bfed", 0xf, 0x0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/07 02:35:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(generic-gcm-aesni)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x60, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/07 02:35:58 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$evdev(r0, &(0x7f0000000140), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000015) 2018/04/07 02:35:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f61fe4)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/07 02:35:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="cf010917f70100009603000081000000e0030000519f0000000000000000000008c9687ff35e190469243b736847e9fb701ab0ac37a8c04c1c4985b4d942819eb153cca4952d51568aa9ae9b34cf8744c45a67c9360b78678a8fb8648eca210a2ac57bcac6a742cea1e84fdaa9afbe4a1d2320bdb89d99258069d0703cb74e51efd8adbac659f008e16d980073fff655"], 0x90) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 02:35:58 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000e40)=0xe8) r0 = syz_open_dev$sndseq(&(0x7f0000b88ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f0000000280)={{0x80}, "706f7274310000004000000000000000000000d600fffffff0000000000000000000eda4000000000000000700", 0xbfffffffffffffff, 0x2}) readv(r0, &(0x7f0000459000)=[{&(0x7f0000fd5fc3)=""/61, 0x3d}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000480)={0x101, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 59.031339] ================================================================== [ 59.038755] BUG: KMSAN: uninit-value in crc32c_pcl_intel_update+0x2af/0x500 [ 59.045861] CPU: 0 PID: 5211 Comm: syz-executor0 Not tainted 4.16.0+ #81 [ 59.052686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.062032] Call Trace: [ 59.064604] [ 59.066755] dump_stack+0x185/0x1d0 [ 59.070383] ? crc32c_pcl_intel_update+0x2af/0x500 [ 59.075311] kmsan_report+0x142/0x240 [ 59.079110] __msan_warning_32+0x6c/0xb0 [ 59.083168] crc32c_pcl_intel_update+0x2af/0x500 [ 59.087922] ? crc32c_intel_cra_init+0x80/0x80 [ 59.092493] crypto_shash_update+0x1e9/0x210 [ 59.096896] crc32c+0x155/0x210 [ 59.100172] sctp_csum_update+0x89/0xa0 [ 59.104137] __skb_checksum+0x234/0x1010 [ 59.108186] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 59.113538] ? __pskb_pull_tail+0x1154/0x22e0 [ 59.118024] ? kmsan_memcpy_origins+0xf1/0x170 [ 59.122598] ? sctp_has_association+0x160/0x160 [ 59.127258] sctp_rcv+0xf4e/0x4c90 [ 59.130791] ? raw_rcv+0x680/0x730 [ 59.134323] ? sctp_has_association+0x160/0x160 [ 59.138981] ? sctp_csum_update+0xa0/0xa0 [ 59.143133] ? sctp_csum_combine+0xa0/0xa0 [ 59.147360] ip_local_deliver_finish+0x6ed/0xd40 [ 59.152111] ip_local_deliver+0x43c/0x4e0 [ 59.156246] ? ip_local_deliver+0x4e0/0x4e0 [ 59.160558] ? ip_call_ra_chain+0x7b0/0x7b0 [ 59.164869] ip_rcv_finish+0x1253/0x16d0 [ 59.168926] ip_rcv+0x119d/0x16f0 [ 59.172365] ? ip_rcv+0x16f0/0x16f0 [ 59.175988] __netif_receive_skb_core+0x47cf/0x4a80 [ 59.180993] ? rb_insert_color+0xa4/0x1300 [ 59.185222] ? kmsan_internal_memset_shadow_inline+0xd0/0xd0 [ 59.191012] ? ip_local_deliver_finish+0xd40/0xd40 [ 59.195930] process_backlog+0x62d/0xe20 [ 59.199990] ? rps_trigger_softirq+0x2f0/0x2f0 [ 59.204557] net_rx_action+0x7c1/0x1a70 [ 