INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.56' (ECDSA) to the list of known hosts. 2018/04/06 23:05:45 fuzzer started 2018/04/06 23:05:46 dialing manager at 10.128.0.26:38639 2018/04/06 23:05:52 kcov=true, comps=false 2018/04/06 23:05:55 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000aa0000)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x4) 2018/04/06 23:05:55 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x38, 0x0, 0x0, "adc52032af7f4a5fb1c8f92558c41b1544a504268592d401f02a91741fe7290f95f912d4f747"}], 0x38}, 0x3}], 0x2, 0x0) 2018/04/06 23:05:55 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000002400)=[{{&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000380)="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", 0x2e7}], 0x1, &(0x7f0000002980)=ANY=[]}}], 0x1, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/11, 0xffffffe4, 0x0, 0x0, 0x1fcf746312db7317) shutdown(r0, 0x1) 2018/04/06 23:05:55 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "a7fbe63d3bba6b7edf5134d78e1707b65f6bbc2e01b6dc1d36716323284d4709b4ed5a0f20bdcf78e1e5f489145f967b86c60c5246b450bc0dc3cbdca9cafc"}, 0x58, &(0x7f00000003c0)=[{&(0x7f0000000000)="8a953c3dd63325ac68b212b6f7ed44", 0xf}], 0x1}, 0x0) r0 = socket$inet(0x2, 0x3, 0x84) sendto$inet(r0, &(0x7f0000000000), 0x1c, 0x0, &(0x7f00000000c0)={0x2}, 0x10) 2018/04/06 23:05:55 executing program 2: clock_gettime(0x4, &(0x7f0000000080)) 2018/04/06 23:05:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)={0x0, 0xffffffff, 0x0, 0x3, 0x7f}) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2018/04/06 23:05:55 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/06 23:05:55 executing program 6: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) syzkaller login: [ 42.873184] ip (3763) used greatest stack depth: 54680 bytes left [ 42.978473] ip (3772) used greatest stack depth: 54672 bytes left [ 43.423843] ip (3814) used greatest stack depth: 54312 bytes left [ 44.485726] ip (3917) used greatest stack depth: 54200 bytes left [ 46.427904] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.528120] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.618253] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.684482] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.710323] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.729612] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.738154] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.904172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.655846] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.672273] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.688838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.728443] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.879590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.917335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.067403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.116776] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.476414] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.482832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.495351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.528283] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.553286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.583274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.614739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.629932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.647466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.679423] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.686907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.717892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.749066] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.758358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.773669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.799108] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.807808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.827759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.910672] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.917010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.928114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.062221] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.068569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.080109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/06 