INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2018/04/13 19:08:01 fuzzer started 2018/04/13 19:08:02 dialing manager at 10.128.0.26:33379 2018/04/13 19:08:08 kcov=true, comps=false 2018/04/13 19:08:11 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) fremovexattr(r1, &(0x7f0000000200)=@known='security.capability\x00') 2018/04/13 19:08:11 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000002000), &(0x7f0000000040), &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000001000)={0x0, 0x2710}) setsockopt$inet6_buf(r0, 0x29, 0x40, &(0x7f0000000f9b), 0x0) 2018/04/13 19:08:11 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f00000001c0)=ANY=[]) 2018/04/13 19:08:11 executing program 4: mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000280), 0x800000000005, 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000000040), 0x0) 2018/04/13 19:08:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x5, r1, 0x800000, &(0x7f0000000000)={&(0x7f00000033c0)=""/4096, 0xfffffffffffffd2c}) 2018/04/13 19:08:11 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/rfkill\x00', 0x1, 0x0) write$eventfd(r0, &(0x7f00000002c0)=0x20400000000, 0xffffff5f) 2018/04/13 19:08:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)={0x2, 0xe, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast1=0xe0000001}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}]}, 0x80}, 0x1}, 0x0) 2018/04/13 19:08:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000300)={0x20080522, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5}) syzkaller login: [ 42.970525] ip (3788) used greatest stack depth: 54672 bytes left [ 43.113086] ip (3798) used greatest stack depth: 54312 bytes left [ 44.192994] ip (3906) used greatest stack depth: 54200 bytes left [ 44.412172] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.418692] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.461556] device bridge_slave_0 entered promiscuous mode [ 44.530278] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.536847] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.586188] device bridge_slave_0 entered promiscuous mode [ 44.615961] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.622473] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.664737] device bridge_slave_0 entered promiscuous mode [ 44.693725] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.700244] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.715496] device bridge_slave_1 entered promiscuous mode [ 44.724774] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.731227] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.748925] device bridge_slave_0 entered promiscuous mode [ 44.784913] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.791414] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.815518] device bridge_slave_0 entered promiscuous mode [ 44.842110] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.848603] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.887099] device bridge_slave_1 entered promiscuous mode [ 44.909130] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.915613] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.927459] device bridge_slave_1 entered promiscuous mode [ 44.937970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.949301] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.955761] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.994955] device bridge_slave_0 entered promiscuous mode [ 45.014102] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.020630] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.039707] device bridge_slave_0 entered promiscuous mode [ 45.053165] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.059651] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.069306] device bridge_slave_1 entered promiscuous mode [ 45.078654] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.085136] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.092512] device bridge_slave_1 entered promiscuous mode [ 45.101271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.108709] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.115181] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.140867] device bridge_slave_0 entered promiscuous mode [ 45.159919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.169979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.178694] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.185211] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.226082] device bridge_slave_1 entered promiscuous mode [ 45.250102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.260638] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.267147] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.310894] device bridge_slave_1 entered promiscuous mode [ 45.326614] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.333169] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.361316] device bridge_slave_1 entered promiscuous mode [ 