INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2018/04/21 13:23:56 fuzzer started 2018/04/21 13:23:57 dialing manager at 10.128.0.26:39077 2018/04/21 13:24:03 kcov=true, comps=false 2018/04/21 13:24:06 executing program 0: unshare(0x20000000) clone(0x26100100, &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) 2018/04/21 13:24:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000540)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/21 13:24:06 executing program 7: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000100)=@in6={0xa, 0x4e24}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000007c0)=[{0x20, 0x29, 0x4, "14016ee2eab5cc15b6"}], 0x20}, 0x0) 2018/04/21 13:24:06 executing program 4: 2018/04/21 13:24:06 executing program 2: 2018/04/21 13:24:06 executing program 3: 2018/04/21 13:24:06 executing program 5: 2018/04/21 13:24:06 executing program 6: syzkaller login: [ 44.979171] ip (3749) used greatest stack depth: 54688 bytes left [ 45.606583] ip (3803) used greatest stack depth: 54312 bytes left [ 46.596485] ip (3897) used greatest stack depth: 54200 bytes left [ 46.827180] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.833747] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.856526] device bridge_slave_0 entered promiscuous mode [ 46.951721] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.958332] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.995110] device bridge_slave_0 entered promiscuous mode [ 47.100497] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.107397] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.141925] device bridge_slave_1 entered promiscuous mode [ 47.192246] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.198808] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.229292] device bridge_slave_1 entered promiscuous mode [ 47.239471] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.246007] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.279215] device bridge_slave_0 entered promiscuous mode [ 47.298984] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.305532] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.313628] device bridge_slave_0 entered promiscuous mode [ 47.336995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.347332] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.353891] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.385443] device bridge_slave_0 entered promiscuous mode [ 47.413729] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.420274] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.454302] device bridge_slave_0 entered promiscuous mode [ 47.467533] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.474129] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.487911] device bridge_slave_0 entered promiscuous mode [ 47.511997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.519768] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.528355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.534830] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.561637] device bridge_slave_0 entered promiscuous mode [ 47.578945] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.585625] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.608616] device bridge_slave_1 entered promiscuous mode [ 47.629621] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.636156] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.661859] device bridge_slave_1 entered promiscuous mode [ 47.669145] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.675688] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.696918] device bridge_slave_1 entered promiscuous mode [ 47.718971] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.725615] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.743117] device bridge_slave_1 entered promiscuous mode [ 47.757981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.765486] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.771989] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.796425] device bridge_slave_1 entered promiscuous mode [ 47.813337] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.819856] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.843886] device bridge_slave_1 entered promiscuous mode [ 47.862184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.877905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.886201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.921379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.015609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.054102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.104443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.115331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.124867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.157675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.203854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.332928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.704116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.739984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.926286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.954842] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.113227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.120701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.199587] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.246902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.264004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.321072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.331339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.341104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.442137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.477270] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.510175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.557173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.968668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.986977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.173405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.208614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.407071] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.427940] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.449640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.456903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.471565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.505154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.521151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.538159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.565014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.574446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.582688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.592362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.644896] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