INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. 2018/04/07 00:45:29 fuzzer started 2018/04/07 00:45:30 dialing manager at 10.128.0.26:38639 2018/04/07 00:45:36 kcov=true, comps=false 2018/04/07 00:45:39 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x1, &(0x7f00000000c0)) 2018/04/07 00:45:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x18, "7fa7bae6ebad3b20017c58cf792e2770043b5bf8a2000000"}, &(0x7f0000000040)=0x20) 2018/04/07 00:45:39 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xd, &(0x7f0000000000), 0x20) 2018/04/07 00:45:39 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000000)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x8001}, {0x80}}) 2018/04/07 00:45:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f84fa0)={0x2, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x7ffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_ident={0x2}]}, 0x48}, 0x1}, 0x0) 2018/04/07 00:45:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @rand_addr}}, 0x0, 0x1fffffe}, 0x90) 2018/04/07 00:45:39 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') unshare(0x8000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/07 00:45:39 executing program 3: futex(&(0x7f0000012ffc), 0x2, 0x0, &(0x7f0000060ff0), &(0x7f00003cfffc), 0x0) syzkaller login: [ 44.239465] ip (3751) used greatest stack depth: 54672 bytes left [ 45.049493] ip (3825) used greatest stack depth: 54408 bytes left [ 46.001979] ip (3917) used greatest stack depth: 54200 bytes left [ 47.985213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.059805] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.068839] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.103585] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.213633] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.351743] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.431819] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.442782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.985101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.080126] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.130602] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.138578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.224183] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.458373] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.476283] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.503126] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.756278] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.762657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.773614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.866450] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.872754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.884799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.912640] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.918924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.932578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.962196] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.984454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.020836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.048584] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.055788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.091793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.310155] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.316883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.325733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.353156] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.376699] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.383393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.402613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.438094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.463821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 00:45:56 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 2018/04/07 00:45:56 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x4, &(0x7f000058a000)={0x0, 0x0, 0x3}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r2, &(0x7f000004ffe0)=[{&(0x7f000004f000)=""/128, 0x80}], 0x1) 2018/04/07 00:45:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0x374) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000dd000)=0x1, 0x4) connect$inet(r0, &(0x7f0000d9dff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) poll(&(0x7f0000de3000)=[{r0}], 0x1, 0x0) 2018/04/07 00:45:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00002e9000)='task\x00') getdents(r0, &(0x7f0000824f59)=""/96, 0x60) getdents(r0, &(0x7f0000eee000)=""/36, 0x24) 2018/04/07 00:45:56 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x10, 0x4, 0x0, 0x2}, 0x2c) 2018/04/07 00:45:56 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) writev(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)='`', 0x1}], 0x1) 2018/04/07 