23:06:12 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='ns/mnt\x00') 2018/04/06 23:06:12 executing program 6: openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000bcafe0), 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ppoll(&(0x7f00004e8000)=[{r0}], 0x1, &(0x7f00009ffff5)={0x0, r1}, &(0x7f00007ceff8), 0x8) ioctl$TIOCSBRK(r0, 0x40044591) 2018/04/06 23:06:13 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/06 23:06:13 executing program 3: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) pipe2(&(0x7f0000001ff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f00003ba000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(r1, &(0x7f0000b1d000)=[{&(0x7f0000005fe3)}], 0x1, 0x0) close(r0) 2018/04/06 23:06:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./file1\x00', 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) pwrite64(r1, &(0x7f0000000c00)="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", 0x600, 0x0) 2018/04/06 23:06:13 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x38, 0x0, 0x0, "adc52032af7f4a5fb1c8f92558c41b1544a504268592d401f02a91741fe7290f95f912d4f747"}], 0x38}, 0x3}], 0x2, 0x0) 2018/04/06 23:06:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x7a) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/06 23:06:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8912, &(0x7f0000000180)) 2018/04/06 23:06:13 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)=[{0xc, 0x29, 0x2}], 0xc}}], 0x2, 0x0) 2018/04/06 23:06:13 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000002400)=[{{&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000380)="2ba0074f912a73be70b9f48391dc419c8bce9208287fee18326b3485ed8aed5e840717e6d2256403d5f6b1e1a460b793c032618c35b1514fd60406e7a0259e5da0b071289cff57b38eb649c47f0c4b2b1893feba998fabdaf220f9e08390c4a2ee3c4f9eb7643c8a8be2e4fd4108c8a2efd1494331cf0c647a60469394627450d8780406a9e3163134b83fb38cec572fd43cdcf86a2ae0880a95f4b8b42f62334551efe06155f6207cd2823c63922690691897a3caa55d271968f8ae41d2ad631f259d7db0ce36c11f9638f065bcc8d0a63f7edceaf11d3defeefca3389548f6d0a5e27fdafcae0d7b4a0d750ff047ee14f75e124c152cd2825417ad397f652b786bfa1650ea63d295713c5cc4d838462abcb3a4bb3104740da9af089530a447a7fc615da3568bcb9f8dfb4934203b62445e754426b5ef2b989537298b203e08283f19f209c7648135fcf51b53c2ca80020250ba5f2ec206e3c4b0c259741803ecf63dc3af6f8650cba01746e2b58b3981c1da090be853e95560f1d06b80e00e68cff098d06d993ec789c8d91784b9e83710be311ea559992a511fc950248654bf971eb28596a17afe1239c02db20768209e5d25adecd9d837aa6410139dd03079d8ac1a92601a633b107a8a54e0ac9df2ae95ae486debe0e3e8703a7c6a8b3cb7784d533c3a1e8dcf6447f1bcdf10c66f71b30a0725db93e5ace137b7b537b53c28505c3c3a6868189065f1ffdb53318cb4a1c285800c66b97a56abc7c100976f26a8a910fd3ae3060a4a742342ca5f3e06ab21c2f2d65753e254cb7833ab6b0e4b2773a3c3de79f3c8b3370945c24d79c0eca4002034a0d594b08d24e111f6200951e1e5d2ed33bfd747419f9a11a3d27fff66429d87b8bb002504d1d014104099a8ad2f6feb29df064295302214a141ca5b254a21bd7042ce7069feb5e15998a9385b307558e75073169ed69c509fe7be52b7413170939bf7f2bc50f255f5a46f3c1589e97665ba1ba8a519dc3fbf02c21cdee99ec595c381a40fedc9318515f7b43e915f9e", 0x2e7}], 0x1, &(0x7f0000002980)=ANY=[]}}], 0x1, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/11, 0xffffffe4, 0x0, 0x0, 0x1fcf746312db7317) shutdown(r0, 0x1) 2018/04/06 23:06:13 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000001c0)="24000000210025f0071c0165ff0ffc0e020000000010000002e1000c08000b0000000000", 