59.208531] ? net_tx_action+0xab0/0xab0 [ 59.212585] __do_softirq+0x56d/0x93d [ 59.216384] do_softirq_own_stack+0x2a/0x40 [ 59.220685] [ 59.222914] __local_bh_enable_ip+0x114/0x140 [ 59.227398] local_bh_enable+0x36/0x40 [ 59.231276] ip_finish_output2+0x124e/0x1380 [ 59.235677] ip_finish_output+0xcb0/0xff0 [ 59.239821] ip_output+0x502/0x5c0 [ 59.243353] ? ip_mc_finish_output+0x3b0/0x3b0 [ 59.247928] ? ip_finish_output+0xff0/0xff0 [ 59.252235] ip_send_skb+0x5f3/0x820 [ 59.255939] ? __ip_local_out+0x5b0/0x5b0 [ 59.260080] ip_push_pending_frames+0x105/0x170 [ 59.264739] raw_sendmsg+0x2960/0x3ed0 [ 59.268642] ? compat_raw_ioctl+0x100/0x100 [ 59.272951] inet_sendmsg+0x48d/0x740 [ 59.276744] ? security_socket_sendmsg+0x9e/0x210 [ 59.281584] ? inet_getname+0x500/0x500 [ 59.285548] SYSC_sendto+0x6c3/0x7e0 [ 59.289259] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 59.294696] ? prepare_exit_to_usermode+0x149/0x3a0 [ 59.299709] SyS_sendto+0x8a/0xb0 [ 59.303153] do_syscall_64+0x309/0x430 [ 59.307033] ? SYSC_getpeername+0x560/0x560 [ 59.312102] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.317281] RIP: 0033:0x455259 [ 59.320454] RSP: 002b:00007f06ea01dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 59.328149] RAX: ffffffffffffffda RBX: 00007f06ea01e6d4 RCX: 0000000000455259 [ 59.335403] RDX: 000000000000000f RSI: 0000000020000080 RDI: 0000000000000013 [ 59.342658] RBP: 000000000072bea0 R08: 0000000020000000 R09: 0000000000000010 [ 59.349913] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 59.357167] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 59.364423] [ 59.366035] Uninit was stored to memory at: [ 59.370347] kmsan_internal_chain_origin+0x12b/0x210 [ 59.375434] kmsan_memcpy_origins+0x11d/0x170 [ 59.379914] __msan_memcpy+0x19f/0x1f0 [ 59.383790] skb_copy_bits+0x63a/0xdb0 [ 59.387666] __pskb_pull_tail+0x483/0x22e0 [ 59.391887] sctp_rcv+0x673/0x4c90 [ 59.395417] ip_local_deliver_finish+0x6ed/0xd40 [ 59.400156] ip_local_deliver+0x43c/0x4e0 [ 59.404289] ip_rcv_finish+0x1253/0x16d0 [ 59.408344] ip_rcv+0x119d/0x16f0 [ 59.411786] __netif_receive_skb_core+0x47cf/0x4a80 [ 59.416786] process_backlog+0x62d/0xe20 [ 59.420832] net_rx_action+0x7c1/0x1a70 [ 59.424795] __do_softirq+0x56d/0x93d [ 59.428575] Uninit was created at: [ 59.432106] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 59.437107] kmsan_alloc_page+0x82/0xe0 [ 59.441068] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 59.445813] alloc_pages_current+0x6b5/0x970 [ 59.450208] skb_page_frag_refill+0x3ba/0x5e0 [ 59.454688] sk_page_frag_refill+0xa4/0x340 [ 59.458995] __ip_append_data+0x107e/0x3d10 [ 59.463302] ip_append_data+0x2fb/0x440 [ 59.467264] raw_sendmsg+0x287b/0x3ed0 [ 59.471138] inet_sendmsg+0x48d/0x740 [ 59.474927] SYSC_sendto+0x6c3/0x7e0 [ 59.478627] SyS_sendto+0x8a/0xb0 [ 59.482065] do_syscall_64+0x309/0x430 [ 59.485945] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.491117] ================================================================== [ 59.498458] Disabling lock debugging due to kernel taint [ 59.503894] Kernel panic - not syncing: panic_on_warn set ... [ 59.503894] [ 59.511250] CPU: 0 PID: 5211 Comm: syz-executor0 Tainted: G B 4.16.0+ #81 [ 59.519371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.528710] Call