INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.29' (ECDSA) to the list of known hosts. 2018/04/09 20:56:26 fuzzer started 2018/04/09 20:56:27 dialing manager at 10.128.0.26:36427 2018/04/09 20:56:33 kcov=true, comps=false 2018/04/09 20:56:36 executing program 0: 2018/04/09 20:56:36 executing program 2: 2018/04/09 20:56:36 executing program 7: 2018/04/09 20:56:36 executing program 1: 2018/04/09 20:56:36 executing program 3: 2018/04/09 20:56:36 executing program 4: 2018/04/09 20:56:36 executing program 5: 2018/04/09 20:56:36 executing program 6: syzkaller login: [ 41.992708] ip (3666) used greatest stack depth: 54672 bytes left [ 42.288722] ip (3695) used greatest stack depth: 54408 bytes left [ 42.470725] ip (3708) used greatest stack depth: 54312 bytes left [ 43.682950] ip (3823) used greatest stack depth: 54200 bytes left [ 45.665094] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.686889] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.874728] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.941327] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.964781] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.975497] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.998944] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.076844] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.681929] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.716813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.971704] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.000167] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.015868] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.097812] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.114207] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.145591] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.422446] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.428731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.442927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.514990] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.521307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.531620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.770438] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.776757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.789810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.830502] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.839977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.849239] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.855545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.866666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.888785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.914657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.931337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.942713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.962168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.969726] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.977448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.985235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.004368] ip (4856) used greatest stack depth: 53976 bytes left [ 56.024090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.045839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/09 20:56:54 executing program 0: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='blacklist\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='em1lotrusted(\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) 2018/04/09 20:56:54 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/09 20:56:54 executing program 5: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000001200)) 2018/04/09 20:56:54 executing program 2: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x3, r0, 0xfffffffffffffffb) 2018/04/09 20:56:54 executing program 7: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setfsuid(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000b80)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000000), 0xfffffddd) read(r0, &(0x7f0000000c00)=""/194, 0xffffff58) 2018/04/09 20:56:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') pread64(r0, &(0x7f0000002000)=""/4096, 0x1000, 0x0) 2018/04/09 20:56:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000bfcfe0)={@dev={0xfe, 0x80}, 0x0, 0x0, 0x3, 0x1}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x611) 2018/04/09 20:56:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@dev={0xfe, 0x80}, 0x400, 0x0, 0xff, 0x1}, 0x20) [ 57.324281] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/09 20:56:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) getpeername$netrom(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) recvmsg(0xffffffffffffffff, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r2 = dup3(r1, r0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) ftruncate(r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x1}, 0x14) 2018/04/09 20:56:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:56:54 executing program 4: syslog(0x3, &(0x7f0000001040)=""/4096, 0x1021d) 2018/04/09 20:56:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x380, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, "00000000000000000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'gretap0\x00', 'tunl0\x00', 'syzkaller0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xf8, 0x130}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz0\x00'}}}, @arpreply={'arpreply\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'dummy0\x00', 'bpq0\x00', 