INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.8' (ECDSA) to the list of known hosts. 2018/04/07 04:01:59 fuzzer started 2018/04/07 04:02:00 dialing manager at 10.128.0.26:38639 2018/04/07 04:02:06 kcov=true, comps=false 2018/04/07 04:02:09 executing program 0: 2018/04/07 04:02:09 executing program 1: 2018/04/07 04:02:09 executing program 7: 2018/04/07 04:02:09 executing program 4: unshare(0x60000000) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@in={0x0, 0x0, @loopback}, &(0x7f0000000000)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000740)={@empty, 0x0}, &(0x7f0000000780)=0x14) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback={0x0, 0x1}, @in6, 0x4e21, 0x0, 0x4e22, 0x0, 0xa, 0x0, 0x0, 0x87, r1, r2}, {0x3, 0x7, 0x0, 0xd7, 0x1, 0x10001, 0x0, 0x6480000000000000}, {0x10001, 0x0, 0x100, 0x3}, 0x70e, 0x6e6bb5, 0x1, 0x1, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3502, 0x52b14d7d7faeb17e, 0x1, 0x7f, 0x3, 0x5, 0x3f}}, 0xe8) r3 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000140)}}], 0x1, 0x40000040, &(0x7f0000001c80)) connect$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000017c0)='IPVS\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) 2018/04/07 04:02:09 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 2018/04/07 04:02:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:09 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/07 04:02:09 executing program 6: pipe(&(0x7f000090cff8)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x2000000000002) pipe(&(0x7f0000815000)={0x0, 0x0}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r3, &(0x7f0000eacfd0)=[{&(0x7f0000493f7e)="ac", 0x1}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000f14000)=[{&(0x7f0000853fde)="8d", 0x1}], 0x1, 0x0) tee(r2, r2, 0x0, 0x4) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) flock(r1, 0x1) syzkaller login: [ 42.770449] ip (3785) used greatest stack depth: 54688 bytes left [ 42.963453] ip (3802) used greatest stack depth: 54312 bytes left [ 44.110701] ip (3914) used greatest stack depth: 53992 bytes left [ 45.771757] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.125591] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.143634] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.232237] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.240895] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.313861] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.542878] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.618540] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.651693] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.014704] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.128385] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.176354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.225305] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.233315] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.390708] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.396997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.407129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.460980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.525324] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.817825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.824182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.838128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.874915] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.883413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.892177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.943209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.949459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.971654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.003752] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.012554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.032166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.080942] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.087230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.098456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.308158] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.314426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.324945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.357188] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.368336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.395929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 04:02:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0xc, 0x1, 0x1}], 0xc}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x0, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:27 executing program 7: r0 = socket$inet6(0xa, 0x80005, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f000022a000), 0x1) r1 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000140)="4db169b653b07594d683921aa6c31f637c38cbbe04a36a382b7148c891ae827e140d4ea08e32dfcfdff5fe29f1e4b2069bd756704ee8e5eceebabe54dec045f8cbc0e42fcb1da748de45ebebdb7420b5b7626f9f1951e104ad279e95874288eb0ec4f489561214e840eb99370441d0b059640e7ee9af263dc2fe52ffc8dc81c00a75c310b89507dd876404e857ba1046437cbaee31baa73395b05a5893168cb3b7120b0db6a280", 