INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. 2018/04/12 13:42:18 fuzzer started 2018/04/12 13:42:19 dialing manager at 10.128.0.26:41677 2018/04/12 13:42:26 kcov=true, comps=false 2018/04/12 13:42:29 executing program 0: 2018/04/12 13:42:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) 2018/04/12 13:42:29 executing program 4: r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000602000/0x1000)=nil, 0x6000) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x7fff, &(0x7f0000605000/0x1000)=nil, 0x2) 2018/04/12 13:42:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 2018/04/12 13:42:29 executing program 5: r0 = socket(0x80000000010, 0x803, 0x0) write(r0, &(0x7f0000000040)="260000002a0029d10701c1eb448974000000040001000000000000000002000000000000e9ff", 0x26) 2018/04/12 13:42:29 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=ANY=[]) 2018/04/12 13:42:29 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000aba000)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000e2a000)={&(0x7f0000000080)={0x14, 0xd, 0x100000000a, 0x20000005, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/12 13:42:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) syzkaller login: [ 43.230987] ip (3731) used greatest stack depth: 54888 bytes left [ 43.331271] ip (3742) used greatest stack depth: 54688 bytes left [ 43.752855] ip (3781) used greatest stack depth: 54672 bytes left [ 43.939454] ip (3800) used greatest stack depth: 54656 bytes left [ 44.028732] ip (3805) used greatest stack depth: 54312 bytes left [ 44.673847] ip (3876) used greatest stack depth: 54200 bytes left [ 46.611260] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.701061] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.809931] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.842328] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.922997] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.950988] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.960064] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.153372] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.416725] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.432549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.507274] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.579275] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.621720] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.716294] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.823379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.010341] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.147969] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.154340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.167650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.210453] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.216743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.224652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.263989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.270368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.302958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.366980] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.373229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.386576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.421892] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.431720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.453185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.549150] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.555391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.571603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.643556] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.649804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.664597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.881249] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.887483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.897935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 13:42:46 executing program 0: socket$kcm(0x29, 0x1000000000000005, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000018cff6)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000002780)=[{&(0x7f0000001200)=""/237, 0xed}, {&(0x7f0000001300)=""/196, 0xc4}, {&(0x7f0000000280)=""/224, 0xe0}], 0x3) 2018/04/12 13:42:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000aba000)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000e2a000)={&(0x7f0000831000)={0x20, 0x7, 0xa, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x200000001, @u32}]}, 0x20}, 0x1}, 0x0) 2018/04/12 13:42:46 executing program 2: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r0, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) 2018/04/12 13:42:46 executing program 6: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockname(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, &(0x7f0000000280)=0x80) 2018/04/12 13:42:46 executing program 5: syz_emit_ethernet(0x14, &(0x7f00000c5fe8)={@dev={[0xaa, 0xaa, 0xaa, 0xaa]}, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@generic={0x8863, "94a7030000e8"}}}, &(0x7f0000b0c000)) 2018/04/12 13:42:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x0) 2018/04/12 13:42:46 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @rand_addr, @link_local={0x1, 0x80, 0xc2}, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x0) 2018/04/12 13:42:46 executing program 7: perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x20000000005382, &(0x7f0000000000)) 2018/04/12 13:42:46 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x9, 0xe, 0x7b2, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0}, 0x10) 2018/04/12 13:42:46 executing program 6: r0 = socket(0x1000000010, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)=@ipv6_delroute={0x1c, 0x19, 0x201, 0x0, 0x0, {0xa, 