.653358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.660583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.672797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.721293] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.730585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.757507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.796260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.810743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.818604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.836365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.845099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.856920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.864369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.874551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.035487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.042791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.052787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.073078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.083220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.094852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.122635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.132649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.140377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.148167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.157973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.185889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.214390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.239599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.253829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.286419] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.295874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.312428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.335312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.343308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.351432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.364577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.392093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.416867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.449463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.465125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.474441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.488979] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.499971] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.537108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.571260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.612101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.644836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.268684] ip (4294) used greatest stack depth: 54160 bytes left [ 53.291438] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.297953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.304874] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.311348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.354324] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.360914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.372384] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.379019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.385965] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.392605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.404765] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.597885] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.604408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.611316] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.617913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.662618] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.860836] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.867395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.874334] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.880847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.907271] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.917988] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.924500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.931378] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.937861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.948299] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.970107] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.976603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.983451] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.989916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.999825] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.026510] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.033021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.039949] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.046449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.096709] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.105248] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.111752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.118844] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.125363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.166312] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.370192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.386685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.411687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.426120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.434488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.443543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.451767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.976641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.996019] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.459964] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.518201] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.571351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.725811] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.758937] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.793445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.814375] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.820646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.833755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.877741] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.885786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.896008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.323574] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.330134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.342367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.367255] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.373527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.387625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.423076] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.430116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.443681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.588969] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.595285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.607577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.666112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.672756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.685161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.717432] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.723721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.738709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.794010] device