INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2018/04/07 00:57:09 fuzzer started 2018/04/07 00:57:10 dialing manager at 10.128.0.26:38639 2018/04/07 00:57:16 kcov=true, comps=false 2018/04/07 00:57:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001400192300bb4b80040d8c5628060000000004106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) 2018/04/07 00:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1}]}]}, 0x30}, 0x1}, 0x0) 2018/04/07 00:57:19 executing program 7: 2018/04/07 00:57:19 executing program 1: 2018/04/07 00:57:19 executing program 3: 2018/04/07 00:57:19 executing program 4: 2018/04/07 00:57:19 executing program 5: 2018/04/07 00:57:19 executing program 6: syzkaller login: [ 43.648473] ip (3792) used greatest stack depth: 54408 bytes left [ 44.709391] ip (3898) used greatest stack depth: 54200 bytes left [ 46.335561] ip (4040) used greatest stack depth: 53976 bytes left [ 46.764380] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.820110] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.967181] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.975600] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.041868] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.073360] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.130487] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.226857] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.713389] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.722607] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.854215] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.882093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.980823] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.989757] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.002466] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.158523] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.491175] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.497450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.510251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.546805] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.557881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.569612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.598721] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.610358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.636965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.670241] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.676496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.692597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.790148] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.796476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.805381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.841593] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.848503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.876661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.900648] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.912674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.941667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.998455] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.004819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.022707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 00:57:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f00009f7000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001000)={0x14, 0x42, 0x2ff}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000540)=""/249, 0xf9}, 0x0) 2018/04/07 00:57:35 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}, 0x1}, 0x0) 2018/04/07 00:57:36 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ptrace$peekuser(0x3, 0x0, 0x542ca047) pread64(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0x2}}, {{0xa, 0x4e21}}}, 0x104) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000004b40), &(0x7f0000004b80)=0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getpid() r2 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) sendfile(r0, r1, &(0x7f0000fc1ff8)=0xffffffffffffffff, 0x80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @multicast1=0xe0000001}}, 0x3, 0x2, 0x6, 0x0, 0x40}, &(0x7f0000000100)=0x98) setsockopt(r0, 0x400004000107, 0x1, &(0x7f0000000000)="010000000000060000071a80000001cc", 