00:45:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000d000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) connect(r0, &(0x7f0000000680)=@generic={0x2, "f98ce106ff882f2ad0fa1702dd285b5ea4e7ba9c7a62012211dc05c39ead465216e2bbd2048eb5f262634d3863649fa6f3d6fd01adc71de7c97384069acb29f37b044be8d4305553658470e91d299710d831a9165a48f84ec4018b381caa85c0dab104ed67f754ae420904c37b10f081d4f7c68b99ae29ae6ff08e449447"}, 0x80) 2018/04/07 00:45:56 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:56 executing program 6: socketpair$inet(0x18, 0x0, 0x3, &(0x7f0000001ff8)) 2018/04/07 00:45:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:45:56 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/04/07 00:45:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000578000), &(0x7f00007d1ffc)=0x4) 2018/04/07 00:45:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffc3, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001}, 0x10) 2018/04/07 00:45:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x540f, &(0x7f0000000040)) 2018/04/07 00:45:56 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:56 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x2, "9f"}, 0x346) 2018/04/07 00:45:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000897ff4)={0x10}, 0xc, &(0x7f0000023000)={&(0x7f0000010dfc)={0x14, 0x7, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 2018/04/07 00:45:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:45:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x3, &(0x7f0000000440)=@raw=[@initr0={0x18}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffff80}], &(0x7f00000002c0)="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", 0x1, 0xaf, &(0x7f0000000200)=""/175}, 0x48) 2018/04/07 00:45:57 executing program 6: syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/07 00:45:57 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/04/07 00:45:57 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x2, 0x4000, 0x210, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/07 00:45:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x1, 0x0, [@multicast1=0xe0000001, @broadcast=0xffffffff]}, 0x18) 2018/04/07 00:45:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x80003e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ed7000/0x3000)=nil, 0x3000, 0x0) 2018/04/07 00:45:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000002000)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0xffffff88, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f0000000000)) 2018/04/07 00:45:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) [ 60.743441] dccp_invalid_packet: P.type (RESPONSE) not Data || [Data]Ack, while P.X == 0 [ 60.792892] dccp_invalid_packet: P.type (RESPONSE) not Data || [Data]Ack, while P.X == 0 2018/04/07 00:45:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:45:58 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="393a340d231c04e0c2b076b1172946c7a53d31"], 0x13) 2018/04/07 00:45:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_generic(r0, &(0x7f0000004fc8)={&(0x7f000000aff4)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0xa}, [@typed={0xc, 0x0, @fd}]}, 0xff1e}, 0x1}, 0x0) 2018/04/07 00:45:58 executing program 5: mount(&(0x7f0000000040)='.', &(0x7f0000000080)='.', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000280)) 2018/04/07 00:45:58 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:58 executing program 3: r0 = creat(&(0x7f0000001ff8)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000ff2)='net/xfrm_stat\x00') sendfile(r0, r1, 0x0, 0x6) 2018/04/07 00:45:58 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x2, 0x5, 0x4}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000000, 0x0}, 0x2c) 2018/04/07 00:45:58 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/04/07 00:45:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) [ 61.631712] 9pnet_virtio: no channels available for device . [ 61.667236] 9pnet_virtio: no channels available for device . 2018/04/07 00:45:58 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x8002) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051bff6)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r1, r0, &(0x7f0000335ff8), 0xffffffff) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000d26ffc)) 2018/04/07 00:45:58 executing program 5: setitimer(0x2, &(0x7f0000001000)={{0x77359400}, {0x77359400}}, &(0x7f0000001000)) getitimer(0x2, &(0x7f0000006000)) 2018/04/07 00:45:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5437, &(0x7f0000981ffe)) dup3(r1, r0, 0x0) 2018/04/07 00:45:58 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_submit(0x0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:58 executing program 4: finit_module(0xffffffffffffffff, &(0x7f0000000080)=')vboxnet0&\x00', 0x0) 2018/04/07 00:45:58 executing program 6: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) 2018/04/07 00:45:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:45:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) clock_gettime(0x0, &(0x7f00000c2000)={0x0, 0x0}) ppoll(&(0x7f0000341ff0)=[{r0}], 0x1, &(0x7f00005a9ff0)={0x0, r1+30000000}, &(0x7f00005deff8), 0x8) write$evdev(r0, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x401}, {}], 0x30) 2018/04/07 00:45:59 executing program 2: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000200), 