lo entered promiscuous mode [ 69.846162] device lo left promiscuous mode 2018/04/21 13:24:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000540)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) [ 70.075897] device lo entered promiscuous mode 2018/04/21 13:24:34 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000100)=[{0x10, 0xffffffffffffffff}], 0x10}, 0x0) 2018/04/21 13:24:34 executing program 3: 2018/04/21 13:24:34 executing program 5: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) sendmsg(r0, &(0x7f0000000200)={0x0, 0x214, &(0x7f0000000080)}, 0x0) 2018/04/21 13:24:34 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={"776c616e3000001d0684000021000899", &(0x7f0000000040)=@ethtool_ringparam={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) 2018/04/21 13:24:34 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/21 13:24:34 executing program 6: syz_emit_ethernet(0x66, &(0x7f0000000180)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x2f, @rand_addr}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}, &(0x7f0000000000)) 2018/04/21 13:24:34 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00006ffff8)) 2018/04/21 13:24:34 executing program 7: syz_emit_ethernet(0xfdef, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/21 13:24:34 executing program 2: clone(0x200, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000080)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f00006fcff0)) open(&(0x7f0000000080)='./file0\x00', 0x4800, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) [ 70.660473] raw_sendmsg: syz-executor0 forgot to set AF_INET. Fix it! 2018/04/21 13:24:34 executing program 3: perf_event_open(&(0x7f0000740000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_rm_watch(r0, 0x0) 2018/04/21 13:24:34 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000097ff8)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/21 13:24:34 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x8000000020011, r0, 0x0) ioctl$fiemap(r0, 0x40086610, &(0x7f00000000c0)) 2018/04/21 13:24:35 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000a66000)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) listen(r0, 0x10000000009) 2018/04/21 13:24:35 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x42, 0x4) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000004fc8)={&(0x7f000000aff4)={0x10}, 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) close(r0) 2018/04/21 13:24:35 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000097ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x80003) vmsplice(r1, &(0x7f00003dcfb0)=[{&(0x7f000078e000)}], 0x1, 0x0) 2018/04/21 13:24:35 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f0000000180)) 2018/04/21 13:24:35 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000097ff8)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/21 13:24:35 executing program 2: poll(&(0x7f0000000000), 0x0, 0x2) 2018/04/21 13:24:35 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x8100, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @link_local={0x1, 0x80, 0xc2}, @dev={0xac, 0x14, 0x223}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}}}}, 0x0) 2018/04/21 13:24:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x88) 2018/04/21 13:24:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) socket$kcm(0x2, 0x1, 0x0) 2018/04/21 13:24:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000000), 0xe6) 2018/04/21 13:24:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xa, 0x5, 0xd1a, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x16b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/04/21 13:24:35 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f0000000180)) 2018/04/21 13:24:35 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) close(r0) socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f00000000c0)=r0, 0x2bc039af) 2018/04/21 13:24:35 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x42, 0x4) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:36 executing program 5: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x4000000000005, 0x84) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 2018/04/21 13:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x9}) 2018/04/21 13:24:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000009fc8)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000d40)="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", 0x5b3}], 0x1, &(0x7f00000000c0)}, 0xc100) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000780)="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", 0x585}], 0x1, &(0x7f0000028000)}, 0x0) 2018/04/21 13:24:36 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x42, 0x4) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:36 executing program 5: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000000bffc)={0x0, 0x6}, 0x4) 2018/04/21 13:24:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) 2018/04/21 13:24:36 executing program 6: socketpair(0x10, 0x0, 0x0, &(0x7f0000000080)) 2018/04/21 13:24:36 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00'}, 0x10) 2018/04/21 13:24:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/21 13:24:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00006ffff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492796, 0x0) recvmsg(r1, &(0x7f00000013c0)={&(0x7f0000001480)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000000380)}, 0x0) close(r0) 2018/04/21 13:24:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) accept4(r0, 0x0, &(0x7f0000000000), 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000480)=0x14, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000940)={&(0x7f0000000640)=@getsa={0xbc, 0x12, 0x0, 0x0, 0x0, {@in6=@loopback={0x0, 0x1}}, [@migrate={0x88, 0x11, [{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@loopback=0x7f000001}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}]}, @sec_ctx={0xc, 0x8, {0x8, 0x8, 0x0, 0x9}}]}, 0xbc}, 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="f90b8e", 0x3}], 0x1) recvmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000340)=""/211, 0xd3}, 0x40) 