INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2018/04/12 13:14:25 fuzzer started 2018/04/12 13:14:26 dialing manager at 10.128.0.26:41677 2018/04/12 13:14:32 kcov=true, comps=false 2018/04/12 13:14:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)='@vboxnet0proceth0\x00', 0x0, 0x0, &(0x7f0000000080)) 2018/04/12 13:14:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) 2018/04/12 13:14:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'dummy0\x00', 0x400}) 2018/04/12 13:14:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x3fffffe, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) 2018/04/12 13:14:34 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x2, &(0x7f0000000040)) 2018/04/12 13:14:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) 2018/04/12 13:14:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/12 13:14:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) recvmmsg(r0, &(0x7f0000002b00)=[{{&(0x7f00000000c0)=@nfc_llcp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/98, 0x62}, {&(0x7f00000001c0)=""/169, 0xa9}], 0x2, &(0x7f0000000340)=""/4096, 0x1000}}], 0x1, 0x40000063, &(0x7f0000002c80)={0x0, 0x989680}) syzkaller login: [ 43.110361] ip (3752) used greatest stack depth: 54672 bytes left [ 43.608941] ip (3797) used greatest stack depth: 54408 bytes left [ 45.143062] ip (3943) used greatest stack depth: 54160 bytes left [ 46.374432] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.533313] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.565167] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.607761] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.623912] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.656096] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.666007] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.773268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.345813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.432310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.449752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.469123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.501527] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.530010] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.545104] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.568466] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.096375] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.102623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.115552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.211168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.217438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.227468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.257628] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.263995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.280883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.294982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.301228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.315558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.333840] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.343016] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.353321] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.362941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.394640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.414748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.437511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.456637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.473629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.489534] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.508311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.529139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 13:14:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) 2018/04/12 13:14:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) 2018/04/12 13:14:52 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="140000000301ffff009f0406000000000008dda055254d6f0d03760b526c87cb030000008270764a412db8a7917c041e145fc847c193500fc3eb47e83555d007ee117e000000000000000000000000000040fe2dd059c29b174586d6ed9f7feb289ee4e76330407d1d2d5f82e3ce72882d025ee184e803768550958f59645cdfe63a2f570101a193cb0d8c141bc454f8faf5036abf038e90b430b802c56e161d7ad92454dc5c7335f3012256112cbb90f1ce75932dd58296576f28047a6db0af7950a649e93fee96cc1c6a34dc30b47df66e547127e6a243"], 0xd8}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={&(0x7f0000000680)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000007c0)=""/72, 0x48}, {&(0x7f0000000a00)=""/83, 0x53}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000b80)=""/71, 0x47}], 0x4, &(0x7f00000005c0)=""/129, 0x81}, 0x0) 2018/04/12 13:14:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f000001cb24)={0x14, 0x18, 0xffffffffffffffff, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 2018/04/12 13:14:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x0, 0x10000}}) 2018/04/12 13:14:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x400448cc, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)=0xf3) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) dup2(r0, r1) 2018/04/12 13:14:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d3, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:52 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x2) 2018/04/12 13:14:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000ac5000), 0x4) 2018/04/12 13:14:52 executing program 0: r0 = socket(0x2, 0x80000000000001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="ebd185d9fb51a29b83e1b57b4de86786", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="dd9a8d94b7ea6b0bd882f0c38b5031a5", 0x10) 2018/04/12 13:14:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x400448cb, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) [ 