0x10) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) getgid() fstat(r0, &(0x7f0000001800)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004540)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004640)=0xe8) getgroups(0x0, &(0x7f0000004680)) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) 2018/04/07 00:57:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1}]}]}, 0x30}, 0x1}, 0x0) 2018/04/07 00:57:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f00009f7000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001000)={0x14, 0x42, 0x2ff}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000540)=""/249, 0xf9}, 0x0) 2018/04/07 00:57:36 executing program 7: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)="045b898f73", 0x1004, 0x0) 2018/04/07 00:57:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpu.weight.nice\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x1) 2018/04/07 00:57:36 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r0, &(0x7f0000000680)="d520d59992d9835a061ca64019181dfd24ddd76effcb698130f2cb86bfb3876fbecd515b8cfe413f0954f562655e436f3e57c0f39d82f2d38d976a23594bb07654b174a5c2f260eb33d5c1d3d9c06d8fcb70ec5e6b7ccb449cd21ce2c03e93ffa4bd48945aa96d09f3c494", 0x6b, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) 2018/04/07 00:57:36 executing program 5: r0 = gettid() exit(0x0) capget(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)) 2018/04/07 00:57:36 executing program 4: r0 = gettid() exit(0x0) get_robust_list(r0, &(0x7f0000000180)=&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000001c0)=0xc) 2018/04/07 00:57:36 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r0, &(0x7f0000000680)="d520d59992d9835a061ca64019181dfd24ddd76effcb698130f2cb86bfb3876fbecd515b8cfe413f0954f562655e436f3e57c0f39d82f2d38d976a23594bb07654b174a5c2f260eb33d5c1d3d9c06d8fcb70ec5e6b7ccb449cd21ce2c03e93ffa4bd48945aa96d09f3c494", 0x6b, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) 2018/04/07 00:57:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff2e, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x809) sendto$inet(r0, &(0x7f0000000040)="83", 0x1, 0x3, 0x0, 0x0) 2018/04/07 00:57:36 executing program 3: 2018/04/07 00:57:36 executing program 7: 2018/04/07 00:57:36 executing program 2: 2018/04/07 00:57:36 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ptrace$peekuser(0x3, 0x0, 0x542ca047) pread64(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0x2}}, {{0xa, 0x4e21}}}, 0x104) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000004b40), &(0x7f0000004b80)=0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getpid() r2 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) sendfile(r0, r1, &(0x7f0000fc1ff8)=0xffffffffffffffff, 0x80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @multicast1=0xe0000001}}, 0x3, 0x2, 0x6, 0x0, 0x40}, &(0x7f0000000100)=0x98) setsockopt(r0, 0x400004000107, 0x1, &(0x7f0000000000)="010000000000060000071a80000001cc", 0x10) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) getgid() fstat(r0, &(0x7f0000001800)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004540)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004640)=0xe8) getgroups(0x0, &(0x7f0000004680)) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) 2018/04/07 00:57:36 executing program 3: 2018/04/07 00:57:36 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff2e, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x809) sendto$inet(r0, &(0x7f0000000040)="83", 0x1, 0x3, 0x0, 0x0) 2018/04/07 00:57:36 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) tgkill(0x0, 0x0, 0x0) r0 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000480)=0x10, 0x80000) fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") getpeername(r0, &(0x7f0000002940)=@can, &(0x7f00000029c0)=0x80) fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000600)={0x1f, 0x100000001, 0x5, 0x8, 0x4, 0x0, 0x0, 0xffffffff, 0x0}, &(0x7f00000007c0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000800)={0x7fff, 0xa, 0x0, 0xe51c, r2}, 0x10) 2018/04/07 00:57:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000808fc8)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000e69fb8)=ANY=[@ANYBLOB="280000001800210cffffffffffffffff8020000000040058000000000c00090009000000"], 0x1}, 0x1}, 0x0) 2018/04/07 00:57:36 executing program 7: r0 = socket(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000001080)={0x2, 0x100020, @loopback=0x7f000001}, 0x10) writev(r1, &(0x7f0000644ff0)=[{&(0x7f0000ff8000)="480000001400257f09004b01fcfc8c560a880000f217e00600000000000000a2bc560300000000000000200028213ee206000000000000ffff5bf1ff00c7e5ed5e00000000620000", 0x48}], 0x1) 2018/04/07 00:57:36 executing program 3: 2018/04/07 00:57:36 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ptrace$peekuser(0x3, 0x0, 0x542ca047) pread64(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0x2}}, {{0xa, 0x4e21}}}, 0x104) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000004b40), &(0x7f0000004b80)=0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getpid() r2 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) sendfile(r0, r1, &(0x7f0000fc1ff8)=0xffffffffffffffff, 0x80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @multicast1=0xe0000001}}, 0x3, 0x2, 0x6, 0x0, 0x40}, &(0x7f0000000100)=0x98) setsockopt(r0, 0x400004000107, 0x1, &(0x7f0000000000)="010000000000060000071a80000001cc", 0x10) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) getgid() fstat(r0, &(0x7f0000001800)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004540)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004640)=0xe8) getgroups(0x0, &(0x7f0000004680)) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) 2018/04/07 00:57:36 executing program 3: [ 59.083992] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure 2018/04/07 00:57:37 executing program 5: 2018/04/07 00:57:37 executing program 2: 2018/04/07 00:57:37 executing program 1: 2018/04/07 00:57:37 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff2e, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x809) sendto$inet(r0, &(0x7f0000000040)="83", 0x1, 0x3, 0x0, 0x0) 2018/04/07 00:57:37 executing program 7: 2018/04/07 00:57:37 executing program 3: 2018/04/07 00:57:37 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ptrace$peekuser(0x3, 0x0, 0x542ca047) pread64(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0x2}}, {{0xa, 0x4e21}}}, 0x104) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000004b40), &(0x7f0000004b80)=0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getpid() r2 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) sendfile(r0, r1, &(0x7f0000fc1ff8)=0xffffffffffffffff, 0x80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x0, @multicast1=0xe0000001}}, 0x3, 0x2, 0x6, 0x0, 0x40}, &(0x7f0000000100)=0x98) setsockopt(r0, 0x400004000107, 0x1, &(0x7f0000000000)="010000000000060000071a80000001cc", 0x10) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) getgid() fstat(r0, &(0x7f0000001800)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004540)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004640)=0xe8) getgroups(0x0, &(0x7f0000004680)) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) 2018/04/07 00:57:37 executing program 4: 2018/04/07 00:57:37 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000009fc8)={0x0, 0x0, &(0x7f000001d000), 0x0, &(0x7f000001c000)}, 0xc100) r1 = dup2(r0, r0) sendmsg$key(r1, &(0x7f000000b000)={0x0, 0x0, &(0x7f000001fff0)={&(0x7f0000003fd0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/07 00:57:37 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)={0x7365}) 2018/04/07 00:57:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x4, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'rr\x00'}, 0x2c) 2018/04/07 00:57:37 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000300)='eth1lo\x00', 0x7, 0x0) dup2(r1, r2) 2018/04/07 00:57:37 executing program 6: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setns(0xffffffffffffffff, 0x0) 2018/04/07 00:57:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2018/04/07 00:57:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 2018/04/07 00:57:38 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x2aaaaaaaaaaaaccf, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, @random="bb59f1a4bfc6"]}) 2018/04/07 00:57:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000003ff0)={&(0x7f0000012f80)={0x2, 0x4000000000000d, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast1=0xe0000001}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_lifetime={0x4, 0x3}]}, 0xa0}, 0x1}, 0x0) 2018/04/07 00:57:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d556b6c5820faeb895298992ea54d60004002c22f34c90c2", 