2018/04/21 13:24:36 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8954, &(0x7f0000003d00)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @empty=[0xfffffdfd]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, "677265300000000000000200"}) 2018/04/21 13:24:37 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x42, 0x4) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000a66000)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) listen(r0, 0x10000000009) r1 = accept4(r0, 0x0, &(0x7f00004a8ffc), 0x0) sendmmsg(r1, &(0x7f0000009240)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000080)="aa", 0x1}], 0x1, &(0x7f00000000c0)}}], 0x1, 0x8000) 2018/04/21 13:24:37 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000180)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @rand_addr}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}, &(0x7f0000000000)) 2018/04/21 13:24:37 executing program 0: r0 = socket$inet6(0xa, 0x2000000802, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) 2018/04/21 13:24:38 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:38 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x3, 0xfffffffb, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:38 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x42, 0x4) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:38 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f0000001e40)=ANY=[]}, 0xfc) 2018/04/21 13:24:38 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/21 13:24:38 executing program 4: socketpair$inet6(0xa, 0x0, 0x200, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000700)=""/188, 0xbc}, 0x0) socketpair$inet(0x2, 0x730000, 0x40000000, &(0x7f00000002c0)) 2018/04/21 13:24:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00006ffff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492796, 0x0) recvmsg(r1, &(0x7f00000013c0)={&(0x7f0000001480)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000000380)}, 0x0) close(r0) [ 74.203688] device lo entered promiscuous mode 2018/04/21 13:24:38 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f0000001e40)=ANY=[]}, 0xa00) [ 74.259906] device lo left promiscuous mode 2018/04/21 13:24:38 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0xf, 0xfffffffb, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:38 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:38 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:38 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000097ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x80003) vmsplice(r1, &(0x7f00003dcfb0)=[{&(0x7f000078e000)}], 0x1, 0x0) 2018/04/21 13:24:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:38 executing program 7: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000097ff8)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/21 13:24:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r1 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077c32cf6d22b4c4f8d", 0x0) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x8000, &(0x7f0000000100)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f000000a000), 0x7ffff) 2018/04/21 13:24:38 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:39 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 2018/04/21 13:24:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1a) sendmsg(r0, &(0x7f0000021fc8)={0x0, 0x0, &(0x7f00000010c0), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/21 13:24:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={&(0x7f000087fff4)={0x10}, 0xc, &(0x7f0000a40000)={&(0x7f0000000000)=ANY=[@ANYBLOB="e400000021001104ffffffffffffffffe0000001000000000000000000000000ff01000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c001300e000000100000000000000000000010000000000000000001000ffff0000000000000000000000005c00110000000000000000000000000000000001e0000002000000000000000000000000000000000000000000000000ff010000000000000000000000000000ff010000e97aec5242f851c824c353aa8c8d0000000000000000000000010000000000000000000000000c001000ff00000000000000"], 0x3}, 0x1}, 0x0) 2018/04/21 13:24:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:39 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={0x0, 0x1c, &(0x7f0000000440)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}]}, &(0x7f0000000540)=0x10) 2018/04/21 13:24:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:39 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) sendto$inet(r0, &(0x7f0000dcfffe), 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) close(r0) 2018/04/21 13:24:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x10) sendto$inet(r0, &(0x7f0000ff7000), 0x0, 0x0, &(0x7f000066354c)={0x2, 0x0, @rand_addr}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 2018/04/21 13:24:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00006da000), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x20004e1d, @loopback=0x7f000001}, 0x10) 2018/04/21 13:24:39 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 2018/04/21 13:24:39 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x15, 0xfffffffb, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) 2018/04/21 13:24:39 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={0x0, 0x1c, &(0x7f0000000440)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1}]}, &(0x7f0000000540)=0x10) 2018/04/21 13:24:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x10040000000000f1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400000, 0x0, 0x0, &(0x7f0000000380)) 2018/04/21 13:24:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000972ffc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f49fff)='{', 0x1, 0x4008000, &(0x7f0000de5ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000000600)='[', 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/21 13:24:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:39 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001540)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x1f}, 0x5455d3ed90e4a21f) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400000, 0x0, 0x0, &(0x7f0000001240)) 2018/04/21 13:24:39 executing program 4: r0 = perf_event_open(&(0x7f000054df88)={0x2, 0x78, 0x0, 0x303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x20000000002, 0x78, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) close(r0) 2018/04/21 13:24:39 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001540)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x1f}, 0x5455d3ed90e4a21f) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400000, 0x2, 0x0, &(0x7f0000001240)) 2018/04/21 13:24:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:39 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x111500) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 2018/04/21 13:24:39 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x15, 0xfffffffb, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:39 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) fchmod(r0, 