'ip6tnl0\x00', 'sit0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x9, 0x0, 0x0, 'bridge0\x00', 'ip6tnl0\x00', 'bcsh0\x00', 'vlan0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xc0, 0xc0, 0xf0, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@local={0xac, 0x14, 0x14, 0xaa}}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x3f8) 2018/04/09 20:56:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) 2018/04/09 20:56:54 executing program 1: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x18071, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x5000)=nil, 0x5000, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x9) 2018/04/09 20:56:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:54 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7003) [ 57.745187] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/09 20:56:54 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={"776c616e300000020084000000000899", &(0x7f0000000040)=ANY=[@ANYBLOB="110000002100000000fb892f932cf96777424c408b"]}) 2018/04/09 20:56:54 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:55 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg(r0, &(0x7f0000006140)=[{{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=[{0x10, 0x84, 0x1}], 0x10}}], 0x1, 0x0) 2018/04/09 20:56:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00003a4000)={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x5c) 2018/04/09 20:56:55 executing program 4: add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0)="8a", 0x1, 0xfffffffffffffffc) 2018/04/09 20:56:55 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0x1000, 0x100000002) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 2018/04/09 20:56:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) 2018/04/09 20:56:55 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/09 20:56:55 executing program 6: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:56:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000440)='./file0/fil..\x00', 0x0) mknod(&(0x7f0000000080)='./file0/fil..\x00', 0x0, 0x0) 2018/04/09 20:56:55 executing program 7: r0 = socket(0x100000001e, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip6gretap0\x00'}) [ 58.745920] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/09 20:56:55 executing program 7: r0 = socket$unix(0x1, 0x802, 0x0) r1 = dup(r0) connect$ipx(r1, &(0x7f0000000000)={0x4, 0x0, 0x0, "d7a1b98c6179"}, 0x10) 2018/04/09 20:56:55 executing program 6: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb0806000108000604000100aaaaaaaaaa931414bbaaaaaaaaaaaa00002100c61e9ba38d622c68771fa2da8f84093871f0f7119d5de85b5251c4d0b018fa42d7c0c27e754f6bb6a9bedc02f13fc55422c742f5cd6364b0d413318407000000ec831690037f15087c63b67e2109fbfca0e779be239a3d238e406ea297a140cbe753208d51e22147cd5cff2505df4c84510a076a519686a9fdbb1796b55d3c75b9db43c95a76d21e2a7e"], &(0x7f0000000040)) 2018/04/09 20:56:55 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') sendfile(r0, r1, &(0x7f0000000000)=0x1000, 0x100000002) 2018/04/09 20:56:55 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:56 executing program 5: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) 2018/04/09 20:56:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@setlink={0x2c, 0x13, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xc, 0x1}]}, 0x2c}, 0x1}, 0x0) 2018/04/09 20:56:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:56:56 executing program 6: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x101902) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) 2018/04/09 20:56:56 executing program 7: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@time_offset={'time_offset', 0x3d, [0x36, 0x32, 0x38, 0x37, 0x0]}, 0x2c}]}) 2018/04/09 20:56:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000e2a000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000000105fd000600000000000000"], 0x10}, 0x1}, 0x0) 2018/04/09 20:56:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x100000000000032, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)='&', 0x1) 2018/04/09 20:56:56 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:56 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) dup3(r1, r0, 0x0) fcntl$setlease(r0, 0x400, 0x1) 2018/04/09 20:56:56 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) 2018/04/09 20:56:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001480)={0x26, 'skcipher\x00', 0x0, 0x0, 'cryptd(salsa20-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$inet6(0xa, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/09 20:56:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0xfffffe7b, 0x0) 2018/04/09 20:56:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000140), 0x237, &(0x7f0000000040), &(0x7f00000001c0), 0x8) 2018/04/09 20:56:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:56:56 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x7ffff, 0x8) [ 59.937328] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/09 20:56:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:57 executing program 5: r0 = semget$private(0x0, 0x1000, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000140)) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/09 20:56:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, &(0x7f00000008c0)=@can, &(0x7f00000002c0)=0xffffffffffffff8c, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/09 20:56:57 executing program 0: 2018/04/09 20:56:57 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:57 executing program 0: 2018/04/09 20:56:57 executing program 3: 2018/04/09 20:56:57 executing program 5: 