0x24) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1badc0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}]}) getpeername$packet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bcsh0\x00', r1}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x121080, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000680), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000700)=ANY=[@ANYBLOB="61e49956c4e7b08f4a76b0e1ced46fcdc9dc2f8b06855bf27c9a95bc5efb2d5d486e6993e8ae285d87901d9fa350ba9dc8163e0bdf92b1cfb7c3c756ce49b670d49103af5ef064c400e10cdb1977f07ca0595a40fdd70006909e5cea5e1be61660d1b5255b1b6e3f316604d8b6d4033e46d32772619ea8e73441e1a178958e0e7a43a17a33f40c949eb8a885462dc9e64f58ddfb71d682b599063035833892b2a3a0aa2348dd519d1c45fcee54bc35bb319f52f0e29bdf917e77ef47f1376adf49877d4ad8fd6783"], &(0x7f0000000040)=0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0xfffffffffffff794, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000600)={'bond0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x4}, 0x8) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000009c0)={@l2={0x1f, 0x3, {0x6f, 0x7, 0x75, 0x9, 0xffff}, 0x0, 0xfff}, {&(0x7f0000000880)=""/201, 0xc9}, &(0x7f0000000980), 0x5}, 0x9c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@empty, 0x62, 0x2, 0xff, 0xc, 0x8, 0x10000, 0x80000000}, &(0x7f0000000240)=0x20) 2018/04/06 23:06:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0), 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/06 23:06:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/04/06 23:06:13 executing program 2: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@ipv6_newaddr={0x34, 0x14, 0x3, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, @IFA_FLAGS={0x8, 0x8, 0x402}]}, 0x34}, 0x1}, 0x0) 2018/04/06 23:06:14 executing program 5: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000000)="0004", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/06 23:06:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89ff, &(0x7f0000000140)={'ip6gre0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/06 23:06:14 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000001c0)="24000000210025f0071c0165ff0ffc0e020000000010000002e1000c08000b0000000000", 0x24) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1badc0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}]}) getpeername$packet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bcsh0\x00', r1}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x121080, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000680), &(0x7f00000006c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000700)=ANY=[@ANYBLOB="61e49956c4e7b08f4a76b0e1ced46fcdc9dc2f8b06855bf27c9a95bc5efb2d5d486e6993e8ae285d87901d9fa350ba9dc8163e0bdf92b1cfb7c3c756ce49b670d49103af5ef064c400e10cdb1977f07ca0595a40fdd70006909e5cea5e1be61660d1b5255b1b6e3f316604d8b6d4033e46d32772619ea8e73441e1a178958e0e7a43a17a33f40c949eb8a885462dc9e64f58ddfb71d682b599063035833892b2a3a0aa2348dd519d1c45fcee54bc35bb319f52f0e29bdf917e77ef47f1376adf49877d4ad8fd6783"], &(0x7f0000000040)=0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0xfffffffffffff794, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000600)={'bond0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x4}, 0x8) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000009c0)={@l2={0x1f, 0x3, {0x6f, 0x7, 0x75, 0x9, 0xffff}, 0x0, 0xfff}, {&(0x7f0000000880)=""/201, 0xc9}, &(0x7f0000000980), 0x5}, 0x9c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@empty, 0x62, 0x2, 0xff, 0xc, 0x8, 0x10000, 0x80000000}, &(0x7f0000000240)=0x20) 2018/04/06 23:06:14 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x4) r1 = dup2(r0, r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)) 2018/04/06 23:06:14 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='bridge0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_mr_cache\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffff8, 0x3, 0x7}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x904e, 0x208}, &(0x7f0000000740)=0x90) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000300), r2, &(0x7f00000003c0), 0x812, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x26, &(0x7f0000000140)={@multicast2=0xe0000002, @multicast2=0xe0000002, r4}, 0xc) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x0, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718", 0x3d}, 0x60) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) 2018/04/06 23:06:14 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/04/06 23:06:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa}, 0x0, [0x3]}, 0x5c) 2018/04/06 