0xa7, 0xfffffffffffffff9) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)='keyringvmnet1%&\x00', r1) 2018/04/07 04:02:27 executing program 4: unshare(0x60000000) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@in={0x0, 0x0, @loopback}, &(0x7f0000000000)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000740)={@empty, 0x0}, &(0x7f0000000780)=0x14) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback={0x0, 0x1}, @in6, 0x4e21, 0x0, 0x4e22, 0x0, 0xa, 0x0, 0x0, 0x87, r1, r2}, {0x3, 0x7, 0x0, 0xd7, 0x1, 0x10001, 0x0, 0x6480000000000000}, {0x10001, 0x0, 0x100, 0x3}, 0x70e, 0x6e6bb5, 0x1, 0x1, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3502, 0x52b14d7d7faeb17e, 0x1, 0x7f, 0x3, 0x5, 0x3f}}, 0xe8) r3 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000140)}}], 0x1, 0x40000040, &(0x7f0000001c80)) connect$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000017c0)='IPVS\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) 2018/04/07 04:02:27 executing program 2: unshare(0x60000000) r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet(0x2, 0x5, 0xfffffffffffffff7) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000280)=0x54) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000000)=0x44) r3 = accept4(r0, &(0x7f0000000580)=@sco, &(0x7f0000000600)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000640)={0x0, 0xc4, "a332a1eddff7c9765039447a42f276d89770397599d5f9895dad9d6e1de420913f12595b013b42b3205f251dfbebf4cd14aaa5ed52f97139522d4f4fa1a91ab588e16282a4fceb0e08409c9692cc709483ecbb215c55bf822105bca81881b8dd5332a9fca617e66c44d918e8c9892aef642d9a29ceb2feae94c6c48ad76d8f9c970305bae0f7ba1445086b3b1efdbbb56b36542ebfd4bee010aec5e81ca13533fc1108097da22b8683a57431ffc509f1c3cd3c56a53c49fbd2d4aead167c4b08e44cc064"}, &(0x7f0000000740)=0xcc) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000780)=@assoc_value={r4, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000480)={0x0, 0xffffffff}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r5}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000240)=0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000400)={0x100000000, 0x200, 0x1, 0x81, r6}, &(0x7f0000000440)=0x10) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000200)=0x54) 2018/04/07 04:02:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$inet(0x2, 0x5, 0xfff, &(0x7f0000000040)) mprotect(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) socket$inet6_dccp(0xa, 0x6, 0x0) 2018/04/07 04:02:27 executing program 6: pipe(&(0x7f000090cff8)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x2000000000002) pipe(&(0x7f0000815000)={0x0, 0x0}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r3, &(0x7f0000eacfd0)=[{&(0x7f0000493f7e)="ac", 0x1}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000f14000)=[{&(0x7f0000853fde)="8d", 0x1}], 0x1, 0x0) tee(r2, r2, 0x0, 0x4) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) flock(r1, 0x1) 2018/04/07 04:02:27 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/07 04:02:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x0, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:27 executing program 7: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x6d}, &(0x7f00000004c0)=0x88) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={0x0, 0x7}, &(0x7f0000000b40)=0x8) sendmsg$netrom(r0, &(0x7f0000000480)={&(0x7f0000000140)=@ax25={0x3, {"07199610ddb2b6"}, 0x6}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000e80), 0x0, 0x10}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fchdir(r2) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000c40)={0x4c, 0x0, 0x400, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}]}]}, 0x4c}, 0x1}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r3, 0x0, 0x8004, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x4}, 0x1c) sendfile(r4, r4, &(0x7f0000000040), 0x80000001) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x0) sendfile(r4, r3, 0x0, 0xc08f) creat(&(0x7f0000000100)='./file1\x00', 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2}, 0x10) mlockall(0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) [ 58.551252] mmap: syz-executor7 (5111) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/07 04:02:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:28 executing program 4: unshare(0x60000000) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@in={0x0, 0x0, @loopback}, &(0x7f0000000000)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000740)={@empty, 0x0}, &(0x7f0000000780)=0x14) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback={0x0, 0x1}, @in6, 0x4e21, 0x0, 0x4e22, 0x0, 0xa, 0x0, 0x0, 0x87, r1, r2}, {0x3, 0x7, 0x0, 0xd7, 0x1, 0x10001, 0x0, 0x6480000000000000}, {0x10001, 0x0, 0x100, 0x3}, 0x70e, 0x6e6bb5, 0x1, 0x1, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3502, 0x52b14d7d7faeb17e, 0x1, 0x7f, 0x3, 0x5, 0x3f}}, 0xe8) r3 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000140)}}], 0x1, 