58.634480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 13:14:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/92, &(0x7f0000000080)=0x5c) [ 58.740857] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 13:14:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) 2018/04/12 13:14:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x202, 0x0) 2018/04/12 13:14:52 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f00000001c0)={0x2000d}) 2018/04/12 13:14:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x400448c9, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) 2018/04/12 13:14:52 executing program 5: 2018/04/12 13:14:52 executing program 1: 2018/04/12 13:14:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) 2018/04/12 13:14:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bpq0\x00', 0x10) 2018/04/12 13:14:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x2f, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @local={0xfe, 0x80, [], 0xffffffffffffffff}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/12 13:14:53 executing program 7: request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, &(0x7f0000000300)='/dev/audio#\x00', 0xfffffffffffffffb) 2018/04/12 13:14:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x9, "06f526", 0x8, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @local={0xfe, 0x80, [], 0xffffffffffffffff}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/12 13:14:53 executing program 6: 2018/04/12 13:14:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:53 executing program 0: 2018/04/12 13:14:53 executing program 6: 2018/04/12 13:14:53 executing program 1: 2018/04/12 13:14:53 executing program 2: 2018/04/12 13:14:53 executing program 0: 2018/04/12 13:14:53 executing program 4: 2018/04/12 13:14:53 executing program 5: 2018/04/12 13:14:53 executing program 7: 2018/04/12 13:14:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:53 executing program 1: 2018/04/12 13:14:53 executing program 6: 2018/04/12 13:14:53 executing program 5: 2018/04/12 13:14:53 executing program 7: 2018/04/12 13:14:53 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x2000, 0x0) 2018/04/12 13:14:53 executing program 0: 2018/04/12 13:14:53 executing program 2: 2018/04/12 13:14:53 executing program 4: 2018/04/12 13:14:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="d80fffaa8e09", [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "61d00ae5fcd3e5ad"}}}}, &(0x7f0000775000)) 2018/04/12 13:14:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) 2018/04/12 13:14:53 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x3fffffe, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) 2018/04/12 13:14:53 executing program 2: 2018/04/12 13:14:53 executing program 0: 2018/04/12 13:14:53 executing program 4: 2018/04/12 13:14:54 executing program 1: 2018/04/12 13:14:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'dummy0\x00', 0x400}) 2018/04/12 13:14:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:54 executing program 7: syz_emit_ethernet(0x4a, &(0x7f0000000580)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "6e221d", 0x14, 0x2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x4e20, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000ea3000)) 2018/04/12 13:14:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ifb0\x00', 0xe86824d2c1c833cb}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 2018/04/12 13:14:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f00007e0000)=""/4, &(0x7f0000369000)=0x4) 2018/04/12 13:14:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ifb0\x00', 0xe86824d2c1c833cb}) r1 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0xd}, @IFLA_GROUP={0x8, 0x1b}]}, 0x30}, 0x1}, 0x0) 2018/04/12 13:14:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f00000002c0)={{0x0, 0x7530}}, &(0x7f0000000300)) 2018/04/12 13:14:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000013000)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) 2018/04/12 13:14:54 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x3fffffe, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) 2018/04/12 13:14:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) sendto(0xffffffffffffffff, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:54 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000847000)={&(0x7f0000305fc4)=@getsa={0x3c, 0x12, 0x1f, 0x0, 0x0, {@in=@multicast1=0xe0000001}, [@srcaddr={0x14, 0xd, @in6=@loopback={0x0, 0x1}}]}, 0x3c}, 0x1}, 0x0) 2018/04/12 13:14:54 executing program 6: 2018/04/12 13:14:54 executing program 5: 2018/04/12 13:14:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f00007e0000)=""/4, &(0x7f0000369000)=0x4) 2018/04/12 13:14:54 executing program 4: 2018/04/12 13:14:54 executing program 1: 2018/04/12 13:14:54 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6006f5260008000000000000000000000000ffffe0000000ff00000000000890783db2f42eb84ea149b212bf1f8b2b4d40e6c5db39ec587a695f6c1bfe3108e9b92ce910bcfc27731bd56900d2bb7f97fcf96ccbdf678c3e96e15378fa1ffe617cfa52737c9bdc71650a28c086ee1b90adbf3141153d55e61ad41cce4134ea5e77cc3880a9c8a8d9ebb46f9a5fcbc1402d61e4de83690eb21a15c07d02265c75ca5f9e6459ee09d84a40f833c9234b8cc9222ed291cba0f3795d76afc4e065fe8e1c3b3c37df0717b92a733e0f6403b849e529607bd33b925326aaf84c6509bb2b05b86a65"], &(0x7f0000775000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x509]}) 2018/04/12 13:14:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f00007e0000)=""/4, &(0x7f0000369000)=0x4) 2018/04/12 13:14:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000001140)='BE|', 0x3) 2018/04/12 13:14:54 executing program 1: 2018/04/12 13:14:54 executing program 6: 2018/04/12 13:14:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:54 executing program 0: 2018/04/12 13:14:54 executing program 2: 2018/04/12 13:14:54 