0x18) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) sendto$unix(r1, &(0x7f0000000100)="eed283b1bcd68171d768eb104ad230242864c6c48acfdb2890b81889f0b5df1304", 0x21, 0x0, &(0x7f0000000180)=@abs, 0x6e) 2018/04/07 00:57:38 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000140)={0x28, 0x18, 0x1, 0x0, 0x0, {0x1}, [@nested={0x14, 0x3, [@typed={0x10, 0x0, @u64}]}]}, 0x28}, 0x1}, 0x0) 2018/04/07 00:57:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000a00000)={0x73, 0x79, 0x7a}, &(0x7f0000facfff)="01", 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000140)="2af29f4abaffa8aba4f58b775bb2b6e9cc3913eda4b7e1a743e0451404f88ef61a5551f5cca618165110413f7abbcb6a2d4b5e43832c8382027598154987778f6872eb13056f11c881b7417247d1c88b6830599f77e2b4a07476eb5669ad2150162ac7a415a45b40998ee0d7f37b414e89f26c31829879cb5b3e563b1ee9d29b0499d31cf93bb4dfdce649e0851c54745d195a3335f7cb336732d13ca0c6f3eed492c37613a3642ff4dac6df4c9361c3aafdefcad8888be691f562240375cb26", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'sha3-512\x00'}}) 2018/04/07 00:57:38 executing program 7: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}, {r1}], 0x2, 0x1) 2018/04/07 00:57:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) 2018/04/07 00:57:38 executing program 7: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:38 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18070000000000000000000002800000850000001f0000007b0a0000000000009500000000000000"], &(0x7f0000000140)="73795b6b616c6ce57200", 0x1, 0xce, &(0x7f0000000300)=""/206}, 0x48) 2018/04/07 00:57:38 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) fcntl$dupfd(r0, 0x402, 0xffffffffffffffff) 2018/04/07 00:57:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000040)=0x9, 0x4) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1f2, &(0x7f000001ef08)}, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/89, 0x59}, 0x40002042) 2018/04/07 00:57:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) 2018/04/07 00:57:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x17, 0x25}, [], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x431, &(0x7f0000000180)=""/195}, 0x48) 2018/04/07 00:57:38 executing program 0: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x135) recvmsg(r1, &(0x7f0000000680)={&(0x7f0000000100)=@rc, 0x80, &(0x7f0000000600)=[{&(0x7f0000000500)=""/211, 0xd3}], 0x1, &(0x7f0000000c80)=""/4096, 0x1000}, 0x0) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000089c000)={&(0x7f0000e6ce08)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfeed}, 0x1}, 0x0) 2018/04/07 00:57:38 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000040), &(0x7f00000012c0), 0x8, &(0x7f0000001300)) 2018/04/07 00:57:38 executing program 6: syslog(0x4, &(0x7f00000011c0)=""/4096, 0xd) 2018/04/07 00:57:38 executing program 7: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x1c, 0x15, 0xa, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x1}]}, 0x1c}, 0x1}, 0x0) 2018/04/07 00:57:38 executing program 5: unshare(0x8000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x20000000005, 0x9}, 0x1c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) 2018/04/07 00:57:38 executing program 2: r0 = memfd_create(&(0x7f0000000180)='procsystemsecurityvmnet1\x00', 0x0) fallocate(r0, 0x3, 0x1000, 0x9ef) 2018/04/07 00:57:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7, 0x205, &(0x7f0000000340)=""/167}, 0x48) 2018/04/07 00:57:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x44042) pwrite64(r0, &(0x7f0000000100), 0x0, 0x0) 2018/04/07 00:57:39 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000200), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000e40)='ip6gretap0\x00', 0x10) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000240)=ANY=[], 0x0, &(0x7f0000000340)=[{&(0x7f0000001200)="a9", 0x1}], 0x1, &(0x7f00000012c0)}, 0x1) sendmsg(r0, &(0x7f0000000e00)={&(0x7f00000006c0)=@nl=@kern={0x10}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000940)="8a", 0x1}], 0x1, &(0x7f0000000fc0)}, 0x0) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000080)=@nfc={0x27}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000880)="ba", 0x1}], 0x1}, 0x0) 2018/04/07 