INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.36' (ECDSA) to the list of known hosts. 2018/04/09 01:39:48 fuzzer started 2018/04/09 01:39:49 dialing manager at 10.128.0.26:40033 2018/04/09 01:39:55 kcov=true, comps=false 2018/04/09 01:39:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000640)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f000009ef58)={{0x80}, "706f7274310000004000000000000000000000d600fffffff0000000000000000000eda4000000000000000700", 0xbfffffffffffffff, 0x2}) readv(r0, &(0x7f0000459000)=[{&(0x7f0000fd5fc3)=""/61, 0x3d}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000a00)) 2018/04/09 01:39:58 executing program 2: r0 = epoll_create1(0x0) ioctl$int_in(r0, 0x5452, &(0x7f000000c000)=0xad9c) 2018/04/09 01:39:58 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000040)={0x2c, 0x1, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x18, 0x8, [@typed={0x14, 0x0, @ipv6}]}]}, 0x2c}, 0x1}, 0x0) 2018/04/09 01:39:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x21) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) 2018/04/09 01:39:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000001180)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000012000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/09 01:39:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000900)=@setlink={0x28, 0x13, 0x301, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MASTER={0x8, 0xa, 0x5}]}, 0x28}, 0x1}, 0x0) 2018/04/09 01:39:58 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x40000000) 2018/04/09 01:39:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f0000000140)) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) syzkaller login: [ 42.690660] ip (3778) used greatest stack depth: 54408 bytes left [ 44.088248] ip (3912) used greatest stack depth: 53656 bytes left [ 45.852204] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.938174] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.963496] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.017708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.222212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.242820] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.268654] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.319186] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.536705] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.782230] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.809719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.866669] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.978713] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.997203] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.038707] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.090907] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.297908] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.304172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.312224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.557816] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.564155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.574893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.610621] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.618108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.642616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.664927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.674458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.688278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.733570] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.759817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.770217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.833601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.839845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.847289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.874645] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.881775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.907608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.953101] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.959316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.968886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.583623] netlink: 'syz-executor7': attribute type 8 has an invalid length. 