0x0) 2018/04/07 00:45:59 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000400)="85", 0x1}], 0x1) 2018/04/07 00:45:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:45:59 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x1a2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x203) 2018/04/07 00:45:59 executing program 6: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) 2018/04/07 00:45:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_dump={0x3f}}) 2018/04/07 00:45:59 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:59 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/04/07 00:45:59 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x2, &(0x7f0000bfeff8)=0x4) pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) writev(r3, &(0x7f0000000440), 0x0) dup2(r1, r2) 2018/04/07 00:45:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000080)=0x1, 0x4) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@ipx, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000004c0)=""/246, 0xf6}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001000)={0x14, 0x15, 0x301}, 0x14}, 0x1}, 0x0) 2018/04/07 00:45:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f000002dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001f4c)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f000002f000)=""/7, 0x7}}, {{&(0x7f0000002fa8)=@alg, 0x58, &(0x7f000001c000), 0x0, &(0x7f000002ffa9)=""/87, 0x57}}], 0x2, 0x10000, 0x0) sendto(r1, &(0x7f0000018000), 0x0, 0x0, 0x0, 0x0) 2018/04/07 00:45:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x19) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/07 00:45:59 executing program 6: r0 = socket$inet(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x29, 0x5, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}, 0x3) 2018/04/07 00:45:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:45:59 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:45:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:00 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001600)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x98) 2018/04/07 00:46:00 executing program 3: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x7742) io_setup(0x7, &(0x7f0000000000)) 2018/04/07 00:46:00 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:46:00 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) 2018/04/07 00:46:00 executing program 4: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x4a}}) 2018/04/07 00:46:00 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x2, &(0x7f0000bfeff8)=0x4) pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) writev(r3, &(0x7f0000000440), 0x0) dup2(r1, r2) 2018/04/07 00:46:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:00 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) accept4(r0, &(0x7f00000025c0)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000002640)=0x80, 0x0) 2018/04/07 00:46:00 executing program 6: r0 = socket$inet(0x2, 0x80001, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x5450, &(0x7f0000000fd8)) 2018/04/07 00:46:00 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00003edfff), 0x0, 0x0, &(0x7f0000dfcff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000077ffc)) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x0, &(0x7f00000009c0)={0x2, 0x4e20, @rand_addr}, 0x10) recvfrom(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 2018/04/07 00:46:00 executing program 2: r0 = socket$inet(0x28, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'sed\x00'}, 0x2c) 2018/04/07 00:46:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:00 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r1, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:46:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x6}, 0x1c) getpeername(r0, &(0x7f0000000080)=@ipx, &(0x7f0000000100)=0x80) 2018/04/07 00:46:00 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2, &(0x7f0000000240)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000140)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 2018/04/07 00:46:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:00 executing program 3: r0 = socket(0xa, 0x2400000001, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f0000000100)=""/144, &(0x7f00000000c0)=0x69) 2018/04/07 00:46:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2003e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000109ffc)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') 2018/04/07 00:46:01 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:46:01 executing program 6: r0 = syz_open_dev$tun(&(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x1401}) getgroups(0x2, &(0x7f0000000200)=[0x0, 0xffffffffffffffff]) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) 2018/04/07 00:46:01 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00003edfff), 0x0, 0x0, &(0x7f0000dfcff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000077ffc)) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x0, &(0x7f00000009c0)={0x2, 0x4e20, @rand_addr}, 0x10) recvfrom(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 