23:06:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0), 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/06 23:06:14 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) ppoll(&(0x7f00004e8000), 0x0, &(0x7f00009ffff5), &(0x7f00007ceff8), 0x8) ioctl$TIOCSBRK(r0, 0x40044591) 2018/04/06 23:06:14 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000500)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="534db437d1e3ff0aeecd9ddeee035813fe38e8d96eda205050093f71ae6fa359b511ffb95f1ec1d6ddef66e825316759e698cae9cce643a927af854ee5b9ab1958831b0a", 0x44}], 0x1, &(0x7f0000000240)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000002c40)=[{{&(0x7f0000002500)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x10, &(0x7f0000002b40)=[{&(0x7f0000002ac0)=""/67, 0x43}], 0x1, &(0x7f0000002bc0)=""/114, 0x72}}], 0x1, 0x0, &(0x7f0000002d40)) 2018/04/06 23:06:14 executing program 4: r0 = socket(0x400000010, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000001680)={&(0x7f0000000000)=@ax25={0x3, {"3c39772317e506"}}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000000040)="c1bd3544520cc1a9e886c18700a638e5c933", 0x12}, {&(0x7f0000000140)="7dff5414d29445e627a5fb5ee2e65b766f7b6dda66f2565722897fa1b7b6f929a98b7fdca7ad726895b678770bf419ac39ad2e85e1ee125712b12ca16d6403f1e5", 0x41}, {&(0x7f00000002c0)}, {&(0x7f00000013c0)="02b39f4c879c85bf483abb1ef45549b23d1815c7a122f81c1976fff4233f6c5f03f705c64e636ee476e905eabb686dceef1355975a85643b3dc5060b0022b465602abdcea0ddf0bff847ce412341a52fdd960840f89fe7c78b93a4afc01c13b27322b649225d3a5c3be204801d10c5662bc2fb85c7b269fbcdef3a38af60b3da7eeb4e85a200a10ac40f8936daaf91f72245d7ec2970d5aac64888f52cadf5e350104c4081c087a6f56e7b3c6f961225f317434df6e7aad0f810e7f620bcc9c224e59c28db975c974e99f47ba7830e6e971b2dd66262338dcd43adf281e33a2e922b05f3b1e1", 0xe6}, {&(0x7f0000001580)="e08784b082df610a", 0x8}], 0x5, 0x0, 0x0, 0x4084}, 0x12002) write(r0, &(0x7f00002da000)="260000005e0009fff18500002400000700000000000000fff3000008004665000002fb4b35ea", 0x26) read(r0, &(0x7f00005a2f17)=""/233, 0xe9) 2018/04/06 23:06:14 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x4e20, 0x4e20, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/06 23:06:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0), 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/06 23:06:14 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='bridge0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_mr_cache\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffff8, 0x3, 0x7}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x904e, 0x208}, &(0x7f0000000740)=0x90) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000300), r2, &(0x7f00000003c0), 0x812, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x26, &(0x7f0000000140)={@multicast2=0xe0000002, @multicast2=0xe0000002, r4}, 0xc) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x0, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718", 0x3d}, 0x60) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) 2018/04/06 23:06:14 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='bridge0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_mr_cache\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffff8, 0x3, 0x7}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x904e, 0x208}, &(0x7f0000000740)=0x90) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000300), r2, &(0x7f00000003c0), 0x812, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x26, &(0x7f0000000140)={@multicast2=0xe0000002, @multicast2=0xe0000002, r4}, 0xc) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x0, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718", 0x3d}, 0x60) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) 2018/04/06 23:06:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl(r0, 0x4000000002283, &(0x7f0000139000)='4') readv(r0, &(0x7f0000cc0f90)=[{&(0x7f0000a8efed)=""/19, 0x42}], 0x1) write$evdev(r0, &(0x7f0000000080)=[{}, {}, {{0x0, 0x2710}}, {{0x77359400}}], 0x60) 2018/04/06 23:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x97ffffff}]}, 0x38}, 0x1}, 0x0) 2018/04/06 23:06:15 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x4e20, 