0x40000040, &(0x7f0000001c80)) connect$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000017c0)='IPVS\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) 2018/04/07 04:02:28 executing program 2: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4}) mq_unlink(&(0x7f0000fc4ffb)='eth0\x00') mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) mq_timedsend(r0, &(0x7f0000307ffd), 0x0, 0x2, &(0x7f0000fbc000)) close(r0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)="6e732f75736572005a2734608abb5adf1b76ef39f36d8f6d1a7d2e84f9d95b79c82b71e14e424157bf2f43ee92e59ef1eeac6342660a3a252df2ff73e44c3d5967ada475e580810dfe7de10c003b693e6955205c7ee0a2f5d6e22f6788479d8e8572dcf110ae2e1f34f29d59cafafee2d90d2dc03c10df651c0fd54a1d8eeb9f19603d05d1bc5df8607542073294bfd9449f6a90b92560106f5b66680844ab3d9c0d7fbb28e2bb637b58425c4a7203bd5320c7fa1261c450e172a01724ce93921b96982058d630276cf26fda0e5623108391a81e3eab605b9855") 2018/04/07 04:02:28 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000de3000)={{0x4000001ff, 0x2010000080000c}}) 2018/04/07 04:02:28 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x1000000000803, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000002ffc)=""/4, &(0x7f0000000000)=0x4) 2018/04/07 04:02:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x0, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:28 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/07 04:02:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:28 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x0, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:28 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x0, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:28 executing program 2: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4}) mq_unlink(&(0x7f0000fc4ffb)='eth0\x00') mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) mq_timedsend(r0, &(0x7f0000307ffd), 0x0, 0x2, &(0x7f0000fbc000)) close(r0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)="6e732f75736572005a2734608abb5adf1b76ef39f36d8f6d1a7d2e84f9d95b79c82b71e14e424157bf2f43ee92e59ef1eeac6342660a3a252df2ff73e44c3d5967ada475e580810dfe7de10c003b693e6955205c7ee0a2f5d6e22f6788479d8e8572dcf110ae2e1f34f29d59cafafee2d90d2dc03c10df651c0fd54a1d8eeb9f19603d05d1bc5df8607542073294bfd9449f6a90b92560106f5b66680844ab3d9c0d7fbb28e2bb637b58425c4a7203bd5320c7fa1261c450e172a01724ce93921b96982058d630276cf26fda0e5623108391a81e3eab605b9855") 2018/04/07 04:02:29 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:29 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000057c000)={0x2, 0x70, 0x70, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080), &(0x7f00000000c0)=0x8) epoll_wait(r1, &(0x7f0000e1bff4)=[{}], 0x1, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) epoll_create1(0x80000) 2018/04/07 04:02:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e20, @loopback=0x7f000001}}) r2 = socket(0x10, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'syz_tun\x00'}) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f0000000200)=@buf={0x0, &(0x7f0000000640)}) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000003940)=ANY=[@ANYBLOB="280000001400090500000000ca91f05c0e3302ff3200000000020000"], 0x1}, 0x1}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x101, 0x0, 0x0, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff00}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x857}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}]}, 0xa8}, 0x1}, 0x20008000) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000d00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001140)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003700)) fcntl$getown(r2, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003780)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000037c0)) r6 = getpgrp(0x0) sendmsg$netlink(r3, &(0x7f0000003900)={&(0x7f00000007c0)=@kern={0x10, 0x0, 0x0, 0x800004}, 0xc, &(0x7f00000036c0)=[{&(0x7f0000000800)={0x10, 0x1b, 0x200, 0x70bd28, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000003800)=[@cred={0x18, 0x1, 0x2, 0x0, 0x0, r5}, @cred={0x18, 0x1, 0x2, r6, r4, r5}, @cred={0x18, 0x1, 0x2, 0x0, r4}], 0x48, 0x8010}, 0x10) keyctl$get_persistent(0x16, r4, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) r7 = socket$inet6_udp(0xa, 0x2, 0x0) accept4$packet(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x14, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000200)={@loopback={0x0, 0x1}, 0x4, r8}) 2018/04/07 04:02:29 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt(r0, 0x1, 0x6, &(0x7f0000000440)=""/137, &(0x7f0000000500)=0x89) sendmsg$nl_generic(r0, &(0x7f0000009fc8)={&(0x7f0000f79000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x1a, 0x800000000000bff, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) r1 = dup(r0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000002c0)={0x4, 0x0, 0x9, 0x3, 0x80000001, 0x0, 0x4, 0x659, 0x2, 