INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.9' (ECDSA) to the list of known hosts. 2018/04/10 18:53:40 fuzzer started 2018/04/10 18:53:40 dialing manager at 10.128.0.26:40599 2018/04/10 18:53:46 kcov=true, comps=false 2018/04/10 18:53:49 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 18:53:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000337ff2)='timers\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f000036b000)=""/100, 0x64}], 0x1, 0x0) 2018/04/10 18:53:49 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x21, 0x8aff, 0x0, 0x0, {0x2}, [@nested={0x8, 0x1, [@typed={0x4, 0x0, @binary}]}]}, 0x1c}, 0x1}, 0x0) 2018/04/10 18:53:49 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x78, 0xfffffffffffffff5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000b3d000)={0x0, 0x30, 0x0, @thr={&(0x7f000022f000), &(0x7f0000298000)}}, &(0x7f0000a7e000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000d9efe0)={{0x0, 0x1c9c380}}, &(0x7f0000ef9fe0)) 2018/04/10 18:53:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:53:49 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)="e5", 0x1}], 0x1, &(0x7f0000000280)}, 0x0) 2018/04/10 18:53:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/10 18:53:49 executing program 6: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) syzkaller login: [ 41.090546] ip (3751) used greatest stack depth: 54672 bytes left [ 41.476982] ip (3785) used greatest stack depth: 54408 bytes left [ 41.521909] ip (3788) used greatest stack depth: 54312 bytes left [ 42.903158] ip (3917) used greatest stack depth: 54296 bytes left [ 43.757658] ip (3989) used greatest stack depth: 54232 bytes left [ 44.613718] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.792423] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.818894] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.965183] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.048153] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.119704] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.279339] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.316430] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.780845] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.885860] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.994621] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.050883] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.126815] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.306860] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.542990] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.549368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.559613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.587762] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.597777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.606872] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.613237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.630627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.823421] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.829736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.840835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.873756] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.885199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.903810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.950974] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.963531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.994818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.140305] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.147241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.154809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.323684] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.330129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.344643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.405997] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.412335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.422238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/10 18:54:06 executing program 1: mkdir(&(0x7f000080aff8)='./file0\x00', 0x0) 2018/04/10 18:54:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/10 18:54:08 executing program 2: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x2, 0xeff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/171}, 0x18) 2018/04/10 18:54:08 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001440)=@broute={'broute\x00', 0x20, 0x2, 0x2a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001180], 0x0, &(0x7f00000000c0), &(0x7f0000001180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'ipddp0\x00', 'vcan0\x00', 'ip_vti0\x00', 'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xf0, 0x140}, [@common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffc}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {{{0x5, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'ifb0\x00', 'dummy0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xa0, 0xd8}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x320) 2018/04/10 18:54:08 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8000001) 2018/04/10 18:54:08 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000140)=@in={0x2}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000800)}, 0x2044ffe0) 2018/04/10 18:54:08 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) r0 = socket$kcm(0xa, 0x200000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8931, &(0x7f00000000c0)) 2018/04/10 18:54:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/10 18:54:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:08 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xcb}, 