0x4e20, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/06 23:06:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_aout(r1, &(0x7f00000005c0), 0x20) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/06 23:06:15 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000500)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="534db437d1e3ff0aeecd9ddeee035813fe38e8d96eda205050093f71ae6fa359b511ffb95f1ec1d6ddef66e825316759e698cae9cce643a927af854ee5b9ab1958831b0a", 0x44}], 0x1, &(0x7f0000000240)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000002c40)=[{{&(0x7f0000002500)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x10, &(0x7f0000002b40)=[{&(0x7f0000002ac0)=""/67, 0x43}], 0x1, &(0x7f0000002bc0)=""/114, 0x72}}], 0x1, 0x0, &(0x7f0000002d40)) 2018/04/06 23:06:15 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000500)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="534db437d1e3ff0aeecd9ddeee035813fe38e8d96eda205050093f71ae6fa359b511ffb95f1ec1d6ddef66e825316759e698cae9cce643a927af854ee5b9ab1958831b0a", 0x44}], 0x1, &(0x7f0000000240)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000002c40)=[{{&(0x7f0000002500)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x10, &(0x7f0000002b40)=[{&(0x7f0000002ac0)=""/67, 0x43}], 0x1, &(0x7f0000002bc0)=""/114, 0x72}}], 0x1, 0x0, &(0x7f0000002d40)) 2018/04/06 23:06:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1}, 0x10) 2018/04/06 23:06:15 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000011c0)="260000002200470105207e1effffffff0000000000a8efc61f2424d50e7f0c14986af24a3b32ed", 0x27) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144a000ae9", 0x12, 0x0, 0x0, 0x0) 2018/04/06 23:06:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x93) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/06 23:06:15 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x4e20, 0x4e20, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/06 23:06:15 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x7, 0x6, 0x484]}, 0xa) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/04/06 23:06:15 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000000)=""/28}) 2018/04/06 23:06:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f74fc8)={0x0, 0x0, &(0x7f00007e0ff0), 0x0, &(0x7f00005e2fd0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000300)=""/34, 0x22}], 0x1) 2018/04/06 23:06:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x84) dup2(r1, r0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) 2018/04/06 23:06:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/06 23:06:15 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x4e20, 0x4e20, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/06 23:06:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) [ 60.956864] ================================================================== [ 60.964282] BUG: KMSAN: uninit-value in gf128mul_init_4k_lle+0x212/0x5c0 [ 60.971130] CPU: 0 PID: 5245 Comm: syz-executor5 Not tainted 4.16.0+ #81 [ 60.977964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.987316] Call Trace: [ 60.989910] dump_stack+0x185/0x1d0 [ 60.993540] ? gf128mul_init_4k_lle+0x212/0x5c0 [ 60.998211] kmsan_report+0x142/0x240 [ 61.002015] __msan_warning_32+0x6c/0xb0 [ 61.006081] gf128mul_init_4k_lle+0x212/0x5c0 [ 61.010589] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 61.015956] ? ghash_setkey+0x56/0x280 [ 61.019843] ghash_setkey+0x185/0x280 [ 61.023647] ? ghash_final+0x1f0/0x1f0 [ 61.027535] shash_async_setkey+0x337/0x4c0 [ 61.031864] ? shash_async_digest+0x1b0/0x1b0 [ 61.036366] crypto_ahash_setkey+0x31a/0x470 [ 61.040774] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 61.045968] crypto_gcm_setkey+0xa3c/0xc10 [ 61.050210] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 61.054616] crypto_aead_setkey+0x373/0x4c0 [ 61.058942] aead_setkey+0xa0/0xc0 [ 61.062483] alg_setsockopt+0x6c5/0x740 [ 61.066458] ? aead_release+0x90/0x90 [ 61.070259] ? alg_accept+0xd0/0xd0 [ 61.073888] SYSC_setsockopt+0x4b8/0x570 [ 61.077956] SyS_setsockopt+0x76/0xa0 [ 61.081755] do_syscall_64+0x309/0x430 [ 61.085650] ? SYSC_recv+0xe0/0xe0 [ 61.089196] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.094382] RIP: 