0x2}) getsockname$packet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x14) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000400)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000180), &(0x7f0000000300)=0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000540)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000580)=0x20) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400050000000100000600ff0100020800bd6400000000082015e019f380a122f4e132429187"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000340)={'nat\x00'}, &(0x7f00000003c0)=0x54) 2018/04/07 04:02:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt(r0, 0x1, 0x6, &(0x7f0000000440)=""/137, &(0x7f0000000500)=0x89) sendmsg$nl_generic(r0, &(0x7f0000009fc8)={&(0x7f0000f79000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x1a, 0x800000000000bff, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000002c0)={0x4, 0x0, 0x9, 0x3, 0x80000001, 0x0, 0x4, 0x659, 0x2, 0x2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x14) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000400)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000180), &(0x7f0000000300)=0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000580)=0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000600)={r1, 0x10, &(0x7f00000005c0)=[@in={0x2, 0x4e21, @rand_addr=0x1}]}, &(0x7f0000000640)=0xc) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) socket$netlink(0x10, 0x3, 0x13) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400050000000100000600ff0100020800bd6400000000082015e019f380a122f4e132429187"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'nat\x00'}, &(0x7f00000003c0)=0x54) 2018/04/07 04:02:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000ac0fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="c044", 0x2) 2018/04/07 04:02:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606bc55e20b84f7cff1bb34f338752f1395", 0x41) 2018/04/07 04:02:29 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendto(r1, &(0x7f0000000100)="224b49fd1e310f215feac34bbc176bfc0006f72f9a0f4a6f3f21009562f8c0e3e8f2000000c896d61f3f2d0b9d7bcffc88dbe6b7acdc870f6aee9cc9c4d0021036486bc45228c0dd1e38e4ce49ba4d1ec4373d242e635bdbc45641adf232f7a6f3da8285001a2e70b58306e1793f7abe92abc48367298e347485d520a88c47d7eabbcebd1dd850715284a9fd69bf6bfde5cfb085c385724baacf1a2865d221d2", 0xa0, 0x0, &(0x7f0000001280)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:29 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/07 04:02:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x1000ffff) open(&(0x7f0000000040)='./control\x00', 0x4000, 0x40) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x800) r2 = open(&(0x7f0000012ff6)='./control\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000180)='./control\x00', r1, &(0x7f0000000140)='./control\x00', 0x104) 2018/04/07 04:02:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:31 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) 2018/04/07 04:02:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840), 0x0) 2018/04/07 04:02:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e20, @loopback=0x7f000001}}) r2 = socket(0x10, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'syz_tun\x00'}) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f0000000200)=@buf={0x0, &(0x7f0000000640)}) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000003940)=ANY=[@ANYBLOB="280000001400090500000000ca91f05c0e3302ff3200000000020000"], 0x1}, 0x1}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x101, 0x0, 0x0, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff00}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x857}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}]}, 0xa8}, 0x1}, 0x20008000) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000d00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001140)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003700)) fcntl$getown(r2, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003780)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000037c0)) r6 = getpgrp(0x0) sendmsg$netlink(r3, &(0x7f0000003900)={&(0x7f00000007c0)=@kern={0x10, 0x0, 0x0, 0x800004}, 0xc, &(0x7f00000036c0)=[{&(0x7f0000000800)={0x10, 0x1b, 0x200, 0x70bd28, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000003800)=[@cred={0x18, 0x1, 0x2, 0x0, 0x0, r5}, @cred={0x18, 0x1, 0x2, r6, r4, r5}, @cred={0x18, 0x1, 0x2, 0x0, r4}], 0x48, 0x8010}, 0x10) keyctl$get_persistent(0x16, r4, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) r7 = socket$inet6_udp(0xa, 0x2, 0x0) accept4$packet(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x14, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000200)={@loopback={0x0, 0x1}, 0x4, r8}) 2018/04/07 04:02:31 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:31 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000cc5000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0xfffffffffffffffd, 0x1, 0x6}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) socket$unix(0x1, 0x7, 0x0) 2018/04/07 04:02:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840), 0x0) 2018/04/07 04:02:31 executing program 1: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001580)=[{&(0x7f0000000140)="57f497c07989c619e48c28775f63e222da551e9b6789bb5d6fde46b2dc89543af1a8f144729ae36f3e1f0821a1e2515be60d25ccf16117c50376c1b4c4e3e08cb4258224be7f7625acdbe0b88fb9ea", 