0x94}}, 0x316}, 0x1}, 0x0) 2018/04/12 13:42:46 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x46}}) 2018/04/12 13:42:46 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x1) shutdown(r1, 0x0) tkill(r0, 0x1000000000016) 2018/04/12 13:42:46 executing program 5: add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xffffffffffffffff) 2018/04/12 13:42:46 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x50, &(0x7f00000002c0)}, 0x10) 2018/04/12 13:42:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x8, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x1, 0x4, 0x8000000000009, 0x0, r0, 0x0, [0x305f, 0xa]}, 0x2c) 2018/04/12 13:42:46 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) sendmsg$netlink(r1, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000a77000)=ANY=[@ANYBLOB], 0x2300}], 0x1, &(0x7f0000414000)}, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r2, 0x1) 2018/04/12 13:42:47 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)={0x14, 0x22, 0x109, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/12 13:42:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000d51eed)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @broadcast=0xffffffff}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0xffffffffffffffff, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x0, 0x21}}}}}}, 0x0) 2018/04/12 13:42:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='io.weight\x00', 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f00000001c0)='3', 0x1}], 0x1) 2018/04/12 13:42:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@nl=@unspec, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 2018/04/12 13:42:47 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') 2018/04/12 13:42:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xe, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002e0000002500000000000000950000000000f5ff"], &(0x7f00000000c0)='syzkaller\x00', 0x41, 0xc3, &(0x7f0000000300)=""/195}, 0x48) 2018/04/12 13:42:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000d3eff7)='net/unix\x00') lseek(r0, 0x0, 0x1) 2018/04/12 13:42:47 executing program 6: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00', &(0x7f00000000c0)="2176626f786e657430776c616e302d10", 0x10, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r1) 2018/04/12 13:42:47 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144a000ae9", 0x12, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000)=""/75, 0x4b) recvmsg$kcm(r0, &(0x7f0000187000)={&(0x7f00007e3ff0)=@ax25, 0x10, &(0x7f0000746000), 0x0, &(0x7f0000eb5f99)=""/103, 0x67}, 0x0) recvmsg$kcm(r0, &(0x7f00004b0fc8)={0x0, 0x0, &(0x7f0000564f60), 0x0, &(0x7f00000f0f17)=""/233, 0xe9}, 0x0) read(r0, &(0x7f0000000080)=""/248, 0xf8) 2018/04/12 13:42:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x6b, 0xb}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) 2018/04/12 13:42:47 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="a9", 0x1}], 0x1, 0x0) r1 = creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) dup2(r1, r0) 2018/04/12 13:42:47 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x890b, &(0x7f0000000000)={"62726964676530000200"}) 2018/04/12 13:42:47 executing program 1: socket$inet(0xa, 0x3, 0x0) 2018/04/12 13:42:47 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) 2018/04/12 13:42:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(serpent),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000026c0)="bb", 0x1}], 0x1, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 13:42:48 executing program 2: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000fd8)={'\x00', @ifru_map}) 2018/04/12 13:42:48 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) close(r1) r2 = memfd_create(&(0x7f0000a98000)='y#\x00W', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fremovexattr(r1, &(0x7f00002a8000)=@known='system.posix_acl_default\x00') write(r1, &(0x7f000014d000), 0x0) close(r0) 2018/04/12 13:42:48 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000000c0)=0x24) 2018/04/12 13:42:48 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240), &(0x7f0000000280)=0x8) 2018/04/12 13:42:48 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000002000), &(0x7f0000002ffc)=0x8) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xa, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/12 13:42:48 executing program 0: r0 = syz_open_dev$urandom(&(0x7f0000c4f000)='/dev/urandom\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42c01) 2018/04/12 13:42:48 executing program 1: mkdir(&(0x7f000043eff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000040)='./file0\x00', 0x5) 2018/04/12 13:42:48 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(serpent),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000026c0)="bb", 0x1}], 0x1, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 13:42:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x8}, [@typed={0x8, 0x1, @pid}]}, 0x1c}, 0x1}, 0x0) 2018/04/12 13:42:48 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x22801, 0x0) write$evdev(r0, &(0x7f0000000200)=[{{}, 0x0, 0x0, 0x1ff}], 0x18) 2018/04/12 13:42:48 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000002000)={0xffffffffffffffff}) close(r0) ioctl$sock_ipx_SIOCIPXCFGDATA(r1, 0x89e2, &(0x7f0000b66000)) 2018/04/12 13:42:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000c48ff8)=@fragment, 0x8) sendto$inet6(r0, &(0x7f000010bf14)='r', 0x1, 0x0, &(0x7f0000a8c000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}, 0x1c) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000622ffc), 0x0) 2018/04/12 13:42:48 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/12 13:42:48 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(serpent),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000026c0)="bb", 0x1}], 0x1, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 