0x143) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = inotify_init1(0x0) geteuid() mknod(&(0x7f0000027000)='./file1\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000021ff8)='./file1\x00', 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, &(0x7f00000008c0)=0xa0) close(r0) 2018/04/21 13:24:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x4}, 0x1c) 2018/04/21 13:24:39 executing program 2: r0 = socket$inet6(0xa, 0x2000000000000003, 0x8008000000007) connect$inet6(r0, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg(r0, &(0x7f00000024c0)={0x0, 0xfffffff5, &(0x7f0000002400)}, 0x0) 2018/04/21 13:24:39 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x10, 0x7a00, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x20001, 0x2, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/04/21 13:24:40 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:40 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2018/04/21 13:24:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x5455d3ed90e4a21f) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) close(r0) 2018/04/21 13:24:40 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xee}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x4, 0x0, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/21 13:24:40 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:40 executing program 0: r0 = socket$kcm(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890b, &(0x7f0000000040)={r0}) 2018/04/21 13:24:40 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x12, 0x0, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x4}, 0x1c) 2018/04/21 13:24:40 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/21 13:24:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x5455d3ed90e4a21f) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) close(r0) 2018/04/21 13:24:40 executing program 6: connect$inet(0xffffffffffffffff, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(0xffffffffffffffff, &(0x7f00000006c0), 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa2}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000200)) 2018/04/21 13:24:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 2018/04/21 13:24:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x16a) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/21 13:24:40 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/21 13:24:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x16a) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/21 13:24:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcd, &(0x7f00003a4000)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x5c) 2018/04/21 13:24:40 executing program 7: syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) 2018/04/21 13:24:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00006ffff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492796, 0x0) poll(&(0x7f00000000c0)=[{r1, 0x120}], 0x1, 0x7f) close(r0) 2018/04/21 13:24:40 executing program 6: connect$inet(0xffffffffffffffff, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(0xffffffffffffffff, &(0x7f00000006c0), 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:40 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x2}, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400300, 0x7ff, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0xd, 0x1000, &(0x7f0000000000)="3f006671d7af52f64775050008", &(0x7f0000004800)=""/4096}, 0x28) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa2}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000200)) 2018/04/21 13:24:41 executing program 6: connect$inet(0xffffffffffffffff, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(0xffffffffffffffff, &(0x7f00000006c0), 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:41 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x0, 0x1796e341, &(0x7f0000000280)) 2018/04/21 13:24:41 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:41 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 2018/04/21 13:24:41 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x5, 0x0, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:41 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f000000f000)}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000200)=""/128, 0x80}, 0x0) unshare(0x60000000) socket$inet6_udp(0xa, 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 2018/04/21 13:24:41 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:41 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 2018/04/21 13:24:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:41 executing program 7: unshare(0x60000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000140)=0x54) 2018/04/21 13:24:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d000010000000160000000000000003000600000000000200000031ebf8c700000000000000000300050000000000020000000000000000000000000000000800120002000103000000000000000010000000030300000000000000020000000000010100c58a47566f8d45157c97ec3a0000000000000000000000000000"], 0x80}, 0x1}, 0x0) 2018/04/21 13:24:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f0000000040)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)="10", 0x1}], 0x1, &(0x7f0000000240)}], 0x1, 0x200040c1) 2018/04/21 13:24:41 executing program 0: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000540)) unshare(0x60000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x50, &(0x7f0000000180)}, 0x10) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000140)=0x54) 2018/04/21 13:24:41 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f000000f000)}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000200)=""/128, 0x80}, 0x0) unshare(0x60000000) socket$inet6_udp(0xa, 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 2018/04/21 13:24:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:41 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:41 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 2018/04/21 13:24:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000a66000)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) listen(r0, 0x10000000009) r1 = accept4(r0, 0x0, &(0x7f00004a8ffc), 0x0) sendmmsg(r1, &(0x7f0000009240)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000080)="aa53da6eb5f5b3c0407bfbe0d2ce", 0xe}], 0x1, &(0x7f00000000c0)=[{0xa0, 0x0, 0x8, "fa38d8119cf169bbadfa1a9a7720352dbc5fd7a992853f5688f40d56792f7bb212a0397f3fa5458dc92729e6b1ba391d3ea8e84b5c65949cc8a7d4f9e80b8f338f6e8f710b8d61c244ab9a8444416c91aae500180ea15e5472655d1ab3f10e43744a6233c4b0743884a81d06889a1d8e6048bd860b4cf493d80e89b986379bf2b32095ff288210de717381"}], 0xa0}}], 0x1, 0x8000) 2018/04/21 13:24:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000011c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4eeda24019275aa01c9e09403cfac9896edc271139fe8aeedb1e6b4eba8f248f8f8fa615fef6b2dc242a1f95f7db54870ad4c8353770bb2a574eb2d5faa83c"}, 0x60) read(0xffffffffffffffff, &(0x7f0000000000)=""/146, 