45.371253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.381655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.392356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.401871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.439243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.496925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.510521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.588682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.616577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.691313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.702562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.203616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.376141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.444570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.453859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.479918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.575651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.591339] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.607844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.638491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.664658] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.674673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.682440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.770812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.783129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.868273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.917192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.154327] ip (4124) used greatest stack depth: 53640 bytes left [ 47.466611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.536770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.659365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.671100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.750836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.770098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.793687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.803003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.845997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.856246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.898728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.914720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.926018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.945467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.985757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.996102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.003871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.016573] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.023871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.045183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.083630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.099408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.106563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.123688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.173264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.183349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.194762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.231278] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.238990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.249592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.271796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.284193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.302761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.320970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.331483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.340418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.362744] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.370195] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.379214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.387345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.394908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.404970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.450608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.480776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.499645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.515359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.533653] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.550362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.559266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.571626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.578879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.602190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.630831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.656805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.682590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.699855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.715847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.723773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.732985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.766507] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.774319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.797838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.834929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.872771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.459412] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.465920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.472784] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.479251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.526697] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.533899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.736939] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.743452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.750312] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.756757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.764551] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.791175] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.797654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.804613] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.811142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.845951] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.858466] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.864970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.871818] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.878324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.939699] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.963997] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.970489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.977353] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.983815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.065309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.076243] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.082725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.089585] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.096091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.108265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.117940] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.124419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.131326] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.137801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.157512] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.335168] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.341654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.348510] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.354972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.379579] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.552162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.565346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.583690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.590858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.598750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.606556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.614334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.182912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.232888] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.254887] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.303433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.322474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.428778] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.492429] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.594942] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.940981] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.947260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.960615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.998209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.004472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.014883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.050729] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.063203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.089842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.125472] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.138491] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.149215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.175803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.223021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.245868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.279566] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.290661] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.297072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.315842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.323241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.339015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.575157] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.581426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.599120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 19:08:37 executing program 6: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x0) 2018/04/13 19:08:37 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x125d, &(0x7f0000000000)) 2018/04/13 19:08:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000399ffc)=0x7, 0x5a) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000da2ffc)=0xa069, 0xfea4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) sendmmsg$alg(r1, &(0x7f0000359000)=[{0x0, 0x0, &(0x7f0000a45000)=[{&(0x7f0000001140)="c0", 0x1}], 0x1, &(0x7f0000360cd8)}], 0x1, 0x0) write$eventfd(r1, &(0x7f00006d5000), 0x8) write$vnet(r1, &(0x7f00005fdf98)={0x1, {&(0x7f0000bcd000)=""/4096, 0x1000, &(0x7f00002e7000)=""/216}}, 0x68) 2018/04/13 19:08:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:38 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000b00)=[{&(0x7f0000000080)=@abs={0x1}, 0x6e, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}], 0x1, 0x0) 2018/04/13 19:08:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x401c5820, &(0x7f0000000000)=ANY=[]) 2018/04/13 19:08:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file1\x00', 0x0) unlink(&(0x7f0000000300)='./file1\x00') 2018/04/13 19:08:38 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @empty, 0x0, 0x40}) 2018/04/13 19:08:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000062bff1)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') sendfile(r1, r0, &(0x7f0000000040)=0x2, 0x7a000000000000) [ 67.383232] syz-executor5 (5805): /proc/5804/oom_adj is deprecated, please use /proc/5804/oom_score_adj instead. 