00:57:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="1be43963cda432184a0fbfbe2b775ed013952b3030cbbde688ee961ae6e6901277626b3fc1f3fb2b7ca0895a9b29340e74edb0f2ef010e03b21ea895d94b514f53c948f54c859be7ac0bc4c704a208ec450ab78538bbb599d4bc52b55af5", 0x5e}], 0x1, &(0x7f0000000340)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/1, 0x1}, {&(0x7f0000000940)=""/92, 0x5c}], 0x2, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/07 00:57:39 executing program 7: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:39 executing program 0: r0 = socket$inet(0xa, 0x803, 0xb7) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x29, 0x48, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) 2018/04/07 00:57:39 executing program 5: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/07 00:57:39 executing program 6: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)=""/206, 0xce}, 0x0) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@ethernet={0x0, @random}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/206, 0xce}, 0x2002) 2018/04/07 00:57:39 executing program 1: r0 = memfd_create(&(0x7f0000041000)="6500000005", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000041ff3)='/dev/snd/seq\x00', 0x0, 0x20002) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000041f74)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000e50)=[{0x0, 0x100000001, 0x0, 0x0, @tick=0x5da36b38, {}, {}, @result}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000000c0)={0x32}) 2018/04/07 00:57:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="1be43963cda432184a0fbfbe2b775ed013952b3030cbbde688ee961ae6e6901277626b3fc1f3fb2b7ca0895a9b29340e74edb0f2ef010e03b21ea895d94b514f53c948f54c859be7ac0bc4c704a208ec450ab78538bbb599d4bc52b55af5", 0x5e}], 0x1, &(0x7f0000000340)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/1, 0x1}, {&(0x7f0000000940)=""/92, 0x5c}], 0x2, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/07 00:57:39 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001480)={0x0, 0x11, &(0x7f0000000040)=[{&(0x7f0000000000), 0xffbf}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/07 00:57:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) 2018/04/07 00:57:39 executing program 0: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0xe8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000008000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x160) 2018/04/07 00:57:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x223, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/07 00:57:39 executing program 1: r0 = socket(0x2, 0x803, 0x3f) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 2018/04/07 00:57:39 executing program 7: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="1be43963cda432184a0fbfbe2b775ed013952b3030cbbde688ee961ae6e6901277626b3fc1f3fb2b7ca0895a9b29340e74edb0f2ef010e03b21ea895d94b514f53c948f54c859be7ac0bc4c704a208ec450ab78538bbb599d4bc52b55af5", 0x5e}], 0x1, &(0x7f0000000340)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/1, 0x1}, {&(0x7f0000000940)=""/92, 0x5c}], 0x2, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/07 00:57:40 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$TIOCSETD(r1, 0x541d, &(0x7f0000fdd000)) 2018/04/07 00:57:40 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00007d8ef8)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x20a) 2018/04/07 00:57:40 executing program 0: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, r0, 0x3) mmap(&(0x7f0000f1e000/0x2000)=nil, 0x2000, 0x0, 0x400000000008011, r1, 0x0) 2018/04/07 00:57:40 executing program 7: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x40, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100)='L', &(0x7f00000001c0)=""/124}, 0x18) 2018/04/07 00:57:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="1be43963cda432184a0fbfbe2b775ed013952b3030cbbde688ee961ae6e6901277626b3fc1f3fb2b7ca0895a9b29340e74edb0f2ef010e03b21ea895d94b514f53c948f54c859be7ac0bc4c704a208ec450ab78538bbb599d4bc52b55af5", 0x5e}], 0x1, &(0x7f0000000340)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/1, 0x1}, {&(0x7f0000000940)=""/92, 0x5c}], 0x2, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/07 00:57:40 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000bd1000)={0x0, 0x0}) recvfrom$unix(r0, &(0x7f0000ad7000)=""/4096, 0x1000, 0x1, &(0x7f0000b07000)=@file={0x0, './file0\x00'}, 0xa) 2018/04/07 00:57:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@loopback={0x0, 