2018/04/07 00:46:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)='f', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:01 executing program 3: r0 = socket(0x11, 0x4000000000080003, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)="73231e8d6f8ef71ccf1c0f787f5e32537f", 0x11}], 0x1, &(0x7f0000000280)}}], 0x1, 0x0) 2018/04/07 00:46:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x0, 0x4000000}, 0xc) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007fbdb72d1cb2a4a280930a06000000a84308910000000900140003000500000000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2018/04/07 00:46:01 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) 2018/04/07 00:46:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000100)=0x3fb, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00004aaffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) dup2(r1, r0) [ 64.520478] netlink: 'syz-executor2': attribute type 20 has an invalid length. [ 64.528108] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/07 00:46:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x5, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/07 00:46:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000100)=0x3fb, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00004aaffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) dup2(r1, r0) 2018/04/07 00:46:01 executing program 6: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000100), 0x400000088, 0x0, &(0x7f0000000140), &(0x7f0000c2fffc), 0x0) 2018/04/07 00:46:01 executing program 4: r0 = socket(0x2, 0x80003, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000005000), 0x0) [ 64.600352] netlink: 'syz-executor2': attribute type 20 has an invalid length. [ 64.607904] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/07 00:46:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:01 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:46:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000040)=""/197, 0x1}) 2018/04/07 00:46:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000100)}) 2018/04/07 00:46:02 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) 2018/04/07 00:46:02 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x0, 0x4000000}, 0xc) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007fbdb72d1cb2a4a280930a06000000a84308910000000900140003000500000000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2018/04/07 00:46:02 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x2, 0x2b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080], 0x0, &(0x7f0000000040), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'tunl0\x00', 'gre0\x00', 'eql\x00', 'gre0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xa0, 0xd0, 0x100, [@cpu={'cpu\x00', 0x8, {{0x0, 0x4}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {{{0x9, 0x0, 0x0, 'ip6_vti0\x00', 'ifb0\x00', 'erspan0\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x70, 0xa8, 0xf8}, [@common=@mark={'mark\x00', 0x10}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x330) 2018/04/07 00:46:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:02 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 2018/04/07 00:46:02 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:46:02 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x5, 0x0, &(0x7f0000060ff0)={0x0, 0x3}, &(0x7f0000034000), 0x0) mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0) 2018/04/07 00:46:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r0, 0x1) sendto$inet(r0, &(0x7f0000001ac0)='|', 0x1, 0x0, &(0x7f0000001b80)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 65.449182] netlink: 'syz-executor2': attribute type 20 has an invalid length. [ 65.456855] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/07 00:46:02 executing program 6: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffffffffff80, 0x1}, 0x10) close(r1) 2018/04/07 00:46:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) getsockopt$sock_int(r0, 0x1, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 2018/04/07 00:46:02 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d1c2bb63c0bca64d020ca5cd0cf7b50a1110832cae8acf12a589601d6a25740cc54d20c769d18be61ab2e21913eaad467d3ea97f3de0a5b914fa6831e60ee303de907583bf0a0f8b4d47ae55be5b9f6b8", 0x51}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3b03996ff05abb1e8b1c24b50898d8f9ead673923f57eea9c323539f61098a66e70e21c7f41b248343690cde4383c538b179b0f5dcccf6bfaf8031cb052ad74a5a83fadd09955b1676d37e5e45d50697c", 0x51}]) 2018/04/07 00:46:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000e2c000)="73656c696e7578807472757374092e70726f6300c2", 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x3, 0x11, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/07 00:46:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000180)=""/17, 0x11}, {&(0x7f00000001c0)=""/174, 0xae}], 0x2) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/07 00:46:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x81, 0x8001) unshare(0x20000400) clone(0x30020100, &(0x7f00002c9000), &(0x7f0000d70ffc), &(0x7f00001cc000), &(0x7f0000154000)) 2018/04/07 