0xffffffffffffff38) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fffffffefff, 0x7fffffffefc0, 0x705000, &(0x7f0000000000)) 2018/04/10 18:54:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340a14b80040d8c560a0600000000e076000543d8d8fe5800000024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f00100001000a04082214abdd0500000000", 0x58}], 0x1) 2018/04/10 18:54:08 executing program 6: r0 = socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x80, &(0x7f0000001300), 0x113, &(0x7f0000001480)}, 0x0) 2018/04/10 18:54:08 executing program 4: 2018/04/10 18:54:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:09 executing program 2: 2018/04/10 18:54:09 executing program 4: 2018/04/10 18:54:09 executing program 6: 2018/04/10 18:54:09 executing program 7: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001440)=@broute={'broute\x00', 0x20, 0x2, 0x2a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001180], 0x0, &(0x7f00000000c0), &(0x7f0000001180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'ipddp0\x00', 'vcan0\x00', 'ip_vti0\x00', 'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xf0, 0x140}, [@common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffc}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x5d}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {{{0x5, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'ifb0\x00', 'dummy0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xa0, 0xd8}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x320) 2018/04/10 18:54:09 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001440)=@broute={'broute\x00', 0x20, 0x2, 0x2a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001180], 0x0, &(0x7f00000000c0), &(0x7f0000001180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'ipddp0\x00', 'vcan0\x00', 'ip_vti0\x00', 'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xf0, 0x140}, [@common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffc}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x5d}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {{{0x5, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'ifb0\x00', 'dummy0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xa0, 0xd8}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x320) 2018/04/10 18:54:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/10 18:54:09 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000a0}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7, 0x6f2000, 0x1, &(0x7f0000000000)) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@ipx, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000140)=""/151, 0x97}, 0x0) 2018/04/10 18:54:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8940, &(0x7f0000000080)=0x1) 2018/04/10 18:54:09 executing program 4: 2018/04/10 18:54:09 executing program 2: 2018/04/10 18:54:09 executing program 0: 2018/04/10 18:54:09 executing program 1: 2018/04/10 18:54:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:09 executing program 7: 2018/04/10 18:54:09 executing program 4: 2018/04/10 18:54:09 executing program 2: 2018/04/10 18:54:09 executing program 6: 2018/04/10 18:54:09 executing program 1: 2018/04/10 18:54:10 executing program 0: 2018/04/10 18:54:10 executing program 7: 2018/04/10 18:54:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:10 executing program 4: 2018/04/10 18:54:10 executing program 2: 2018/04/10 18:54:10 executing program 1: 2018/04/10 18:54:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/10 18:54:10 executing program 6: 2018/04/10 18:54:10 executing program 1: 2018/04/10 18:54:10 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0x1000, 0x100000002) 2018/04/10 18:54:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) write(r0, &(0x7f0000000100)="00c73e12eac4469eec0e89a468230272a001580ea2bc9d6e0100000000002fcc5f", 0x21) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5412, &(0x7f00000000c0)={0x17}) 2018/04/10 18:54:10 executing program 6: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000100)=ANY=[], 0x1023c) 2018/04/10 18:54:10 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x83, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 2018/04/10 18:54:10 executing program 7: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000775000)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') pread64(r0, &(0x7f00009f3000), 0x352, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300), &(0x7f0000000500), 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 2018/04/10 18:54:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:11 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000002c0)) 2018/04/10 18:54:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 18:54:11 executing program 6: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000005c0)="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") 2018/04/10 18:54:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/255, 0xff}], 0x1, 0x20000000) 2018/04/10 18:54:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000540)=""/111, 0x6f}], 0x1) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f0000000080)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 2018/04/10 18:54:11 executing program 7: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) clock_settime(0x0, &(0x7f0000000100)={0x77359400}) 2018/04/10 18:54:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) 2018/04/10 18:54:11 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1=0xe0000001]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:11 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x14, r1, 0x707, 0x0, 0x0, {0xb}}, 0x14}, 0x1}, 0x0) 2018/04/10 18:54:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004a40)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000004a00)={&(0x7f0000000800)=@getlink={0x28, 