0x1}}, @in6=@local={0xfe, 0x80, [], 0xaa}, {@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@rand_addr}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa}}}}, 0x128}, 0x1}, 0x0) 2018/04/07 00:57:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000becff0)) socket$rds(0x15, 0x5, 0x0) 2018/04/07 00:57:40 executing program 1: mmap(&(0x7f0000000000/0xf1e000)=nil, 0xf1e000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0xa, 0x6, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10d, 0xa, &(0x7f0000000000), 0x1ce) 2018/04/07 00:57:40 executing program 7: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000000), 0xfefc) 2018/04/07 00:57:40 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000a93fff), &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f000031d000)) 2018/04/07 00:57:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@loopback={0x0, 0x1}}, @in6=@local={0xfe, 0x80, [], 0xaa}, {@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@rand_addr}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa}}}}, 0x128}, 0x1}, 0x0) 2018/04/07 00:57:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/1, 0x1}, {&(0x7f0000000940)=""/92, 0x5c}], 0x2, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/07 00:57:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_cred(r0, 0x1, 0x35, &(0x7f0000000480), 0xc) 2018/04/07 00:57:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000276000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8e18) sendfile(r1, r2, &(0x7f00007ed000), 0x2b) 2018/04/07 00:57:40 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000dbf000), 0x0, 0x0, &(0x7f0000b2d000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2715, &(0x7f00000002c0)=""/13, &(0x7f000033bffc)=0xd) 2018/04/07 00:57:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x65, &(0x7f0000001900)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x3d0, 0x0, 0xffffffff, 0x3d0, 0x250, 0x4f0, 0x4f0, 0xffffffff, 0x4f0, 0x4f0, 0x5, &(0x7f0000001880), {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@dev={0xac, 0x14, 0x14}, @ipv6=@mcast2={0xff, 0x2, [], 0x1}, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@dev={0xfe, 0x80}, @ipv4=@loopback=0x7f000001, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2={0xff, 0x2, [], 0x1}, @ipv6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, @gre_key, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) sendmsg(r0, &(0x7f0000001300)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f0000001140), 0x0, &(0x7f0000001180)}, 0x0) [ 63.027984] ================================================================== [ 63.035395] BUG: KMSAN: uninit-value in sha_transform+0x58ec/0x6320 [ 63.041804] CPU: 1 PID: 5378 Comm: syz-executor0 Not tainted 4.16.0+ #81 [ 63.048633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.057974] Call Trace: [ 63.060567] dump_stack+0x185/0x1d0 [ 63.064200] ? sha_transform+0x58ec/0x6320 [ 63.068434] kmsan_report+0x142/0x240 [ 63.072240] __msan_warning_32+0x6c/0xb0 [ 63.076306] sha_transform+0x58ec/0x6320 [ 63.080377] ? kmsan_set_origin_inline+0x6b/0x120 [ 63.085223] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 63.090678] ? __msan_poison_alloca+0x15c/0x1d0 [ 63.095348] ? shash_async_update+0x290/0x360 [ 63.099852] crypto_sha1_update+0x4cb/0x5b0 [ 63.104180] ? crypto_hash_walk_first+0x210/0x380 [ 63.109018] ? shash_async_update+0x225/0x360 [ 63.113518] ? rmd320_transform+0x7f10/0x7f10 [ 63.118007] shash_async_update+0x290/0x360 [ 63.122331] ? shash_async_init+0x270/0x270 [ 63.126656] hash_sendpage+0x904/0xe10 [ 63.130548] ? hash_recvmsg+0xd50/0xd50 [ 63.134538] sock_sendpage+0x1de/0x2c0 [ 63.138436] pipe_to_sendpage+0x31b/0x430 [ 63.142588] ? sock_fasync+0x2b0/0x2b0 [ 63.146479] ? propagate_umount+0x3a30/0x3a30 [ 63.150974] __splice_from_pipe+0x49a/0xf30 [ 63.155294] ? generic_splice_sendpage+0x2a0/0x2a0 [ 63.160229] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 63.165687] generic_splice_sendpage+0x1c6/0x2a0 [ 63.170450] ? iter_file_splice_write+0x1710/0x1710 [ 63.175470] ? iter_file_splice_write+0x1710/0x1710 [ 63.180491] direct_splice_actor+0x19b/0x200 [ 63.184909] splice_direct_to_actor+0x764/0x1040 [ 63.189671] ? do_splice_direct+0x540/0x540 [ 63.193995] ? security_file_permission+0x28f/0x4b0 [ 63.199018] ? rw_verify_area+0x35e/0x580 [ 63.203170] do_splice_direct+0x335/0x540 [ 63.207324] do_sendfile+0x1067/0x1e40 [ 63.211221] SYSC_sendfile64+0x1b3/0x300 [ 63.215285] SyS_sendfile64+0x64/0x90 [ 63.219083] do_syscall_64+0x309/0x430 [ 63.222974] ? SYSC_sendfile+0x320/0x320 [ 63.227042] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 63.232227] RIP: 0033:0x455259 [ 63.235411] RSP: 002b:00007f9c495d5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 63.243122] RAX: ffffffffffffffda RBX: 00007f9c495d66d4 RCX: 0000000000455259 [ 63.250394] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 63.257661] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 63.264923] R10: 0000000000008e18 R11: 0000000000000246 R12: 00000000ffffffff 2018/04/07 00:57:41 executing program 5: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89fb, &(0x7f0000000040)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b}}) [ 63.272187] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 63.279453] [ 63.281070] Uninit was created at: [ 63.284614] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 63.289629] kmsan_alloc_page+0x82/0xe0 [ 63.293611] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 63.298374] alloc_pages_vma+0xcc8/0x1800 [ 63.302525] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 63.307539] shmem_getpage_gfp+0x35db/0x5770 [ 63.311949] shmem_fallocate+0xde2/0x1610 [ 63.316095] vfs_fallocate+0x9dc/0xde0 [ 63.319985] SYSC_fallocate+0x119/0x1d0 [ 63.323957] SyS_fallocate+0x64/0x90 [ 63.327672] do_syscall_64+0x309/0x430 [ 63.331562] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 63.336737] ================================================================== [ 63.344081] Disabling lock debugging due to kernel taint [ 63.349520] Kernel panic - not syncing: panic_on_warn set ... [ 63.349520] [ 63.356881] CPU: 1 PID: 5378 Comm: syz-executor0 Tainted: G B 4.16.0+ #81 [ 63.365015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.374360] Call Trace: [ 63.376959] dump_stack+0x185/0x1d0 [ 63.380579] panic+0x39d/0x940 [ 63.383761] ? sha_transform+0x58ec/0x6320 [ 63.387976] kmsan_report+0x238/0x240 [ 63.391756] __msan_warning_32+0x6c/0xb0 [ 63.395798] sha_transform+0x58ec/0x6320 [ 63.399837] ? kmsan_set_origin_inline+0x6b/0x120 [ 63.404660] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 63.410093] ? __msan_poison_alloca+0x15c/0x1d0 [ 63.414740] ? shash_async_update+0x290/0x360 [ 63.419216] crypto_sha1_update+0x4cb/0x5b0 [ 63.423524] ? crypto_hash_walk_first+0x210/0x380 [ 63.428344] ? shash_async_update+0x225/0x360 [ 63.432819] ? rmd320_transform+0x7f10/0x7f10 [ 63.437293] shash_async_update+0x290/0x360 [ 63.441591] ? shash_async_init+0x270/0x270 [ 63.445888] hash_sendpage+0x904/0xe10 [ 63.449755] ? hash_recvmsg+0xd50/0xd50 [ 63.453708] sock_sendpage+0x1de/0x2c0 [ 63.457591] pipe_to_sendpage+0x31b/0x430 [ 63.461719] ? sock_fasync+0x2b0/0x2b0 [ 63.465587] ? propagate_umount+0x3a30/0x3a30 [ 63.470074] __splice_from_pipe+0x49a/0xf30 [ 63.474382] ? generic_splice_sendpage+0x2a0/0x2a0 [ 63.479300] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 63.484645] generic_splice_sendpage+0x1c6/0x2a0 [ 63.489386] ? iter_file_splice_write+0x1710/0x1710 [ 63.494381] ? iter_file_splice_write+0x1710/0x1710 [ 63.499378] direct_splice_actor+0x19b/0x200 [ 63.503767] splice_direct_to_actor+0x764/0x1040 [ 63.508498] ? do_splice_direct+0x540/0x540 [ 63.512797] ? security_file_permission+0x28f/0x4b0 [ 63.517796] ? rw_verify_area+0x35e/0x580 [ 63.522025] do_splice_direct+0x335/0x540 [ 63.526166] do_sendfile+0x1067/0x1e40 [ 63.530051] SYSC_sendfile64+0x1b3/0x300 [ 63.534102] SyS_sendfile64+0x64/0x90 [ 63.537880] do_syscall_64+0x309/0x430 [ 63.541750] ? SYSC_sendfile+0x320/0x320 [ 63.545792] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 63.550959] RIP: 0033:0x455259 [ 63.554126] RSP: 002b:00007f9c495d5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 63.561811] RAX: ffffffffffffffda RBX: 00007f9c495d66d4 RCX: 0000000000455259 [ 63.569064] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 63.576322] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 63.583565] R10: 0000000000008e18 R11: 0000000000000246 R12: 00000000ffffffff [ 63.590811] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 63.598562] Dumping ftrace buffer: [ 63.602080] (ftrace buffer empty) [ 63.605763] Kernel Offset: disabled [ 63.609375] Rebooting in 86400 seconds..