2018/04/13 19:08:38 executing program 4: 2018/04/13 19:08:38 executing program 3: 2018/04/13 19:08:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000b00)=[{&(0x7f0000000080)=@abs={0x1}, 0x6e, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}], 0x1, 0x0) 2018/04/13 19:08:38 executing program 1: 2018/04/13 19:08:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:38 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="8050f1dcbd3ea78ca0df8207d2c2e6b7b5a575329ef431f2515767eecd4db6c36224e94efe88809c893f663da8b9fe7737a9b6ee466ca27856880c5c1ecec4fbbc0a37020824c0ec9a094487e2d8d1ad39cf70868b909c8a2d858bf3b0e45f1114507f96536021ab89fe0fcbb8533ef339ba21dec38ec6a6f1637fac6864df3f10bb215398c830c08b80be8ecfc5798be502b09c8f8b243d482986c0ddf574e82a1e1f69981b856345d0e4f806c01a67bffdaf220c5a4ccdd1325e7f7ab9f1775884d6129bb92859e6b2bf9b3c6c2880c9b98ba6ff586a72774a9f0ee53c5ecdfc4f6c8e93911029bd463ac75e6d89884418322816a2aff3ca0a1be62045ee63d53ed48c559ca1386ac9975fb8158dfbe45b29c142ac7fd016b10235a8b072752200bb1bc399c6cde3a892fa1a0c8d4c3aeaba50eb9317ba450757a864400bc70581770c6406d3a4c9a350935fc5bfcdd314a726f9a124728aae9672fa2513d1ae73dc9e6f0dbe405d05cbb54d7412f43d23b41ee9d1ffd1a8355b569c0bc70d3367fa67f555af6737b1c0264cd35494551dfe89b1798f9d6ccb64f10ef6032851d264481043009949041b80f20f6c181cffdf20fef737a7760c07fb089ffe14450c4e9783339ea7656f09b06d813fa098f0ad5c9656c1d15bda1ca0e9fc8672bbbc8170bbaa9816db2fe26ccaa6184c969f527eb4a8d0e72e3d64e9427fb5a5d6b3027e89d3f5cab0c4284fd2376f67b17dc9", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="8050f1dcbd3ea78ca0df8207d2c2e6b7b5a575329ef431f2515767eecd4db6c36224e94efe88809c893f663da8b9fe7737a9b6ee466ca27856880c5c1ecec4fbbc0a37020824c0ec9a094487e2d8d1ad39cf70868b909c8a2d858bf3b0e45f1114507f96536021ab89fe0fcbb8533ef339ba21dec38ec6a6f1637fac6864df3f10bb215398c830c08b80be8ecfc5798be502b09c8f8b243d482986c0ddf574e82a1e1f69981b856345d0e4f806c01a67bffdaf220c5a4ccdd1325e7f7ab9f1775884d6129bb92859e6b2bf9b3c6c2880c9b98ba6ff586a72774a9f0ee53c5ecdfc4f6c8e93911029bd463ac75e6d89884418322816a2aff3ca0a1be62045ee63d53ed48c559ca1386ac9975fb8158dfbe45b29c142ac7fd016b10235a8b072752200bb1bc399c6cde3a892fa1a0c8d4c3aeaba50eb9317ba450757a864400bc70581770c6406d3a4c9a350935fc5bfcdd314a726f9a124728aae9672fa2513d1ae73dc9e6f0dbe405d05cbb54d7412f43d23b41ee9d1ffd1a8355b569c0bc70d3367fa67f555af6737b1c0264cd35494551dfe89b1798f9d6ccb64f10ef6032851d264481043009949041b80f20f6c181cffdf20fef737a7760c07fb089ffe14450c4e9783339ea7656f09b06d813fa098f0ad5c9656c1d15bda1ca0e9fc8672bbbc8170bbaa9816db2fe26ccaa6184c969f527eb4a8d0e72e3d64e9427fb5a5d6b3027e89d3f5cab0c4284fd2376f67b17dc9", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:38 executing program 3: 2018/04/13 19:08:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000062bff1)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') sendfile(r1, r0, &(0x7f0000000040)=0x2, 0x7a000000000000) 2018/04/13 19:08:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000399ffc)=0x7, 0x5a) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000da2ffc)=0xa069, 0xfea4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) sendmmsg$alg(r1, &(0x7f0000359000)=[{0x0, 0x0, &(0x7f0000a45000)=[{&(0x7f0000001140)="c0", 0x1}], 0x1, &(0x7f0000360cd8)}], 0x1, 0x0) write$eventfd(r1, &(0x7f00006d5000), 0x8) write$vnet(r1, &(0x7f00005fdf98)={0x1, {&(0x7f0000bcd000)=""/4096, 0x1000, &(0x7f00002e7000)=""/216}}, 0x68) 2018/04/13 19:08:38 executing program 6: 2018/04/13 19:08:38 executing program 3: 2018/04/13 19:08:38 executing program 1: 2018/04/13 19:08:38 executing program 6: 2018/04/13 19:08:38 executing program 4: 2018/04/13 19:08:38 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:38 executing program 5: 2018/04/13 19:08:39 executing program 3: 2018/04/13 19:08:39 executing program 1: 2018/04/13 19:08:39 executing program 4: 2018/04/13 19:08:39 executing program 6: 2018/04/13 19:08:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:39 executing program 5: 2018/04/13 19:08:39 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:39 executing program 0: 2018/04/13 19:08:39 executing program 1: 2018/04/13 19:08:39 executing program 3: 2018/04/13 19:08:39 executing program 4: 2018/04/13 19:08:39 executing program 3: 2018/04/13 19:08:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:39 executing program 6: 2018/04/13 19:08:39 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000040)=@pppoe={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/4096, 0x1000}, 0x40002000) 2018/04/13 19:08:39 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, 0x0, 0x1e) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 2018/04/13 19:08:39 executing program 1: 2018/04/13 19:08:39 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) dup3(r1, r0, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:39 executing program 3: 2018/04/13 19:08:39 executing program 1: 2018/04/13 19:08:39 executing program 6: 2018/04/13 19:08:39 executing program 4: 2018/04/13 19:08:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:40 executing program 0: 2018/04/13 19:08:40 