2018/04/09 20:56:57 executing program 4: 2018/04/09 20:56:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/09 20:56:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x28a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/09 20:56:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900"}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000014000505000000000000000002000000", @ANYBLOB="140006000500003905000000800000000000000008000200e0000001"], 0x2}, 0x1}, 0x0) 2018/04/09 20:56:57 executing program 4: semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000140)) semctl$IPC_RMID(0x0, 0x0, 0x10) 2018/04/09 20:56:57 executing program 5: 2018/04/09 20:56:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:58 executing program 7: 2018/04/09 20:56:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x28a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/09 20:56:58 executing program 4: 2018/04/09 20:56:58 executing program 3: 2018/04/09 20:56:58 executing program 5: 2018/04/09 20:56:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x40008) 2018/04/09 20:56:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/09 20:56:58 executing program 5: 2018/04/09 20:56:58 executing program 3: 2018/04/09 20:56:58 executing program 4: 2018/04/09 20:56:59 executing program 7: 2018/04/09 20:56:59 executing program 0: 2018/04/09 20:56:59 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x0) 2018/04/09 20:56:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x7ffff, 0x8) 2018/04/09 20:56:59 executing program 3: 2018/04/09 20:56:59 executing program 5: 2018/04/09 20:56:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/09 20:56:59 executing program 4: 2018/04/09 20:56:59 executing program 4: 2018/04/09 20:56:59 executing program 0: 2018/04/09 20:56:59 executing program 7: 2018/04/09 20:56:59 executing program 5: 2018/04/09 20:56:59 executing program 3: 2018/04/09 20:56:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040), 0x8) 2018/04/09 20:56:59 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x0) 2018/04/09 20:56:59 executing program 4: 2018/04/09 20:56:59 executing program 7: 2018/04/09 20:56:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:56:59 executing program 0: 2018/04/09 20:57:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:00 executing program 5: 2018/04/09 20:57:00 executing program 4: 2018/04/09 20:57:00 executing program 3: 2018/04/09 20:57:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) close(r0) 2018/04/09 20:57:00 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, r0, 0x2) 2018/04/09 20:57:00 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000080), 0x0) 2018/04/09 20:57:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x0) 2018/04/09 20:57:00 executing program 3: 2018/04/09 20:57:00 executing program 4: 2018/04/09 20:57:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) close(r0) 2018/04/09 20:57:00 executing program 5: 2018/04/09 20:57:00 executing program 0: 2018/04/09 20:57:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x0) 2018/04/09 20:57:00 executing program 6: 2018/04/09 20:57:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:00 executing program 3: 2018/04/09 20:57:01 executing program 0: 2018/04/09 20:57:01 executing program 3: 2018/04/09 20:57:01 executing program 4: 2018/04/09 20:57:01 executing program 5: 2018/04/09 20:57:01 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) close(r0) 2018/04/09 20:57:01 executing program 6: 2018/04/09 20:57:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') sendfile(r0, r0, &(0x7f0000000040)=0x7ffff, 0x0) 2018/04/09 20:57:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:01 executing program 0: 2018/04/09 20:57:01 executing program 3: 2018/04/09 20:57:01 executing program 4: 2018/04/09 20:57:01 executing program 5: 2018/04/09 20:57:01 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) close(r0) 2018/04/09 20:57:01 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f00000003c0)={0x54, 0x2e, 0x821, 0x0, 0x0, {0x2}, [@generic="cfa98305814cfc83620507cb508e9d5c80b89e0d641f684ad549b891396df9673c2683c6ab0a24c200f5a76f24a5ea20c26e9ac5ce87c6e47a6c570dc5"]}, 0x54}, 0x1}, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000380)=0x60) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/09 20:57:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000080), 0x4) 2018/04/09 20:57:01 executing program 0: 2018/04/09 20:57:01 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(0xffffffffffffffff, 0x1) 2018/04/09 20:57:01 executing program 7: close(0xffffffffffffffff) 2018/04/09 20:57:01 executing program 4: 2018/04/09 20:57:01 executing program 5: 2018/04/09 20:57:01 executing program 3: 2018/04/09 20:57:01 executing program 0: 2018/04/09 20:57:01 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x1f00a431, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/09 20:57:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000080), 0x4) 2018/04/09 20:57:01 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'ip_vti0\x00'}) 2018/04/09 20:57:01 executing program 0: socket$inet(0x2, 0x80003, 0x100000001) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/09 20:57:02 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) close(0xffffffffffffffff) 2018/04/09 20:57:02 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, 0x1, 0x1, [@empty]}, 0x14) 2018/04/09 20:57:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000100)=0x44) 2018/04/09 20:57:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000080), 0x4) 2018/04/09 20:57:02 executing program 