0x4f}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000240)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000035f21faa9c5f0b38f6e4594f0691c27f2f7c0c1a1b9510396ff6026dbf16ff358b59212802668981024c1a3fb6eb99e97dc9e09e5ea51b14a7531b36c730650f0bdaa0beb4006945e3c357725d8e5357f4f4a43b403935c45204eb45e7928d339d0588af780"], &(0x7f00000000c0)=0x1) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) r2 = gettid() ptrace$getenv(0x4201, r2, 0xffffffffffffffc0, &(0x7f0000000340)) fchdir(0xffffffffffffffff) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) bind$ipx(0xffffffffffffffff, &(0x7f0000000040)={0x4, 0x6, 0xfffffffffffffbfd, "cf18124e6737", 0x10000}, 0x128) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000001c0), &(0x7f0000000200)=0x4) open(&(0x7f0000000080)='./bus\x00', 0x80203, 0x0) pipe(&(0x7f0000000400)) keyctl$set_reqkey_keyring(0xe, 0x7) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r3, &(0x7f00006c6000)=[{&(0x7f0000000b80)=""/202, 0xca}], 0x1, 0x0) ioprio_get$pid(0x1, r2) r4 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)='\x00', 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r4, &(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, r5) 2018/04/07 04:02:31 executing program 7: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001580)=[{&(0x7f0000000140)="57f497c07989c619e48c28775f63e222da551e9b6789bb5d6fde46b2dc89543af1a8f144729ae36f3e1f0821a1e2515be60d25ccf16117c50376c1b4c4e3e08cb4258224be7f7625acdbe0b88fb9ea506b8dbf1c", 0x54}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9a1d) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000240)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000035f21faa9c5f0b38f6e4594f0691c27f2f7c0c1a1b9510396ff6026dbf16ff358b59212802668981024c1a3fb6eb99e97dc9e09e5ea51b14a7531b36c730650f0bdaa0beb4006945e3c357725d8e5357f4f4a43b403935c45204eb45e7928d339d0588af780"], &(0x7f00000000c0)=0x1) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) r3 = gettid() ptrace$getenv(0x4201, r3, 0xffffffffffffffc0, &(0x7f0000000340)) fchdir(r2) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) bind$ipx(r2, &(0x7f0000000280)={0x4, 0x6, 0xfffffffffffffbff, "cf18124e6736", 0x10000}, 0x10) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f00000001c0), &(0x7f0000000200)=0x4) open(&(0x7f0000000080)='./bus\x00', 0x80203, 0x0) pipe(&(0x7f0000000400)) keyctl$set_reqkey_keyring(0xe, 0x7) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r4, &(0x7f00006c6000)=[{&(0x7f0000000b80)=""/202, 0xca}], 0x1, 0x0) r5 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)='\x00', 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r7, 0x800, 0x0, 0x25dfdbfe, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) keyctl$search(0xa, r5, &(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, r6) 2018/04/07 04:02:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:32 executing program 7: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001580)=[{&(0x7f0000000140)="57f497c07989c619e48c28775f63e222da551e9b6789bb5d6fde46b2dc89543af1a8f144729ae36f3e1f0821a1e2515be60d25ccf16117c50376c1b4c4e3e08cb4258224be7f7625acdbe0b88fb9ea506b8dbf1c", 0x54}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9a1d) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000240)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000035f21faa9c5f0b38f6e4594f0691c27f2f7c0c1a1b9510396ff6026dbf16ff358b59212802668981024c1a3fb6eb99e97dc9e09e5ea51b14a7531b36c730650f0bdaa0beb4006945e3c357725d8e5357f4f4a43b403935c45204eb45e7928d339d0588af780"], &(0x7f00000000c0)=0x1) ftruncate(r0, 0x7fff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) r3 = gettid() ptrace$getenv(0x4201, r3, 0xffffffffffffffc0, &(0x7f0000000340)) fchdir(r2) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe, 0xffffffffffffffff) bind$ipx(r2, &(0x7f0000000280)={0x4, 0x6, 0xfffffffffffffbff, "cf18124e6736", 0x10000}, 0x10) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f00000001c0), &(0x7f0000000200)=0x4) open(&(0x7f0000000080)='./bus\x00', 0x80203, 0x0) pipe(&(0x7f0000000400)) keyctl$set_reqkey_keyring(0xe, 0x7) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/anycast6\x00') preadv(r4, &(0x7f00006c6000)=[{&(0x7f0000000b80)=""/202, 0xca}], 0x1, 0x0) r5 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)='\x00', 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r7, 0x800, 0x0, 0x25dfdbfe, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) keyctl$search(0xa, r5, &(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, r6) 2018/04/07 04:02:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0xc, 0x1, 0x1}], 0xc}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x5) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x0, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ac0fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, "c17fb401b04de06a7358fb3877cb3694b46c089194970a153788f899b5b9ffe72ff30546093a775fab4417587a60d83d92ada2cdc1dedb6a20e468af150ea2a2", "00e2151ba5b6a510ef3c1e2e5c0da34f5cd0f94e4738033e975772b1b2dfe7b6", [0x0, 