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) dup3(r1, r0, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:40 executing program 3: 2018/04/13 19:08:40 executing program 1: 2018/04/13 19:08:40 executing program 6: 2018/04/13 19:08:40 executing program 5: 2018/04/13 19:08:40 executing program 4: 2018/04/13 19:08:40 executing program 4: 2018/04/13 19:08:40 executing program 5: 2018/04/13 19:08:40 executing program 3: 2018/04/13 19:08:40 executing program 6: 2018/04/13 19:08:40 executing program 0: 2018/04/13 19:08:40 executing program 1: 2018/04/13 19:08:40 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) dup3(r1, r0, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:40 executing program 4: 2018/04/13 19:08:40 executing program 4: 2018/04/13 19:08:40 executing program 0: 2018/04/13 19:08:40 executing program 1: 2018/04/13 19:08:40 executing program 6: 2018/04/13 19:08:40 executing program 5: 2018/04/13 19:08:40 executing program 3: 2018/04/13 19:08:40 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:41 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x8, &(0x7f00000000c0), 0x4) 2018/04/13 19:08:41 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x20004) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f0000000080)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) dup3(r0, r1, 0x0) 2018/04/13 19:08:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) 2018/04/13 19:08:41 executing program 6: r0 = memfd_create(&(0x7f0000000040)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da4952485258faf310b865c370650403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d7587d7ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70fc2b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0x3) write(r0, &(0x7f0000000240)='v', 0x1) fsync(0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000001000), 0xffff) fcntl$addseals(r0, 0x409, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) 2018/04/13 19:08:41 executing program 5: 2018/04/13 19:08:42 executing program 3: r0 = socket(0x10, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x1000000000004002}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)=0xfffffffffffffffd) write(r1, &(0x7f0000000180), 0xff4d) 2018/04/13 19:08:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:42 executing program 5: 2018/04/13 19:08:42 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = dup3(0xffffffffffffffff, r0, 0x0) sendmmsg$alg(r1, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:42 executing program 0: 2018/04/13 19:08:42 executing program 4: 2018/04/13 19:08:42 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000df9000), 0x0) shutdown(r0, 0x1) 2018/04/13 19:08:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x2, 0x0) mlock(&(0x7f0000800000/0x4000)=nil, 0x4000) 2018/04/13 19:08:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 2018/04/13 19:08:42 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0), 0x4) 2018/04/13 19:08:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/13 19:08:42 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x2, 0x0) mlock(&(0x7f0000800000/0x4000)=nil, 0x4000) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x0) 2018/04/13 19:08:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0x101, 0x400}], 0x0, &(0x7f0000000440)) 2018/04/13 19:08:42 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x90) 2018/04/13 19:08:42 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001040)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) 2018/04/13 19:08:42 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x20004) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f0000000080)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) dup3(r0, r1, 0x80000) 2018/04/13 19:08:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 2018/04/13 19:08:42 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r0, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:42 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:42 executing program 3: syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f00000008c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='utf8']) 2018/04/13 19:08:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) sendmsg(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000012c0)="4e65cd9f", 0x4}], 0x1, &(0x7f000001b000)}, 0x0) 2018/04/13 19:08:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100)) 2018/04/13 19:08:42 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)="63512d1c00", &(0x7f0000000080)='/\x00', 0x0, 0x0, &(0x7f00000004c0), 0x28020, &(0x7f0000000400)=ANY=[@ANYBLOB="d4"]) 2018/04/13 19:08:42 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) 2018/04/13 19:08:42 executing program 7: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) sendmmsg$alg(r1, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) 2018/04/13 19:08:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="88e1b541e665af3ce7593b00082197b72d5ecd94e58b76d05786f0fb74d724bd", 0x20}], 0x1, &(0x7f0000001400)}, 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000001340)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/33, 0x21}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:08:43 executing program 4: 2018/04/13 19:08:43 executing program 3: r0 = inotify_init1(0x800) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00009a4000)=[{&(0x7f000022c000)=""/32, 0x20}], 0x1) 2018/04/13 19:08:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000cc5000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\t', 