6: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)) 2018/04/09 20:57:02 executing program 0: r0 = socket$inet6(0xa, 0x2000000000000003, 0x8008000000007) connect$inet6(r0, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/09 20:57:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x58, {0x2, 0x0, @multicast2=0xe0000002}, 'ip_vti0\x00'}) 2018/04/09 20:57:02 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$kcm(0x2, 0x4000000006, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21a}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x6f2000, 0x1600, &(0x7f0000000400)) 2018/04/09 20:57:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xb}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x1f000000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/09 20:57:02 executing program 6: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8937, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29804036687") 2018/04/09 20:57:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000080), 0x4) 2018/04/09 20:57:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000200)) close(0xffffffffffffffff) 2018/04/09 20:57:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:02 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800000020") 2018/04/09 20:57:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004c00)={&(0x7f0000004a00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000004b80), 0x0, &(0x7f0000004bc0)=""/12, 0xc, 0x9}, 0x0) gettid() sendmsg(0xffffffffffffffff, &(0x7f0000008580)={&(0x7f0000004c40)=@can={0x1d, r1}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004cc0)}], 0x1, &(0x7f0000005200)=ANY=[]}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 2018/04/09 20:57:02 executing program 6: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f00000000c0)='\x00') 2018/04/09 20:57:02 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29804036687") 2018/04/09 20:57:02 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000080), 0x4) 2018/04/09 20:57:02 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)="6c6f00966fd651b159a9c84a2c60d29800009300") socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") 2018/04/09 20:57:02 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800000020") 2018/04/09 20:57:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000080), 0x4) 2018/04/09 20:57:02 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x67}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fff00000004, 0x2, 0x1, &(0x7f00000001c0)) 2018/04/09 20:57:02 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4, 0xfffffffd, 0xfffffffe, &(0x7f0000000180)) 2018/04/09 20:57:02 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") 2018/04/09 20:57:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) r0 = socket$kcm(0xa, 0x200000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8924, &(0x7f00000000c0)) 2018/04/09 20:57:02 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8970, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d298ed286687") 2018/04/09 20:57:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc), 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:02 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000000)='lo\x00') 2018/04/09 20:57:02 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") 2018/04/09 20:57:03 executing program 7: r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r0, 0x4, 0x0, 0x2) 2018/04/09 20:57:03 executing program 6: r0 = memfd_create(&(0x7f0000000580)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) fcntl$addseals(r0, 0x409, 0x0) write(0xffffffffffffffff, &(0x7f0000000480), 0x0) 2018/04/09 20:57:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080), 0x4) 2018/04/09 20:57:03 executing program 5: timer_create(0x2, &(0x7f000014b000)={0x0, 0x1f}, &(0x7f0000ed2000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) clock_nanosleep(0x2, 0x0, &(0x7f0000c12ff0)={0x0, 0x989680}, &(0x7f0000558ff0)) clock_gettime(0x0, &(0x7f0000000040)) 2018/04/09 20:57:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000), 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x2) sendfile(r1, r2, &(0x7f0000b89000), 0x8) 2018/04/09 20:57:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000), 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x2) sendfile(r1, r2, &(0x7f0000b89000), 0x8) 2018/04/09 20:57:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @local={0xfe, 0x80, [], 0xaa}, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3900000}) 2018/04/09 20:57:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") 2018/04/09 20:57:04 executing program 0: 2018/04/09 20:57:04 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x0, @loopback=0x7f000001}, {}, 0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 'lo\x00'}) 2018/04/09 20:57:04 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @broadcast=0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x200}) 2018/04/09 20:57:04 executing program 1: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x1f}, 0x20) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/09 20:57:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f000062fff8)={0x0, 0x2000000001}, 0x8) 2018/04/09 20:57:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000004c0)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r0) 2018/04/09 20:57:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000), 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x2) sendfile(r1, r2, &(0x7f0000b89000), 0x8) 2018/04/09 20:57:05 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @broadcast=0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x200}) 