Trace: [ 59.531280] [ 59.533423] dump_stack+0x185/0x1d0 [ 59.537041] panic+0x39d/0x940 [ 59.540245] ? crc32c_pcl_intel_update+0x2af/0x500 [ 59.545161] kmsan_report+0x238/0x240 [ 59.548951] __msan_warning_32+0x6c/0xb0 [ 59.553001] crc32c_pcl_intel_update+0x2af/0x500 [ 59.557748] ? crc32c_intel_cra_init+0x80/0x80 [ 59.562323] crypto_shash_update+0x1e9/0x210 [ 59.566722] crc32c+0x155/0x210 [ 59.569996] sctp_csum_update+0x89/0xa0 [ 59.573960] __skb_checksum+0x234/0x1010 [ 59.578006] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 59.583358] ? __pskb_pull_tail+0x1154/0x22e0 [ 59.587844] ? kmsan_memcpy_origins+0xf1/0x170 [ 59.592415] ? sctp_has_association+0x160/0x160 [ 59.597076] sctp_rcv+0xf4e/0x4c90 [ 59.600606] ? raw_rcv+0x680/0x730 [ 59.604139] ? sctp_has_association+0x160/0x160 [ 59.608797] ? sctp_csum_update+0xa0/0xa0 [ 59.612940] ? sctp_csum_combine+0xa0/0xa0 [ 59.617161] ip_local_deliver_finish+0x6ed/0xd40 [ 59.621912] ip_local_deliver+0x43c/0x4e0 [ 59.626051] ? ip_local_deliver+0x4e0/0x4e0 [ 59.630364] ? ip_call_ra_chain+0x7b0/0x7b0 [ 59.634675] ip_rcv_finish+0x1253/0x16d0 [ 59.638733] ip_rcv+0x119d/0x16f0 [ 59.642180] ? ip_rcv+0x16f0/0x16f0 [ 59.645806] __netif_receive_skb_core+0x47cf/0x4a80 [ 59.650809] ? rb_insert_color+0xa4/0x1300 [ 59.655034] ? kmsan_internal_memset_shadow_inline+0xd0/0xd0 [ 59.660821] ? ip_local_deliver_finish+0xd40/0xd40 [ 59.665744] process_backlog+0x62d/0xe20 [ 59.669803] ? rps_trigger_softirq+0x2f0/0x2f0 [ 59.674371] net_rx_action+0x7c1/0x1a70 [ 59.678338] ? net_tx_action+0xab0/0xab0 [ 59.682391] __do_softirq+0x56d/0x93d [ 59.686186] do_softirq_own_stack+0x2a/0x40 [ 59.690491] [ 59.692724] __local_bh_enable_ip+0x114/0x140 [ 59.697211] local_bh_enable+0x36/0x40 [ 59.701089] ip_finish_output2+0x124e/0x1380 [ 59.705489] ip_finish_output+0xcb0/0xff0 [ 59.709628] ip_output+0x502/0x5c0 [ 59.713159] ? ip_mc_finish_output+0x3b0/0x3b0 [ 59.717734] ? ip_finish_output+0xff0/0xff0 [ 59.722046] ip_send_skb+0x5f3/0x820 [ 59.725752] ? __ip_local_out+0x5b0/0x5b0 [ 59.729896] ip_push_pending_frames+0x105/0x170 [ 59.734559] raw_sendmsg+0x2960/0x3ed0 [ 59.738461] ? compat_raw_ioctl+0x100/0x100 [ 59.742774] inet_sendmsg+0x48d/0x740 [ 59.746568] ? security_socket_sendmsg+0x9e/0x210 [ 59.751399] ? inet_getname+0x500/0x500 [ 59.755365] SYSC_sendto+0x6c3/0x7e0 [ 59.759070] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 59.764509] ? prepare_exit_to_usermode+0x149/0x3a0 [ 59.769524] SyS_sendto+0x8a/0xb0 [ 59.772968] do_syscall_64+0x309/0x430 [ 59.776849] ? SYSC_getpeername+0x560/0x560 [ 59.781166] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.786341] RIP: 0033:0x455259 [ 59.789517] RSP: 002b:00007f06ea01dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 59.797216] RAX: ffffffffffffffda RBX: 00007f06ea01e6d4 RCX: 0000000000455259 [ 59.804475] RDX: 000000000000000f RSI: 0000000020000080 RDI: 0000000000000013 [ 59.811743] RBP: 000000000072bea0 R08: 0000000020000000 R09: 0000000000000010 [ 59.819000] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 59.826341] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 59.834087] Dumping ftrace buffer: [ 59.837602] (ftrace buffer empty) [ 59.841283] Kernel Offset: disabled [ 59.844879] Rebooting in 86400 seconds..