0x0) r2 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0x3fd, @time}], 0x30) 2018/04/13 19:08:43 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sendmmsg$alg(r2, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000004a40)="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", 0x213}], 0x1, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/228, 0xe4}], 0x2, &(0x7f0000000540)=""/103, 0x67}}, {{&(0x7f00000009c0)=@can, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/189, 0xbd}], 0x1, &(0x7f0000000b40)=""/205, 0xcd}}], 0x2, 0x0, 0x0) [ 72.394657] ================================================================== [ 72.402087] BUG: KMSAN: uninit-value in ghash_setkey+0x209/0x270 [ 72.408237] CPU: 1 PID: 6068 Comm: syz-executor6 Not tainted 4.16.0+ #83 [ 72.415078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.424432] Call Trace: [ 72.427035] dump_stack+0x185/0x1d0 [ 72.430673] ? ghash_setkey+0x209/0x270 [ 72.434654] kmsan_report+0x142/0x240 [ 72.438464] __msan_warning_32+0x6c/0xb0 [ 72.442539] ghash_setkey+0x209/0x270 [ 72.446357] ? ghash_final+0x1d0/0x1d0 [ 72.450259] crypto_shash_setkey+0x317/0x490 [ 72.454680] cryptd_hash_setkey+0x1a5/0x330 [ 72.459013] ? cryptd_hash_import+0x2a0/0x2a0 [ 72.463526] crypto_ahash_setkey+0x31a/0x470 [ 72.467948] ghash_async_setkey+0x1a5/0x330 [ 72.472270] ? ghash_async_import+0x3a0/0x3a0 [ 72.476769] crypto_ahash_setkey+0x31a/0x470 [ 72.481164] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 72.486357] crypto_gcm_setkey+0xa3c/0xc10 [ 72.490599] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 72.494992] crypto_aead_setkey+0x373/0x4c0 [ 72.499306] aead_setkey+0xa0/0xc0 [ 72.502834] alg_setsockopt+0x6c5/0x740 [ 72.506807] ? aead_release+0x90/0x90 [ 72.510592] ? alg_accept+0xd0/0xd0 [ 72.514208] SYSC_setsockopt+0x4b8/0x570 [ 72.518254] SyS_setsockopt+0x76/0xa0 [ 72.522053] do_syscall_64+0x309/0x430 [ 72.526196] ? SYSC_recv+0xe0/0xe0 [ 72.529723] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.534895] RIP: 0033:0x455319 [ 72.538073] RSP: 002b:00007fbb359fdc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 72.545775] RAX: ffffffffffffffda RBX: 00007fbb359fe6d4 RCX: 0000000000455319 [ 72.553044] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 72.560315] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 72.567596] R10: 00000000203c1000 R11: 0000000000000246 R12: 00000000ffffffff [ 72.574852] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 72.582205] [ 72.583818] Uninit was stored to memory at: [ 72.588133] kmsan_internal_chain_origin+0x12b/0x210 [ 72.593223] __msan_chain_origin+0x69/0xc0 [ 72.597443] __crypto_xor+0x23c/0x16b0 [ 72.601314] crypto_ctr_crypt_inplace+0x29a/0x3a0 [ 72.606262] crypto_ctr_crypt+0x54c/0x7d0 [ 72.610405] skcipher_encrypt_blkcipher+0x222/0x320 [ 72.615403] crypto_gcm_setkey+0x6a3/0xc10 [ 72.619635] crypto_aead_setkey+0x373/0x4c0 [ 72.623954] aead_setkey+0xa0/0xc0 [ 72.627490] alg_setsockopt+0x6c5/0x740 [ 72.631461] SYSC_setsockopt+0x4b8/0x570 [ 72.635515] SyS_setsockopt+0x76/0xa0 [ 72.639309] do_syscall_64+0x309/0x430 [ 72.643190] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.648367] Local variable description: ----vla@crypto_ctr_crypt_inplace [ 72.655191] Variable was created at: [ 72.658902] crypto_ctr_crypt_inplace+0x19a/0x3a0 [ 72.664252] crypto_ctr_crypt+0x54c/0x7d0 [ 72.668387] ================================================================== [ 72.675729] Disabling lock debugging due to kernel taint [ 72.681164] Kernel panic - not syncing: panic_on_warn set ... [ 72.681164] [ 72.688521] CPU: 1 PID: 6068 Comm: syz-executor6 Tainted: G B 4.16.0+ #83 [ 72.696649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.705989] Call Trace: [ 72.708572] dump_stack+0x185/0x1d0 [ 72.712189] panic+0x39d/0x940 [ 72.715387] ? ghash_setkey+0x209/0x270 [ 72.719349] kmsan_report+0x238/0x240 [ 72.723143] __msan_warning_32+0x6c/0xb0 [ 72.727196] ghash_setkey+0x209/0x270 [ 72.730995] ? ghash_final+0x1d0/0x1d0 [ 72.734879] crypto_shash_setkey+0x317/0x490 [ 72.739279] cryptd_hash_setkey+0x1a5/0x330 [ 72.743595] ? cryptd_hash_import+0x2a0/0x2a0 [ 72.748091] crypto_ahash_setkey+0x31a/0x470 [ 72.752498] ghash_async_setkey+0x1a5/0x330 [ 72.756814] ? ghash_async_import+0x3a0/0x3a0 [ 72.761301] crypto_ahash_setkey+0x31a/0x470 [ 72.765702] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 72.770883] crypto_gcm_setkey+0xa3c/0xc10 [ 72.775111] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 72.779507] crypto_aead_setkey+0x373/0x4c0 [ 72.783829] aead_setkey+0xa0/0xc0 [ 72.787364] alg_setsockopt+0x6c5/0x740 [ 72.791415] ? aead_release+0x90/0x90 [ 72.795207] ? alg_accept+0xd0/0xd0 [ 72.798832] SYSC_setsockopt+0x4b8/0x570 [ 72.802884] SyS_setsockopt+0x76/0xa0 [ 72.806676] do_syscall_64+0x309/0x430 [ 72.810568] ? SYSC_recv+0xe0/0xe0 [ 72.814105] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.819287] RIP: 0033:0x455319 [ 72.822466] RSP: 002b:00007fbb359fdc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 72.830164] RAX: ffffffffffffffda RBX: 00007fbb359fe6d4 RCX: 0000000000455319 [ 72.837421] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 72.844677] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 72.851946] R10: 00000000203c1000 R11: 0000000000000246 R12: 00000000ffffffff [ 72.859205] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 72.866967] Dumping ftrace buffer: [ 72.870490] (ftrace buffer empty) [ 72.874181] Kernel Offset: disabled [ 72.878138] Rebooting in 86400 seconds..