0033:0x455259 [ 61.097570] RSP: 002b:00007f330a9dcc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 61.105279] RAX: ffffffffffffffda RBX: 00007f330a9dd6d4 RCX: 0000000000455259 [ 61.112545] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 61.119815] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 61.127081] R10: 0000000020000240 R11: 0000000000000246 R12: 00000000ffffffff [ 61.134354] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 61.141623] [ 61.143246] Uninit was stored to memory at: [ 61.147575] kmsan_internal_chain_origin+0x12b/0x210 [ 61.152679] kmsan_memcpy_origins+0x11d/0x170 [ 61.157181] __msan_memcpy+0x19f/0x1f0 [ 61.161074] gf128mul_init_4k_lle+0x99/0x5c0 [ 61.165486] ghash_setkey+0x185/0x280 [ 61.169293] shash_async_setkey+0x337/0x4c0 [ 61.173617] crypto_ahash_setkey+0x31a/0x470 [ 61.178034] crypto_gcm_setkey+0xa3c/0xc10 [ 61.182276] crypto_aead_setkey+0x373/0x4c0 [ 61.186590] aead_setkey+0xa0/0xc0 [ 61.190115] alg_setsockopt+0x6c5/0x740 [ 61.194077] SYSC_setsockopt+0x4b8/0x570 [ 61.198131] SyS_setsockopt+0x76/0xa0 [ 61.201923] do_syscall_64+0x309/0x430 [ 61.205797] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.210964] Uninit was stored to memory at: [ 61.215267] kmsan_internal_chain_origin+0x12b/0x210 [ 61.220347] __msan_chain_origin+0x69/0xc0 [ 61.224568] __crypto_xor+0x23c/0x16b0 [ 61.228448] crypto_ctr_crypt_inplace+0x29a/0x3a0 [ 61.233288] crypto_ctr_crypt+0x54c/0x7d0 [ 61.237423] skcipher_encrypt_blkcipher+0x222/0x320 [ 61.242439] crypto_gcm_setkey+0x6a3/0xc10 [ 61.246654] crypto_aead_setkey+0x373/0x4c0 [ 61.250952] aead_setkey+0xa0/0xc0 [ 61.254475] alg_setsockopt+0x6c5/0x740 [ 61.258433] SYSC_setsockopt+0x4b8/0x570 [ 61.262477] SyS_setsockopt+0x76/0xa0 [ 61.266261] do_syscall_64+0x309/0x430 [ 61.270143] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.275314] Local variable description: ----vla@crypto_ctr_crypt_inplace [ 61.282142] Variable was created at: [ 61.285846] crypto_ctr_crypt_inplace+0x19a/0x3a0 [ 61.290663] crypto_ctr_crypt+0x54c/0x7d0 [ 61.294781] ================================================================== [ 61.302121] Disabling lock debugging due to kernel taint [ 61.307545] Kernel panic - not syncing: panic_on_warn set ... [ 61.307545] [ 61.314889] CPU: 0 PID: 5245 Comm: syz-executor5 Tainted: G B 4.16.0+ #81 [ 61.323009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.332358] Call Trace: [ 61.334955] dump_stack+0x185/0x1d0 [ 61.338568] panic+0x39d/0x940 [ 61.341754] ? gf128mul_init_4k_lle+0x212/0x5c0 [ 61.346404] kmsan_report+0x238/0x240 [ 61.350188] __msan_warning_32+0x6c/0xb0 [ 61.354229] gf128mul_init_4k_lle+0x212/0x5c0 [ 61.358707] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 61.364059] ? ghash_setkey+0x56/0x280 [ 61.367933] ghash_setkey+0x185/0x280 [ 61.371712] ? ghash_final+0x1f0/0x1f0 [ 61.375587] shash_async_setkey+0x337/0x4c0 [ 61.379904] ? shash_async_digest+0x1b0/0x1b0 [ 61.384380] crypto_ahash_setkey+0x31a/0x470 [ 61.388782] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 61.393954] crypto_gcm_setkey+0xa3c/0xc10 [ 61.398184] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 61.402579] crypto_aead_setkey+0x373/0x4c0 [ 61.406883] aead_setkey+0xa0/0xc0 [ 61.410401] alg_setsockopt+0x6c5/0x740 [ 61.414355] ? aead_release+0x90/0x90 [ 61.418141] ? alg_accept+0xd0/0xd0 [ 61.421751] SYSC_setsockopt+0x4b8/0x570 [ 61.425806] SyS_setsockopt+0x76/0xa0 [ 61.429595] do_syscall_64+0x309/0x430 [ 61.433461] ? SYSC_recv+0xe0/0xe0 [ 61.436995] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.442183] RIP: 0033:0x455259 [ 61.445348] RSP: 002b:00007f330a9dcc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 61.453043] RAX: ffffffffffffffda RBX: 00007f330a9dd6d4 RCX: 0000000000455259 [ 61.460303] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 61.467556] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 61.474814] R10: 0000000020000240 R11: 0000000000000246 R12: 00000000ffffffff [ 61.482070] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 61.489798] Dumping ftrace buffer: [ 61.493324] (ftrace buffer empty) [ 61.497005] Kernel Offset: disabled [ 61.500607] Rebooting in 86400 seconds..