0x12, 0x5, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0xe}]}, 0x28}, 0x1}, 0x0) 2018/04/10 18:54:11 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6d0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000700)={0x0, 0x0, 0x30}, 0xc) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) write$binfmt_aout(r0, &(0x7f0000000740)={{}, "", [[], [], [], [], []]}, 0x520) write$binfmt_script(r0, &(0x7f0000001740)={'#! ', './file0', [], 0xa, "fad196b28adea6c60370842ef8e65823162d7fe4ba8de812139e7b1cfb4228ce3059d471e4e23e45b8c7c3f4dca14d3831b94a45868773295d57d53309ea0a3454d91cf51bbb657a1146ff16a0843e8d4c6774f6a24ac30b7cf69b95de5cedfd503d0e441b641e959a16f566169219e464cf7a5ae452f9d99464d0353ba13d8677a3a4607cf54e49cc2f277adc5c299d16c185117f10a5a3ce65bb5d7e2f06b648d33821ce6ca058355a4578bb12f3a2b371ca625a82deb7f4b7190f5322ded4285232f70f963fd94927db1d201437b6a1c15dca28982b156b4922b945ceefc6ad373d74210538a31758037311730dbffc196774c7c6f1d91ff0f9957378f72a4bef5675f0ad55bcc1ad746353e31c0b8619a3502274980b218f5c6203f63d5221c740ed7c7821c44f3ed18f4e4eefd3f1f406e94a690c968bc919d5b9f4bbe75ab9e46d8f79ee35b4c98437eaf110404dbe33be69d6d8d8855d6fc72b1da2ca9e2ee62ea4fbc319efe27a32d3019cbadf87d2ad8bdde63b53fe0300014710defcf34bca8b88d1f24ae6e067c30e6d364ca6b6dbad03fcfaf41a8a24e9c0be9bf9d27ebfa2f8ccf4c6bb52759281a335d6d921d218f02139a09eec53ed899cdfc83e82175774968c3730b933bdd0d54dd06c8ae334c77d14fe3e6e1c938f06148c0db5458487254d4578ed87bf34935d0004c4bca208280e66eb1190b00b4894026c4c0168d2465a615f9613c5d74968062bc1a27b60440dc18d7bce2c9f311b1589d991f2a7c67a03435b5213e601f2e3a282b871af09ac7f07b271740e783e590c3624c286a6eda5d608e439a447feb04b0ac6a4bc218308be56a431df820b11e370be9d109cdb49098b68ad8441b9f81e13a0bc8d0dd6b76bfe7575fcd0cc14b3f8b690c9239f0217f2dfa24e8041984638d152feb12f4a1f19e952ce42c20f689bd196137d0e41f3302ba9274e0a036dc82009650449ea625130d2807ff472e41e3c373686bb4f960402e6076e00ae43986669514e2af00766f5d5fa564cf175cc06d882104a4426b84a78bc2c1cd5111f3455292bf3b200d56cb7c6eadb303826932943605d69ab63cca3a4aefb06cdcfa684478a3b117a6ee935a3ac72ba3922d038bb3a8e359daa9be36455d2dd725301291ebc31c425fca02003adae292116a3bdaa532004827ac3e482ce7557c180fdeab360c6dd9e6b7c5c31cf93ee06c1fa74fa78e2317c22a9874deb0825b5339232351bbe6ba56c8f5eead76280390b9018dd515c1489fa4cc364cfc1c01a9d42209d60ae691cedabd45d35dbfb7cb4c84a403466f8cf5603db620f8f80432705a86feb036bb1ba5c484bf2ed39e99c6d1ccc7ff42b649525326e3a5e7b4592a91a1d71d9b95396064af6e56af3f90d23ee3a449811d16f2a034331a3f2a7507a0ad5"}, 0x401) 2018/04/10 18:54:11 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1=0xe0000001]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:11 executing program 4: socketpair(0x15, 0x80000000805, 0x0, &(0x7f0000000680)) 2018/04/10 18:54:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:11 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xfffffeda) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x23e1000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/10 18:54:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) 2018/04/10 18:54:12 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)={0xaa}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 2018/04/10 18:54:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0xfffffffffffffda4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392de40ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be98c66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x706000, 0x2, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x707000, 0x2, 0xe, &(0x7f0000000300)) 2018/04/10 18:54:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x1, &(0x7f0000000040)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/10 18:54:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000540)=""/111, 0x6f}], 0x1) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f0000000080)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 2018/04/10 18:54:12 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1=0xe0000001]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000440)=0x78) 2018/04/10 18:54:13 executing program 6: r0 = socket$kcm(0x2, 0x4000000005, 0x0) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000340)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000480)='r', 0x1}], 0x1, &(0x7f0000000c80)}, 0x40400c0) 2018/04/10 18:54:13 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1=0xe0000001]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:13 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') 2018/04/10 18:54:13 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:13 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/10 18:54:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) 2018/04/10 18:54:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) 2018/04/10 18:54:13 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 2018/04/10 18:54:13 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/10 18:54:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 2018/04/10 18:54:13 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x23e1000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/10 18:54:13 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1=0xe0000001]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 2018/04/10 18:54:13 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/10 18:54:13 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001380)) 2018/04/10 18:54:13 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x3, 0x6) syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/10 18:54:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x120c03}, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x87, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)="626373663000000000000000000000db") 