2018/04/09 01:40:14 executing program 2: recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/58, 0x3a, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x101}, 0x1c) r0 = socket$inet(0x2, 0x0, 0x100000004) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="750000007e3472143679a38e983288937c25719fb6e32e196a566370a4a9355ae2d43a47e4534dcd55d8fc9e34f72451be0b58c1173110caeb6f498e94a03994e493e736067ce69832dfa10f4850ba0b9641da5c12be295c27d437477c83cb4ad58036f3a35991e33a1d0ee9ac0d60459e1e"], &(0x7f0000000080)=0x7d) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000200)={0x9, 0x8, 0x2}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e21, 0x3f, @local={0xfe, 0x80, [], 0xaa}, 0x1f}}, 0x0, 0xffff, 0xd12, 0x7ff, 0x61}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000600)={r4, 0x48, &(0x7f0000000580)=[@in6={0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xe31}, @in6={0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e23, @multicast2=0xe0000002}]}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e24, 0x8, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0xe3b66c3, 0x6, 0x1, 0x20}, 0x98) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000003c0)={{0xa67d, 0x2, 0x7, 0x4, 0x40, 0x7}, 0x6, 0x20, 0x4, 0x40, 0x7, "a86c90b5ee85bce47038b99dbb97288440e0d560e95d61bc5358a30480c61b28799ab5784af44141901eb2b882d8781528022d412e8ea664395d5055a99fbf3d961a264d708e91def0e9184fd23d93d5fac7b565e3062b0e9c3c4c70350933ed1829d43d5a90abdd2615bc22e7448a171a85ea943195eba6574fb07abe21ec6a"}) sendto$inet(r0, &(0x7f00000002c0)="5281b6fc7c5d6c134880730d23950e95d9a8496af32219f67a26dad87857e593410febcbf5d7a6dd7ef6321cd5d3bce986b76b36627abcd9a8b62315720f85635b7d2ff4d3d38f665ab83a2d2d48b6576d93d020d12b256e7350c8e1ccfbda031cdd76d049cba5c81f078182de99f2915a089ed68e3fd774a6aa4528a041d150b3a85d951f3b5c67d95e45d413d6d82736bf9027f672d564775942cc59f79792f2aaf8c5c790c6e4d1bdc8b7f27a73bc9d7afb03b88ca122fde79b423b0a7aee9c94d65b096a132151b31e5b926c5c", 0xcf, 0x0, &(0x7f0000ee9ff0)={0x2, 0xfffffffffffffffc, @multicast2=0xe0000002}, 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 2018/04/09 01:40:14 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000012000)={0x2, 0xfffffffffffffda0, 0xfffffffffffffff5, 0x0, 0xd42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfff}, r0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) request_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='asymmetric\x00', 0xfffffffffffffff8) 2018/04/09 01:40:14 executing program 7: ioctl$EVIOCSFF(0xffffffffffffffff, 0x402c4580, &(0x7f0000000300)={0x0, 0x0, 0x8, {0x0, 0x7f}, {0x1}, @cond=[{0x2, 0x736, 0x1ab, 0x0, 0x5, 0x30}, {0x0, 0x6, 0x4, 0x0, 0x4, 0x2}]}) r0 = syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0x0, 0x40202) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000940)={0x0, 0x101}, &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000009c0)={r1, 0x7, 0xfffffffffffffffc, 0x80000001, 0x3, 0x3f}, 0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={"726f736526000000e7ffffff0000007f"}) rt_sigaction(0x0, &(0x7f0000000540), &(0x7f0000000040), 0xfec4, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="000004940000002db9a5d4e0ca35d04ae0ea800008feff"], &(0x7f0000000100)=0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x5}}, 0x1, 0x1}, &(0x7f00000004c0)=0x88) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000880)={r3, 0xc3ca, 0x7b, "f67f27be438a577acd1134c029aef7ebdac5d64a958890085056ec5a1bfebcfedd622bafd35e56329e1a4414759696be375fa62b22589113585d916744e4863e94c3937f430726a683ec6d35b38698b923d3f4e1321a2338b87740c3af768012118840a8bbf52e25b878b56bbb8acd6254037657a2dc134d0e3837"}, 0x83) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000380)) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000280)=@full, &(0x7f0000000500)=0x3b) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x4, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00') setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000c00)=@nat={'nat\x00', 0x19, 0x5, 0x170, [0x20000640, 0x0, 0x0, 0x20000820, 0x200009c8], 0x0, &(0x7f0000000080), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x5, 0x2e, 0x808, 'ip6gretap0\x00', 'bridge0\x00', 'gre0\x00', 'eql\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff], 0x70, 0x70, 0xe0}}, @common=@nflog={'nflog\x00', 0x4c, {{0xfffffffffffff000, 0x81, 0x10100000, 0x0, 0x0, "53f5f8107e00ef4e478f4f8bc1930456f2a21622302747f5f044b61f70062e2d6d15bcfd7c795092c73f44b0db02d373dd9cf508948aa9bc6b388faa56fdd5f0"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0x1f0) syz_open_procfs(0x0, &(0x7f00002dd000)='comm\x00') pselect6(0x40, &(0x7f0000000180)={0x0, 0x6, 0xffffffffffffff49, 0x3, 0x8, 0x3, 0x28, 0x40}, &(0x7f00000001c0)={0x7fffffff, 0xfffe0000, 0x6, 0x6, 0x5, 0x81, 0x0, 0x3f}, &(0x7f0000000240)={0x4, 0x63, 0x80000000, 0x5, 0x665, 0x0, 0x400, 0x7ff}, &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400)={0x4}, 0x8}) syz_open_procfs(0x0, &(0x7f0000000c80)='projid_map\x00') socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/09 01:40:15 executing program 3: mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) accept$netrom(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 57.177474] ================================================================== [ 57.184904] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 57.190964] CPU: 0 PID: 5060 Comm: syz-executor1 Not tainted 4.16.0+ #82 [ 57.197791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.207134] Call