0x1000000000001f]}) shutdown(0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="c044", 0x2) 2018/04/07 04:02:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840), 0x0) 2018/04/07 04:02:32 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f00000000c0)="e9a00114", 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000013c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@ipv4_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, [@RTA_ENCAP={0x8, 0x16, @nested={0x4}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x4}]}, 0x2c}, 0x1}, 0x0) 2018/04/07 04:02:32 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000616000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000596000)=0x9, 0x4) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'raw\x00', 0x2, [{}, {}]}, 0x48) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0), 0xffffffffffffffe4) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8, 0x4) bind$inet(r1, &(0x7f0000afbff0)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x47590000000, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 2018/04/07 04:02:32 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) 2018/04/07 04:02:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1", 0x21) [ 64.032283] netlink: 'syz-executor0': attribute type 21 has an invalid length. 2018/04/07 04:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000967000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:33 executing program 4: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000d80)=ANY=[@ANYBLOB="010e28bd7000fedb00f00f0000000810060003000000680001000800050001000000080001000a00000008000bf072697e0008000b00736970000c0900000008c80f0fa5831f3c9ed96a7f530001000a0000da25c08ec968c3507f62efad1442a6a5079f0404a21c0dedf883e08695c90007c6752b11623f0020000000030100bd00"], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x20000884) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x6d}, &(0x7f00000004c0)=0x88) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={0x0, 0x7}, &(0x7f0000000b40)=0x8) sendmsg$netrom(r0, &(0x7f0000000480)={&(0x7f0000000140)=@ax25={0x3, {"07199610ddb2b6"}, 0x6}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000e80), 0x0, 0x10}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000c40)={0x48, 0x0, 0x400, 0x0, 0x25dfdbfe, {0x5}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}]}]}, 0x48}, 0x1}, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r2, 0x0, 0x8004, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) sendfile(r3, r3, &(0x7f0000000040), 0x80000001) fallocate(r2, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xc08f) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) creat(&(0x7f0000000100)='./file1\x00', 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2}, 0x10) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x2, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) 2018/04/07 04:02:33 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x100000000080000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000d80)=ANY=[@ANYRES32=0x0, @ANYBLOB="98000000651b13f8f9495d9bf41248204dc8af503b3ba8679dd6092f74ffff3a8e207c2976d065c5d701235d0100010000000000d8a71752f0f641d03c0b07c1a9b2c4ae6d13d67ec55af995fb10c0e89c679764cddb2f21c9718b94703e87bf1451170291f4f005c4566d1313ad328396949b97dfb2d91bb40134df09ed3b"], &(0x7f0000000200)=0x2) socketpair(0xa, 0x3, 0x5, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f0000001a40)=""/4096) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0)=@int=0x80000000, 0x4) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000d40)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000600)={{0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0xe94}, {0xa, 0x4e21, 0x5, @loopback={0x0, 0x1}, 0x297}, 0x100000001, [0x5, 0xfffffffffffffffc, 0x1, 0x5, 0x5, 0x6, 0x1, 0x34]}, 0x5c) r4 = accept(0xffffffffffffffff, &(0x7f0000000b00)=@alg, &(0x7f0000000b80)=0x80) sendto$ipx(r4, &(0x7f0000000bc0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000340)="f6fa4b79ba6f6c4c5323e2af43013ecee5c86b06eeb23ef53a19c375a5f79c47658a554390c336a7455599d8f112c413f52eec22356dd4871dd874ff3eeb849bf7f48b056e1ccdd135800a9abba99cc4", 0x50) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000003c0)=ANY=[], &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x6, 0x2ab, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x0, &(0x7f0000000300), &(0x7f0000001080)=ANY=[@ANYBLOB="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"]}, 0x323) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000500)={0x1, 0x9}, 0x8) sendmsg$nl_xfrm(r5, &(0x7f000000b000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@rand_addr}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}, 0x1}, 