2018/04/10 18:54:14 executing program 2: mq_open(&(0x7f0000000080)='.,usersecurityuser-keyring\x00', 0x0, 0x0, &(0x7f0000000040)) 2018/04/10 18:54:14 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\b']}) 2018/04/10 18:54:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) 2018/04/10 18:54:14 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) 2018/04/10 18:54:14 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000000c0)=""/30, &(0x7f0000000000)=0x1e) 2018/04/10 18:54:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x120c03}, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x87, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)="626373663000000000000000000000db") 2018/04/10 18:54:14 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/10 18:54:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000042ff3)='/dev/snd/seq\x00', 0x0, 0x20002) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 2018/04/10 18:54:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000101f74f00000200000ea355ba594acd"], 0x14}, 0x1}, 0x0) 2018/04/10 18:54:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="c0d0091ee98c34ccd1a2f8b64dc0445e9d2b1b46248d07f2375cc4d8cc5d2c19", 0x20}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/10 18:54:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x120c03}, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x87, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)="626373663000000000000000000000db") [ 63.906591] ================================================================== [ 63.914017] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 63.920093] CPU: 1 PID: 5422 Comm: syz-executor6 Not tainted 4.16.0+ #83 [ 63.926941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.936314] Call Trace: [ 63.938925] dump_stack+0x185/0x1d0 [ 63.942566] ? vmac_setkey+0x337/0x940 [ 63.946462] kmsan_report+0x142/0x240 [ 63.950269] ? camellia_setkey+0xb0/0xb0 2018/04/10 18:54:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000fdb000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x8000000006) dup2(r2, r1) writev(r1, &(0x7f0000003600)=[{&(0x7f0000002600)="5f87e84883f7393b306053c5b2a02408b0848729a53d4aa11e435af527a4bc15f05785e2ca697dfb050cb6d7effcb6407cb44150856a732692e4aef17dd669c70258345eb4f53af13ab0db58b84e51afd0b0aec219cc0eec147323a7ac844a191f3cab7c48c865acb7ad0d", 0x6b}], 0x1) [ 63.954342] __msan_warning_32+0x6c/0xb0 [ 63.958405] ? camellia_setkey+0xb0/0xb0 [ 63.962481] vmac_setkey+0x337/0x940 [ 63.966203] ? vmac_final+0x3f80/0x3f80 [ 63.970177] shash_async_setkey+0x337/0x4c0 [ 63.974499] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 63.979874] ? trace_kmalloc+0xb6/0x2b0 [ 63.984040] ? shash_async_digest+0x1b0/0x1b0 [ 63.988548] crypto_ahash_setkey+0x31a/0x470 [ 63.992973] hash_setkey+0x8b/0xa0 [ 63.996521] alg_setsockopt+0x6c5/0x740 [ 64.000975] ? hash_release+0x50/0x50 [ 64.004793] ? alg_accept+0xd0/0xd0 [ 64.008430] SYSC_setsockopt+0x4b8/0x570 [ 64.012530] SyS_setsockopt+0x76/0xa0 [ 64.016337] do_syscall_64+0x309/0x430 [ 64.020240] ? SYSC_recv+0xe0/0xe0 [ 64.023790] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 64.028979] RIP: 0033:0x455259 [ 64.032165] RSP: 002b:00007f4ac2091c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 64.039878] RAX: ffffffffffffffda RBX: 00007f4ac20926d4 RCX: 0000000000455259 [ 64.047156] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 64.054436] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 64.061711] R10: 0000000020dc1000 R11: 0000000000000246 R12: 00000000ffffffff [ 64.069164] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 64.076437] [ 64.078058] Local variable description: ----out.i@vmac_setkey [ 64.083929] Variable was created at: [ 64.087654] vmac_setkey+0x93/0x940 [ 64.091292] shash_async_setkey+0x337/0x4c0 [ 64.095604] ================================================================== [ 64.102951] Disabling lock debugging due to kernel taint [ 64.108396] Kernel panic - not syncing: panic_on_warn set ... [ 64.108396] [ 64.115774] CPU: 1 PID: 5422 Comm: syz-executor6 Tainted: G B 4.16.0+ #83 [ 64.123941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.133357] Call Trace: [ 64.135962] dump_stack+0x185/0x1d0 [ 64.139597] panic+0x39d/0x940 [ 64.142826] ? vmac_setkey+0x337/0x940 [ 64.146723] kmsan_report+0x238/0x240 [ 64.150535] ? camellia_setkey+0xb0/0xb0 [ 64.154606] __msan_warning_32+0x6c/0xb0 [ 64.158671] ? camellia_setkey+0xb0/0xb0 [ 64.162747] vmac_setkey+0x337/0x940 [ 64.166472] ? vmac_final+0x3f80/0x3f80 [ 64.170454] shash_async_setkey+0x337/0x4c0 [ 64.174790] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 64.180163] ? trace_kmalloc+0xb6/0x2b0 [ 64.184148] ? shash_async_digest+0x1b0/0x1b0 [ 64.188656] crypto_ahash_setkey+0x31a/0x470 [ 64.193081] hash_setkey+0x8b/0xa0 [ 64.196634] alg_setsockopt+0x6c5/0x740 [ 64.200613] ? hash_release+0x50/0x50 [ 64.204419] ? alg_accept+0xd0/0xd0 [ 64.208052] SYSC_setsockopt+0x4b8/0x570 [ 64.212156] SyS_setsockopt+0x76/0xa0 [ 64.215977] do_syscall_64+0x309/0x430 [ 64.219878] ? SYSC_recv+0xe0/0xe0 [ 64.223437] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 64.228625] RIP: 0033:0x455259 [ 64.231835] RSP: 002b:00007f4ac2091c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 64.239555] RAX: ffffffffffffffda RBX: 00007f4ac20926d4 RCX: 0000000000455259 [ 64.246830] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 64.254105] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 64.261381] R10: 0000000020dc1000 R11: 0000000000000246 R12: 00000000ffffffff [ 64.268660] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 64.276463] Dumping ftrace buffer: [ 64.280001] (ftrace buffer empty) [ 64.283691] Kernel Offset: disabled [ 64.287297] Rebooting in 86400 seconds..