2018/04/09 20:57:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000004c0)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r0) 2018/04/09 20:57:05 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") 2018/04/09 20:57:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x0, r1}}) 2018/04/09 20:57:05 executing program 1: unshare(0x400) 2018/04/09 20:57:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000004c0)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r0) 2018/04/09 20:57:05 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @broadcast=0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x200}) 2018/04/09 20:57:05 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") 2018/04/09 20:57:05 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x7f}, 0x1c) 2018/04/09 20:57:05 executing program 5: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)="6664001a000000") exit(0x0) getdents64(r1, &(0x7f00000004c0)=""/189, 0xfffffffffffffe49) 2018/04/09 20:57:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000004c0)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r0) 2018/04/09 20:57:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000), 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x2) sendfile(r1, r2, &(0x7f0000b89000), 0x8) 2018/04/09 20:57:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x0, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/09 20:57:05 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="f1f3c66180298a072fc2a1c227b15039", 0x10) 2018/04/09 20:57:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) shutdown(r0, 0x1) 2018/04/09 20:57:05 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89b0, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d29800009300") [ 68.920249] ================================================================== [ 68.927688] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 68.933761] CPU: 1 PID: 5647 Comm: syz-executor7 Not tainted 4.16.0+ #82 [ 68.940611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.949974] Call Trace: [ 68.952580] dump_stack+0x185/0x1d0 [ 68.956229] ? vmac_setkey+0x337/0x940 [ 68.960129] kmsan_report+0x142/0x240 [ 68.963975] ? arc4_set_key+0x540/0x540 [ 68.967968] __msan_warning_32+0x6c/0xb0 [ 68.972057] ? arc4_set_key+0x540/0x540 [ 68.976053] vmac_setkey+0x337/0x940 [ 68.979792] ? vmac_final+0x3f80/0x3f80 [ 68.983790] shash_async_setkey+0x337/0x4c0 [ 68.988135] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 68.993522] ? trace_kmalloc+0xb6/0x2b0 [ 68.997644] ? shash_async_digest+0x1b0/0x1b0 [ 69.002165] crypto_ahash_setkey+0x31a/0x470 [ 69.006599] hash_setkey+0x8b/0xa0 [ 69.010161] alg_setsockopt+0x6c5/0x740 [ 69.015263] ? hash_release+0x50/0x50 [ 69.019080] ? alg_accept+0xd0/0xd0 [ 69.022702] SYSC_setsockopt+0x4b8/0x570 [ 69.026768] SyS_setsockopt+0x76/0xa0 [ 69.030560] do_syscall_64+0x309/0x430 [ 69.034451] ? SYSC_recv+0xe0/0xe0 [ 69.037997] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 69.043183] RIP: 0033:0x455259 [ 69.046360] RSP: 002b:00007fdc132dbc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 69.054116] RAX: ffffffffffffffda RBX: 00007fdc132dc6d4 RCX: 0000000000455259 [ 69.061381] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 69.068638] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 69.075889] R10: 0000000020000180 R11: 0000000000000246 R12: 00000000ffffffff [ 69.083159] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 69.090427] [ 69.092043] Local variable description: ----out.i@vmac_setkey [ 69.097902] Variable was created at: [ 69.101630] vmac_setkey+0x93/0x940 [ 69.105945] shash_async_setkey+0x337/0x4c0 [ 69.110259] ================================================================== [ 69.117614] Disabling lock debugging due to kernel taint [ 69.123059] Kernel panic - not syncing: panic_on_warn set ... [ 69.123059] [ 69.130523] CPU: 1 PID: 5647 Comm: syz-executor7 Tainted: G B 4.16.0+ #82 [ 69.138746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.148102] Call Trace: [ 69.150690] dump_stack+0x185/0x1d0 [ 69.154331] panic+0x39d/0x940 [ 69.157531] ? vmac_setkey+0x337/0x940 [ 69.161417] kmsan_report+0x238/0x240 [ 69.165216] ? arc4_set_key+0x540/0x540 [ 69.169183] __msan_warning_32+0x6c/0xb0 [ 69.173231] ? arc4_set_key+0x540/0x540 [ 69.177205] vmac_setkey+0x337/0x940 [ 69.180936] ? vmac_final+0x3f80/0x3f80 [ 69.184908] shash_async_setkey+0x337/0x4c0 [ 69.189218] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 69.194580] ? trace_kmalloc+0xb6/0x2b0 [ 69.198560] ? shash_async_digest+0x1b0/0x1b0 [ 69.203070] crypto_ahash_setkey+0x31a/0x470 [ 69.207487] hash_setkey+0x8b/0xa0 [ 69.211040] alg_setsockopt+0x6c5/0x740 [ 69.215028] ? hash_release+0x50/0x50 [ 69.218829] ? alg_accept+0xd0/0xd0 [ 69.222449] SYSC_setsockopt+0x4b8/0x570 [ 69.226516] SyS_setsockopt+0x76/0xa0 [ 69.230325] do_syscall_64+0x309/0x430 [ 69.234210] ? SYSC_recv+0xe0/0xe0 [ 69.237761] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 69.242942] RIP: 0033:0x455259 [ 69.246133] RSP: 002b:00007fdc132dbc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 69.253832] RAX: ffffffffffffffda RBX: 00007fdc132dc6d4 RCX: 0000000000455259 [ 69.261088] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 69.268354] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 69.275618] R10: 0000000020000180 R11: 0000000000000246 R12: 00000000ffffffff [ 69.282878] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 69.290702] Dumping ftrace buffer: [ 69.294230] (ftrace buffer empty) [ 69.297914] Kernel Offset: disabled [ 69.301517] Rebooting in 86400 seconds..