13:42:49 executing program 1: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000cb7000)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000703fc8)={&(0x7f0000154000)=@un=@abs, 0x8, &(0x7f00004cafb0), 0x0, &(0x7f00001f7000)=""/134, 0x86}, 0x0) r1 = socket$inet(0x10, 0x3, 0x10) recvfrom(r1, &(0x7f000001af07)=""/249, 0xf9, 0x0, &(0x7f000001b000)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0xfffffffffffffcfc) sendmsg(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000004000)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/12 13:42:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000010ffc)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x9}, 0x1c) 2018/04/12 13:42:49 executing program 4: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x101002) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x76, 0x2}, {{0x0, 0x2}}], 0x30) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 2018/04/12 13:42:49 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x80051, r0, 0x0) 2018/04/12 13:42:49 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(serpent),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000026c0)="bb", 0x1}], 0x1, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 13:42:49 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000002000), &(0x7f0000002ffc)=0x8) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xa, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/12 13:42:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000c48ff8)=@fragment, 0x8) sendto$inet6(r0, &(0x7f000010bf14)='r', 0x1, 0x0, &(0x7f0000a8c000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}, 0x1c) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000622ffc), 0x0) 2018/04/12 13:42:49 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000001000)={0x0, 0x0, 0x8, 'queue1\x00'}) ioctl(r0, 0x1, &(0x7f0000001000)) [ 61.757240] sd 0:0:1:0: tag#3273 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK [ 61.765477] sd 0:0:1:0: tag#3273 CDB: Read(6) 08 00 00 00 71 75 2018/04/12 13:42:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x5b) 2018/04/12 13:42:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ffefa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe000225070097c11ed4c2c4dc42ffa86eb9", 0x30) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) 2018/04/12 13:42:49 executing program 2: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000100)={0x4}, 0x2) [ 61.815222] sd 0:0:1:0: tag#3277 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK [ 61.823441] sd 0:0:1:0: tag#3277 CDB: Read(6) 08 00 00 00 71 75 2018/04/12 13:42:49 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(serpent),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 13:42:49 executing program 6: r0 = socket(0xa, 0x2400000001, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f00000000c0)=0xfffffffffffffe3e) 2018/04/12 13:42:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/04/12 13:42:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) dup3(r0, r1, 0x0) [ 62.170120] ================================================================== [ 62.177529] BUG: KMSAN: uninit-value in memcmp+0x119/0x180 [ 62.183158] CPU: 1 PID: 589 Comm: kworker/1:1 Not tainted 4.16.0+ #83 [ 62.189726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.199080] Workqueue: ipv6_addrconf addrconf_dad_work [ 62.204348] Call Trace: [ 62.206923] dump_stack+0x185/0x1d0 [ 62.210530] ? memcmp+0x119/0x180 [ 62.213976] kmsan_report+0x142/0x240 [ 62.217764] __msan_warning_32+0x6c/0xb0 [ 62.221805] memcmp+0x119/0x180 [ 62.225076] __dev_mc_add+0x1c2/0x8e0 [ 62.228864] ? ndisc_mc_map+0x59f/0x8c0 [ 62.232829] dev_mc_add+0x6d/0x80 [ 62.236270] igmp6_group_added+0x2db/0xa00 [ 62.240495] ipv6_dev_mc_inc+0xe9e/0x1130 [ 62.244630] addrconf_dad_work+0x427/0x2150 [ 62.248934] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 62.253675] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 62.258418] process_one_work+0x12c6/0x1f60 [ 62.262722] worker_thread+0x113c/0x24f0 [ 62.266780] ? process_one_work+0x1f60/0x1f60 [ 62.271260] kthread+0x539/0x720 [ 62.274604] ? process_one_work+0x1f60/0x1f60 [ 62.279085] ? kthread_blkcg+0xf0/0xf0 [ 62.282954] ret_from_fork+0x35/0x40 [ 62.286640] [ 62.288240] Local variable description: ----buf@igmp6_group_added [ 62.294441] Variable was created at: [ 62.298134] igmp6_group_added+0x4a/0xa00 [ 62.302269] ipv6_dev_mc_inc+0xe9e/0x1130 [ 62.306386] ================================================================== [ 62.313718] Disabling lock debugging due to kernel taint [ 62.319141] Kernel panic - not syncing: panic_on_warn set ... [ 62.319141] [ 62.326489] CPU: 1 PID: 589 Comm: kworker/1:1 Tainted: G B 4.16.0+ #83 [ 62.334347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.343689] Workqueue: ipv6_addrconf addrconf_dad_work [ 62.348942] Call Trace: [ 62.351508] dump_stack+0x185/0x1d0 [ 62.355128] panic+0x39d/0x940 [ 62.358323] ? memcmp+0x119/0x180 [ 62.361774] kmsan_report+0x238/0x240 [ 62.365573] __msan_warning_32+0x6c/0xb0 [ 62.369625] memcmp+0x119/0x180 [ 62.372892] __dev_mc_add+0x1c2/0x8e0 [ 62.376675] ? ndisc_mc_map+0x59f/0x8c0 [ 62.380628] dev_mc_add+0x6d/0x80 [ 62.384060] igmp6_group_added+0x2db/0xa00 [ 62.388274] ipv6_dev_mc_inc+0xe9e/0x1130 [ 62.392414] addrconf_dad_work+0x427/0x2150 [ 62.396736] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 62.401477] ? ipv6_get_saddr_eval+0x1130/0x1130 [ 62.406214] process_one_work+0x12c6/0x1f60 [ 62.410516] worker_thread+0x113c/0x24f0 [ 62.414569] ? process_one_work+0x1f60/0x1f60 [ 62.419049] kthread+0x539/0x720 [ 62.422395] ? process_one_work+0x1f60/0x1f60 [ 62.426870] ? kthread_blkcg+0xf0/0xf0 [ 62.430736] ret_from_fork+0x35/0x40 [ 62.434856] Dumping ftrace buffer: [ 62.438389] (ftrace buffer empty) [ 62.442078] Kernel Offset: disabled [ 62.445691] Rebooting in 86400 seconds..