00:46:02 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f00000003c0)=@ethtool_sset_info={0xa}}) [ 66.499072] ================================================================== [ 66.506505] BUG: KMSAN: uninit-value in csum_partial_copy_to_user+0x450/0x500 [ 66.513761] CPU: 1 PID: 5438 Comm: syz-executor5 Not tainted 4.16.0+ #81 [ 66.520577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.529912] Call Trace: [ 66.532493] dump_stack+0x185/0x1d0 [ 66.536119] ? csum_partial_copy_to_user+0x450/0x500 [ 66.541211] kmsan_report+0x142/0x240 [ 66.545004] __msan_warning_32+0x6c/0xb0 [ 66.549052] csum_partial_copy_to_user+0x450/0x500 [ 66.553977] csum_and_copy_to_iter+0x3dc/0x2140 [ 66.558644] ? kmsan_set_origin_inline+0x6b/0x120 [ 66.563469] ? __msan_poison_alloca+0x15c/0x1d0 [ 66.568131] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 66.573223] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 66.578573] udpv6_recvmsg+0xc65/0x29e0 [ 66.582573] ? udp6_lib_lookup_skb+0x240/0x240 [ 66.587143] inet_recvmsg+0x4c2/0x5f0 [ 66.590938] ? inet_sendpage+0x8c0/0x8c0 [ 66.594989] sock_read_iter+0x405/0x480 [ 66.598961] ? kernel_sock_ip_overhead+0x350/0x350 [ 66.603890] do_iter_readv_writev+0x7bb/0x970 [ 66.608376] ? kernel_sock_ip_overhead+0x350/0x350 [ 66.613307] do_iter_read+0x303/0xd70 [ 66.617109] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 66.622553] do_readv+0x295/0x5f0 [ 66.625991] ? syscall_return_slowpath+0xe9/0x700 [ 66.630817] SYSC_readv+0x9b/0xb0 [ 66.634258] SyS_readv+0x56/0x80 [ 66.637619] do_syscall_64+0x309/0x430 [ 66.641504] ? vfs_readv+0x260/0x260 [ 66.645234] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.650412] RIP: 0033:0x455259 [ 66.653588] RSP: 002b:00007f8933a78c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 66.661292] RAX: ffffffffffffffda RBX: 00007f8933a796d4 RCX: 0000000000455259 [ 66.668552] RDX: 0000000000000002 RSI: 0000000020000280 RDI: 0000000000000013 [ 66.675801] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 66.683049] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 66.690307] R13: 000000000000048c R14: 00000000006f9dc0 R15: 0000000000000000 [ 66.697560] [ 66.699170] Uninit was created at: [ 66.702715] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 66.707710] kmsan_alloc_page+0x82/0xe0 [ 66.711679] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 66.716423] alloc_pages_current+0x6b5/0x970 [ 66.720818] skb_page_frag_refill+0x3ba/0x5e0 [ 66.725293] sk_page_frag_refill+0xa4/0x340 [ 66.729599] __ip6_append_data+0x1a20/0x4bb0 [ 66.733987] ip6_append_data+0x40e/0x6b0 [ 66.738039] udpv6_sendmsg+0xfd5/0x45b0 [ 66.742007] inet_sendmsg+0x48d/0x740 [ 66.745804] ___sys_sendmsg+0xec0/0x1310 [ 66.749847] SYSC_sendmsg+0x2a3/0x3d0 [ 66.753631] SyS_sendmsg+0x54/0x80 [ 66.757154] do_syscall_64+0x309/0x430 [ 66.761032] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.766208] ================================================================== [ 66.773548] Disabling lock debugging due to kernel taint [ 66.778974] Kernel panic - not syncing: panic_on_warn set ... [ 66.778974] [ 66.786318] CPU: 1 PID: 5438 Comm: syz-executor5 Tainted: G B 4.16.0+ #81 [ 66.794436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.803769] Call Trace: [ 66.806347] dump_stack+0x185/0x1d0 [ 66.809959] panic+0x39d/0x940 [ 66.813166] ? csum_partial_copy_to_user+0x450/0x500 [ 66.818260] kmsan_report+0x238/0x240 [ 66.822052] __msan_warning_32+0x6c/0xb0 [ 66.826107] csum_partial_copy_to_user+0x450/0x500 [ 66.831037] csum_and_copy_to_iter+0x3dc/0x2140 [ 66.835707] ? kmsan_set_origin_inline+0x6b/0x120 [ 66.840530] ? __msan_poison_alloca+0x15c/0x1d0 [ 66.845189] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 66.850278] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 66.855642] udpv6_recvmsg+0xc65/0x29e0 [ 66.859618] ? udp6_lib_lookup_skb+0x240/0x240 [ 66.864543] inet_recvmsg+0x4c2/0x5f0 [ 66.868336] ? inet_sendpage+0x8c0/0x8c0 [ 66.872376] sock_read_iter+0x405/0x480 [ 66.876336] ? kernel_sock_ip_overhead+0x350/0x350 [ 66.881246] do_iter_readv_writev+0x7bb/0x970 [ 66.885725] ? kernel_sock_ip_overhead+0x350/0x350 [ 66.890634] do_iter_read+0x303/0xd70 [ 66.894415] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 66.899856] do_readv+0x295/0x5f0 [ 66.903316] ? syscall_return_slowpath+0xe9/0x700 [ 66.908157] SYSC_readv+0x9b/0xb0 [ 66.911594] SyS_readv+0x56/0x80 [ 66.915549] do_syscall_64+0x309/0x430 [ 66.919430] ? vfs_readv+0x260/0x260 [ 66.923127] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.928309] RIP: 0033:0x455259 [ 66.931476] RSP: 002b:00007f8933a78c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 66.939162] RAX: ffffffffffffffda RBX: 00007f8933a796d4 RCX: 0000000000455259 [ 66.946410] RDX: 0000000000000002 RSI: 0000000020000280 RDI: 0000000000000013 [ 66.953658] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 66.960915] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 66.968258] R13: 000000000000048c R14: 00000000006f9dc0 R15: 0000000000000000 [ 66.975993] Dumping ftrace buffer: [ 66.979527] (ftrace buffer empty) [ 66.983219] Kernel Offset: disabled [ 66.986832] Rebooting in 86400 seconds..