0xc3ed9ab1f543712a) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000002c0), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@generic='@']}, 0x18}, 0x1}, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newroute={0x1c, 0x18, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}}, 0x1c}, 0x1}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}]}, 0x1c}, 0x1}, 0x0) 2018/04/21 13:24:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:42 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/21 13:24:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x2d8) 2018/04/21 13:24:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:43 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/110}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002ec0)={r0, &(0x7f0000002d40), &(0x7f0000002e40)=""/117}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000027c0)=[{&(0x7f0000001700)=""/160, 0xa0}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002840)=""/93, 0x5d, 0x7}, 0x40) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002d00)) 2018/04/21 13:24:43 executing program 7: unshare(0x60000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000140)=0x54) 2018/04/21 13:24:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000007840)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000007740)=""/195}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xfe93, &(0x7f0000000180), &(0x7f0000000400)=""/183}, 0x12) 2018/04/21 13:24:43 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x0, 0xfffffffe, &(0x7f0000000000)) 2018/04/21 13:24:43 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x2}, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400000, 0x7ff, 0x0, &(0x7f0000000000)) 2018/04/21 13:24:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad40", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:43 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/21 13:24:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x0, 0x53, &(0x7f0000000200)=""/4096, &(0x7f00000001c0)=0xffffffffffffff76) 2018/04/21 13:24:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/21 13:24:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000007840)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000007740)=""/195}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xfe93, &(0x7f0000000180), &(0x7f0000000400)=""/183}, 0x12) 2018/04/21 13:24:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@get={0xe0, 0x13, 0x0, 0x0, 0x0, {{'rfc4106(gcm(aes))\x00'}}}, 0xe0}, 0x1}, 0x0) 2018/04/21 13:24:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0), 0x19, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/21 13:24:43 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x32a, &(0x7f0000000080)={@random="85a970b0146b", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x4], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) 2018/04/21 13:24:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/21 13:24:43 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x3a) write(r0, &(0x7f00000006c0), 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) [ 79.654639] ================================================================== [ 79.662085] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 79.668157] CPU: 1 PID: 6305 Comm: syz-executor0 Not tainted 4.16.0+ #84 [ 79.675007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.684367] Call Trace: [ 79.686975] dump_stack+0x185/0x1d0 [ 79.690620] ? vmac_setkey+0x337/0x940 [ 79.694522] kmsan_report+0x142/0x240 [ 79.698334] ? aes_set_key+0x260/0x260 [ 79.702231] __msan_warning_32+0x6c/0xb0 [ 79.706306] ? aes_set_key+0x260/0x260 [ 79.710198] vmac_setkey+0x337/0x940 [ 79.714009] ? vmac_final+0x3f80/0x3f80 [ 79.717989] shash_async_setkey+0x337/0x4c0 [ 79.722324] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 79.728570] ? trace_kmalloc+0xb6/0x2b0 [ 79.732558] ? shash_async_digest+0x1b0/0x1b0 [ 79.737068] crypto_ahash_setkey+0x31a/0x470 [ 79.741494] hash_setkey+0x8b/0xa0 [ 79.745043] alg_setsockopt+0x6c5/0x740 [ 79.749034] ? hash_release+0x50/0x50 [ 79.752844] ? alg_accept+0xd0/0xd0 [ 79.756473] SYSC_setsockopt+0x4b8/0x570 [ 79.760554] SyS_setsockopt+0x76/0xa0 [ 79.764362] do_syscall_64+0x309/0x430 [ 79.768259] ? SYSC_recv+0xe0/0xe0 [ 79.771842] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 79.777037] RIP: 0033:0x455389 [ 79.780225] RSP: 002b:00007f05e7ac9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 79.787941] RAX: ffffffffffffffda RBX: 00007f05e7aca6d4 RCX: 0000000000455389 [ 79.795220] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 79.802495] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 79.809771] R10: 00000000200002c0 R11: 0000000000000246 R12: 00000000ffffffff [ 79.817047] R13: 0000000000000519 R14: 00000000006faaf8 R15: 0000000000000000 [ 79.824324] [ 79.825948] Local variable description: ----out.i@vmac_setkey [ 79.832091] Variable was created at: [ 79.835814] vmac_setkey+0x93/0x940 [ 79.839439] shash_async_setkey+0x337/0x4c0 [ 79.843750] ================================================================== [ 79.851101] Disabling lock debugging due to kernel taint [ 79.856546] Kernel panic - not syncing: panic_on_warn set ... [ 79.856546] [ 79.864004] CPU: 1 PID: 6305 Comm: syz-executor0 Tainted: G B 4.16.0+ #84 [ 79.872233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.881587] Call Trace: [ 79.884195] dump_stack+0x185/0x1d0 [ 79.887829] panic+0x39d/0x940 [ 79.891045] ? vmac_setkey+0x337/0x940 [ 79.894932] kmsan_report+0x238/0x240 [ 79.898734] ? aes_set_key+0x260/0x260 [ 79.902623] __msan_warning_32+0x6c/0xb0 [ 79.906683] ? aes_set_key+0x260/0x260 [ 79.910576] vmac_setkey+0x337/0x940 [ 79.914992] ? vmac_final+0x3f80/0x3f80 [ 79.918985] shash_async_setkey+0x337/0x4c0 [ 79.923313] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 79.928679] ? trace_kmalloc+0xb6/0x2b0 [ 79.932666] ? shash_async_digest+0x1b0/0x1b0 [ 79.937168] crypto_ahash_setkey+0x31a/0x470 [ 79.941584] hash_setkey+0x8b/0xa0 [ 79.945129] alg_setsockopt+0x6c5/0x740 [ 79.949124] ? hash_release+0x50/0x50 [ 79.952930] ? alg_accept+0xd0/0xd0 [ 79.956562] SYSC_setsockopt+0x4b8/0x570 [ 79.960629] SyS_setsockopt+0x76/0xa0 [ 79.964431] do_syscall_64+0x309/0x430 [ 79.968334] ? SYSC_recv+0xe0/0xe0 [ 79.971886] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 79.977086] RIP: 0033:0x455389 [ 79.980276] RSP: 002b:00007f05e7ac9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 79.987990] RAX: ffffffffffffffda RBX: 00007f05e7aca6d4 RCX: 0000000000455389 [ 79.995265] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 80.003336] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 80.010614] R10: 00000000200002c0 R11: 0000000000000246 R12: 00000000ffffffff [ 80.017888] R13: 0000000000000519 R14: 00000000006faaf8 R15: 0000000000000000 [ 80.025623] Dumping ftrace buffer: [ 80.029169] (ftrace buffer empty) [ 80.032859] Kernel Offset: disabled [ 80.036468] Rebooting in 86400 seconds..