Trace: [ 57.209723] dump_stack+0x185/0x1d0 [ 57.213355] ? vmac_setkey+0x337/0x940 [ 57.217243] kmsan_report+0x142/0x240 [ 57.221043] ? aes_set_key+0x260/0x260 [ 57.224930] __msan_warning_32+0x6c/0xb0 [ 57.228986] ? aes_set_key+0x260/0x260 [ 57.232882] vmac_setkey+0x337/0x940 [ 57.236601] ? vmac_final+0x3f80/0x3f80 [ 57.240576] shash_async_setkey+0x337/0x4c0 [ 57.244899] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 57.250267] ? trace_kmalloc+0xb6/0x2b0 [ 57.254338] ? shash_async_digest+0x1b0/0x1b0 [ 57.258834] crypto_ahash_setkey+0x31a/0x470 [ 57.263246] hash_setkey+0x8b/0xa0 [ 57.266782] alg_setsockopt+0x6c5/0x740 [ 57.270753] ? hash_release+0x50/0x50 [ 57.274548] ? alg_accept+0xd0/0xd0 [ 57.278179] SYSC_setsockopt+0x4b8/0x570 [ 57.282247] SyS_setsockopt+0x76/0xa0 [ 57.286053] do_syscall_64+0x309/0x430 [ 57.289942] ? SYSC_recv+0xe0/0xe0 [ 57.293487] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 57.298670] RIP: 0033:0x455259 [ 57.301852] RSP: 002b:00007f50aeb71c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 57.309558] RAX: ffffffffffffffda RBX: 00007f50aeb726d4 RCX: 0000000000455259 [ 57.316818] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 57.324084] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 57.331350] R10: 0000000020000040 R11: 0000000000000246 R12: 00000000ffffffff [ 57.338611] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 57.345878] [ 57.347506] Local variable description: ----out.i@vmac_setkey [ 57.353380] Variable was created at: [ 57.357100] vmac_setkey+0x93/0x940 [ 57.360723] shash_async_setkey+0x337/0x4c0 [ 57.365032] ================================================================== [ 57.372376] Disabling lock debugging due to kernel taint [ 57.377816] Kernel panic - not syncing: panic_on_warn set ... [ 57.377816] [ 57.385179] CPU: 0 PID: 5060 Comm: syz-executor1 Tainted: G B 4.16.0+ #82 [ 57.393311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.402658] Call Trace: [ 57.405247] dump_stack+0x185/0x1d0 [ 57.408884] panic+0x39d/0x940 [ 57.412098] ? vmac_setkey+0x337/0x940 [ 57.415982] kmsan_report+0x238/0x240 [ 57.419788] ? aes_set_key+0x260/0x260 [ 57.423676] __msan_warning_32+0x6c/0xb0 [ 57.427735] ? aes_set_key+0x260/0x260 [ 57.431635] vmac_setkey+0x337/0x940 [ 57.435375] ? vmac_final+0x3f80/0x3f80 [ 57.439345] shash_async_setkey+0x337/0x4c0 [ 57.443666] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 57.449035] ? trace_kmalloc+0xb6/0x2b0 [ 57.453010] ? shash_async_digest+0x1b0/0x1b0 [ 57.457506] crypto_ahash_setkey+0x31a/0x470 [ 57.461915] hash_setkey+0x8b/0xa0 [ 57.465456] alg_setsockopt+0x6c5/0x740 [ 57.469428] ? hash_release+0x50/0x50 [ 57.473246] ? alg_accept+0xd0/0xd0 [ 57.476897] SYSC_setsockopt+0x4b8/0x570 [ 57.480963] SyS_setsockopt+0x76/0xa0 [ 57.484767] do_syscall_64+0x309/0x430 [ 57.488657] ? SYSC_recv+0xe0/0xe0 [ 57.492201] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 57.497384] RIP: 0033:0x455259 [ 57.500563] RSP: 002b:00007f50aeb71c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 57.508266] RAX: ffffffffffffffda RBX: 00007f50aeb726d4 RCX: 0000000000455259 [ 57.515531] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 2018/04/09 01:40:15 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340)="c3", 0x1) ftruncate(r0, 0x7fff) 2018/04/09 01:40:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x80000) openat(r2, &(0x7f0000000040)='./file0\x00', 0x24000, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) sendmsg$unix(r1, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=ANY=[@ANYBLOB="1000000000f7ffff000000000100001b"], 0x10}, 0x0) 2018/04/09 01:40:15 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) creat(&(0x7f0000000080)='./control/file0\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) syslog(0x0, &(0x7f0000000100)=""/51, 0x33) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000200)='./file1\x00', &(0x7f00000001c0)='./file0\x00') dup2(r1, r0) 2018/04/09 01:40:15 executing program 5: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) fcntl$addseals(r0, 0x409, 0x6) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000140)={{0x3, 0x0, 0x3, 0x3, 0x3}, 0x2, 0x1, 'id1\x00', 'timer0\x00', 0x0, 0x10001, 0x6, 0x4, 0x8000}) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="ec253b4072b948e9af13c746f30b7a4f981d9983b62c0b3873de5e7721574ba39328ecb13f2721a23a3847947493118236304d7603c21b59193f93a89bd34cb9dd77ed899b6b6eb51c575470cbee31adb6dc0d6704183466f8a7c71dfa45fd877086a70e", 0x64) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f0000000240)='ns/pid\x00') [ 57.522797] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 57.530065] R10: 0000000020000040 R11: 0000000000000246 R12: 00000000ffffffff [ 57.537329] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 57.545032] Dumping ftrace buffer: [ 57.548546] (ftrace buffer empty) [ 57.552231] Kernel Offset: disabled [ 57.555833] Rebooting in 86400 seconds..