0x0) getpeername$inet6(r3, &(0x7f0000000040), &(0x7f0000000080)=0x1c) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x2b) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x2000000000008, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) dup3(r6, r7, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000840)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000119078ac2314aaac14142b4e204e20000890780000000000000000000000970ea6f5ee54ca02247b67f1f29f5036727cbd1b4c93ea961aa7f9d2c1fcbb822746548932727c2708a89399bc5105b714277970036a3ff95f7df69e1c823dca133782c22601bb9939674f56ce4db6dce3c79a4465a60205ec054c34609034427530dc40f2cdfdd083f236ba6ebfd04b777ba72feaa2715e783f561bcf4b774cd81e2a99d834d0747983f16c43f4fe9a96da84ac17f4f8db14b59b2b871fef55702df30966092bcfa651de8bd7fa6029af17b3b5406beed9d90d91b85db0256b87a7afbbb9cc"], &(0x7f00000000c0)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8bc]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000a40)=0xd) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001840)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xfffffffffffffdb3) 2018/04/07 04:02:33 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d556b6c5820faeb895298992ea54d60004002c5b534c90c2", 0x18) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) sendmsg$netlink(r1, &(0x7f0000000280)={&(0x7f00000000c0)=@kern={0x10}, 0xc, &(0x7f00000002c0)=[{&(0x7f0000000440)={0x10}, 0x10}], 0x1, &(0x7f0000000040)}, 0x0) 2018/04/07 04:02:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc9, &(0x7f0000000000), 0x4) 2018/04/07 04:02:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1", 0x21) 2018/04/07 04:02:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0xc, 0x1, 0x1}], 0xc}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x5) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x0, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/04/07 04:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000100)="2700000014000f34030e0000120f0a0011000100f5fe0012ff000000078a151f75ffff00000500", 0x27) 2018/04/07 04:02:33 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x7f7, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0xfeea, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x51}, 0x40002106) 2018/04/07 04:02:33 executing program 7: r0 = inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x0, 0x1, 0x8, 0x7}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r3, 0x0) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000540)=ANY=[], &(0x7f0000000140)) r5 = syz_open_procfs(r1, &(0x7f0000fd1ff6)='stack\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b40)={0x0, 0x79, "bb2b87ba701eb684d054532b90b4d0025db598589e507b00b9571a6ac9468ff4e1dd2b5974265f2047651953d7a1944f4b47b4a3f3a10330882e34761985268cc0802087005b372a22e8a08eefbdd06caf22e2c1cf671afab35ca9dabb077ae2060f79f34f759dc8b54dc1610b6da77f2163023e176d599522"}, &(0x7f00000008c0)=0x81) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000800)={r6, 0x96, "1568f26c944f20359beb14bec0b4a1df59482cd7c470af1b40fe6904439546bc93282cb38f065702e94076ad51ca38bd3c2f703632ddedc0c16236d245da4b77c23eb7c3ced035682b5f821c2bbbac057b9db0779096738214751e423aaa46d9153f1358320d6135837f8b205c6016f9dcd584fc3846908d4e6956eb7782acb2f1808ef20395f123d8247c7a25fcad5b72353283c530"}, &(0x7f0000000900)=0x9e) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[@ANYBLOB="6b0000005d5e36976d778584fa5b6d9519583e8e4801a0fe83dfb0c808f5425125be895b906e9ddab3ceede7bc33390ff7f9548830b79bb9bbe6"], &(0x7f00000009c0)=0x1) preadv(r5, &(0x7f0000000000)=[{&(0x7f0000040000)=""/136, 0x88}, {&(0x7f0000ddd000)=""/143, 0x8f}], 0x2, 0x0) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x36, &(0x7f00000000c0)=@hopopts={0x0, 0xb, [], [@calipso={0x7, 0x50, {0x0, 0x12, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @enc_lim={0x4, 0x1}, @ra={0x5, 0x2}]}, 0x68) setsockopt$inet6_opts(r7, 0x29, 0x36, &(0x7f0000000000)=@routing, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000600)=""/156) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000340)={0x0, 0xffff, 0x4, 0x7ff, 0xfa9, 0x0, 0xfff, 0x7f, {0x0, @in={{0x2, 0x4e20}}, 0x6f, 0x0, 0x20400000000, 0x0, 0x8}}, &(0x7f0000000240)=0xb0) setsockopt$inet6_MRT6_ADD_MFC(r8, 0x29, 0xcc, &(0x7f0000000a00)={{0xa, 0x0, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0xff}, {0xa, 0x4e21, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0xb5}, 0x4, [0x0, 0x2, 0x1, 0x9, 0x442, 0x0, 0x2]}, 0x5c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000280)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 2018/04/07 04:02:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1", 0x21) 2018/04/07 04:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) [ 64.672710] ================================================================== [ 64.680155] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 64.686916] CPU: 1 PID: 5360 Comm: syz-executor7 Not tainted 4.16.0+ #81 [ 64.693751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.703098] Call Trace: [ 64.705689] dump_stack+0x185/0x1d0 [ 64.709339] ? kernel_text_address+0x248/0x3a0 [ 64.713932] kmsan_report+0x142/0x240 [ 64.717734] __msan_warning_32+0x6c/0xb0 [ 64.721801] kernel_text_address+0x248/0x3a0 [ 64.726206] ? __schedule+0x674/0x730 [ 64.730012] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 64.735372] ? __schedule+0x674/0x730 [ 64.739172] __kernel_text_address+0x34/0xe0 [ 64.743580] ? __schedule+0x674/0x730 [ 64.747385] unwind_get_return_address+0x8c/0x130 [ 64.752234] __save_stack_trace+0x45c/0xa80 [ 64.756560] ? __schedule+0x674/0x730 [ 64.760364] ? __msan_poison_alloca+0x15c/0x1d0 [ 64.765040] ? save_stack_trace_tsk+0x58/0x2f0 [ 64.769627] save_stack_trace_tsk+0x258/0x2f0 [ 64.774134] proc_pid_stack+0x26a/0x470 [ 64.778110] proc_single_show+0x1af/0x300 [ 64.782261] ? proc_pid_wchan+0x250/0x250 [ 64.786412] ? proc_single_open+0x90/0x90 [ 64.790562] seq_read+0xc7d/0x2260 [ 64.794124] do_iter_read+0x880/0xd70 [ 64.797942] ? seq_open+0x360/0x360 [ 64.801566] do_preadv+0x3a1/0x580 [ 64.805112] ? syscall_return_slowpath+0xe9/0x700 [ 64.809958] SYSC_preadv+0xc6/0xe0 [ 64.813504] SyS_preadv+0x77/0xa0 [ 64.816956] do_syscall_64+0x309/0x430 2018/04/07 04:02:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0x0, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) [ 64.820852] ? SYSC_writev+0xb0/0xb0 [ 64.824572] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 64.829754] RIP: 0033:0x455259 [ 64.832939] RSP: 002b:00007f6ced5a8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 64.840648] RAX: ffffffffffffffda RBX: 00007f6ced5a96d4 RCX: 0000000000455259 [ 64.847922] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000016 [ 64.855190] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 64.862455] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 64.869722] R13: 000000000000046f R14: 00000000006f9b08 R15: 0000000000000000 [ 64.876989] [ 64.878607] Uninit was stored to memory at: [ 64.882937] kmsan_internal_chain_origin+0x12b/0x210 [ 64.888042] __msan_chain_origin+0x69/0xc0 [ 64.892277] update_stack_state+0x959/0xa40 [ 64.896602] __unwind_start+0x335/0x630 [ 64.900581] __save_stack_trace+0x3e1/0xa80 [ 64.904996] save_stack_trace_tsk+0x258/0x2f0 [ 64.909492] proc_pid_stack+0x26a/0x470 [ 64.913466] proc_single_show+0x1af/0x300 [ 64.917616] seq_read+0xc7d/0x2260 [ 64.921158] do_iter_read+0x880/0xd70 [ 64.924957] do_preadv+0x3a1/0x580 [ 64.928503] SYSC_preadv+0xc6/0xe0 [ 64.932046] SyS_preadv+0x77/0xa0 [ 64.935499] do_syscall_64+0x309/0x430 [ 64.939401] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 64.944596] Local variable description: ----key2.i@do_futex [ 64.950291] Variable was created at: [ 64.954006] do_futex+0x35d/0x6ad0 [ 64.957546] SYSC_futex+0x3e1/0x810 [ 64.961160] ================================================================== [ 64.968505] Disabling lock debugging due to kernel taint 2018/04/07 04:02:33 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000)={0x77359400}, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) 2018/04/07 04:02:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001840)="a2e3015ddc3d6e043f09c7699f2472c1fce03b5f66aecae48026d47924f9eb42b1f20200053cdb7efe541e3d8495f01606", 0x31) 2018/04/07 04:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x69) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) 2018/04/07 04:02:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) [ 64.973948] Kernel panic - not syncing: panic_on_warn set ... [ 64.973948] [ 64.981312] CPU: 1 PID: 5360 Comm: syz-executor7 Tainted: G B 4.16.0+ #81 [ 64.989447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.998790] Call Trace: [ 65.001385] dump_stack+0x185/0x1d0 [ 65.005017] panic+0x39d/0x940 [ 65.008236] ? kernel_text_address+0x248/0x3a0 [ 65.012818] kmsan_report+0x238/0x240 [ 65.016619] __msan_warning_32+0x6c/0xb0 [ 65.020687] kernel_text_address+0x248/0x3a0 [ 65.025098] ? __schedule+0x674/0x730 [ 65.028899] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 65.034264] ? __schedule+0x674/0x730 [ 65.038066] __kernel_text_address+0x34/0xe0 [ 65.042474] ? __schedule+0x674/0x730 [ 65.046278] unwind_get_return_address+0x8c/0x130 [ 65.051125] __save_stack_trace+0x45c/0xa80 [ 65.055445] ? __schedule+0x674/0x730 [ 65.059251] ? __msan_poison_alloca+0x15c/0x1d0 [ 65.063930] ? save_stack_trace_tsk+0x58/0x2f0 [ 65.068517] save_stack_trace_tsk+0x258/0x2f0 [ 65.073016] proc_pid_stack+0x26a/0x470 [ 65.076996] proc_single_show+0x1af/0x300 [ 65.081147] ? proc_pid_wchan+0x250/0x250 [ 65.085295] ? proc_single_open+0x90/0x90 [ 65.089441] seq_read+0xc7d/0x2260 [ 65.092994] do_iter_read+0x880/0xd70 [ 65.096806] ? seq_open+0x360/0x360 [ 65.100431] do_preadv+0x3a1/0x580 [ 65.103976] ? syscall_return_slowpath+0xe9/0x700 [ 65.108819] SYSC_preadv+0xc6/0xe0 [ 65.112363] SyS_preadv+0x77/0xa0 [ 65.115817] do_syscall_64+0x309/0x430 [ 65.119709] ? SYSC_writev+0xb0/0xb0 [ 65.123435] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 65.128619] RIP: 0033:0x455259 [ 65.131803] RSP: 002b:00007f6ced5a8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 65.139512] RAX: ffffffffffffffda RBX: 00007f6ced5a96d4 RCX: 0000000000455259 [ 65.146778] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000016 [ 65.154044] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 65.161311] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 65.168572] R13: 000000000000046f R14: 00000000006f9b08 R15: 0000000000000000 [ 65.176309] Dumping ftrace buffer: [ 65.179825] (ftrace buffer empty) [ 65.183506] Kernel Offset: disabled [ 65.187109] Rebooting in 86400 seconds..