executing program 7: 2018/04/12 13:14:54 executing program 1: 2018/04/12 13:14:55 executing program 5: 2018/04/12 13:14:55 executing program 6: 2018/04/12 13:14:55 executing program 4: 2018/04/12 13:14:55 executing program 0: 2018/04/12 13:14:55 executing program 2: 2018/04/12 13:14:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:55 executing program 1: 2018/04/12 13:14:55 executing program 7: 2018/04/12 13:14:55 executing program 5: 2018/04/12 13:14:55 executing program 2: 2018/04/12 13:14:55 executing program 6: 2018/04/12 13:14:55 executing program 7: 2018/04/12 13:14:55 executing program 1: 2018/04/12 13:14:55 executing program 4: 2018/04/12 13:14:55 executing program 0: 2018/04/12 13:14:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:55 executing program 5: 2018/04/12 13:14:55 executing program 2: 2018/04/12 13:14:55 executing program 6: 2018/04/12 13:14:55 executing program 7: 2018/04/12 13:14:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) 2018/04/12 13:14:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x400448ca, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0xb) 2018/04/12 13:14:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r0) 2018/04/12 13:14:55 executing program 5: 2018/04/12 13:14:55 executing program 0: 2018/04/12 13:14:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:55 executing program 7: 2018/04/12 13:14:55 executing program 0: 2018/04/12 13:14:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 2018/04/12 13:14:55 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d4, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) 2018/04/12 13:14:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x7, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/12 13:14:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) 2018/04/12 13:14:55 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000000400), 0x0, 0x40000}, 0x4000010) 2018/04/12 13:14:55 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 2018/04/12 13:14:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') 2018/04/12 13:14:55 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x0, 0x80000001}) 2018/04/12 13:14:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) 2018/04/12 13:14:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448f0, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000780)=@migrate={0x100, 0x21, 0x203, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x0, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x0, 0xfb}, 0x6e6bb8}, [@algo_auth={0x54, 0x1, {{'crc32-pclmul\x00'}, 0x58, "767f5b9c770ba6445675c1"}}, @migrate={0x5c, 0x11, [{@in=@loopback=0x7f000001, @in6=@dev={0xfe, 0x80}, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @in6, 0x0, 0x5, 0x0, 0x0, 0x2}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x890}, 0x0) 2018/04/12 13:14:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @local={0xfe, 0x80, [], 0xffffffffffffffff}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/12 13:14:56 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x19, &(0x7f0000ac5000), 0x4) 2018/04/12 13:14:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000000)="0401000000e3cd682c4609ba9514816eae786e6d76030d20000000000000000000008085eddcde11e14d754d", 0x2c, 0x800, &(0x7f0000000080)={0xa, 0x800, 0x2, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/04/12 13:14:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/12 13:14:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x8983, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x280) 2018/04/12 13:14:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) 2018/04/12 13:14:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x0) 2018/04/12 13:14:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x0, 0x2000, 0x220, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/12 13:14:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc)={0x0, 0x0, 0xfffffffffffffffd}, 0x4) 2018/04/12 13:14:56 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d4, &(0x7f0000000600)={0x1fffff, &(0x7f0000000140)}) 2018/04/12 13:14:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 2018/04/12 13:14:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) 2018/04/12 13:14:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc)={0x0, 0x0, 0xfffffffffffffffd}, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @local={0xfe, 0x80, [], 0xffffffffffffffff}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/12 13:14:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x0, &(0x7f0000000140)}) 2018/04/12 13:14:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a", 0x3) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:56 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/12 13:14:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r0, 0xb) mlockall(0x3) 2018/04/12 13:14:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)=ANY=[@ANYBLOB="440100001a003306000000000000000000000000ffffffffffac1414bb0000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="ac1414000000000000000000000000000000000032000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000008001800000000004c0014006372637431306469662d70636c6d756c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3}, 0x1}, 0x0) 2018/04/12 13:14:56 executing program 6: getrandom(&(0x7f0000000140)=""/165, 0xa5, 0x3) 2018/04/12 13:14:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@noquota='noquota', 0x2c}]}) 2018/04/12 13:14:56 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) read(r0, &(0x7f0000000100)=""/63, 0x3f) 2018/04/12 13:14:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) 2018/04/12 13:14:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000900)=""/142, 0x8e}], 0x1, 0x0) 2018/04/12 13:14:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa, 0x108}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) 2018/04/12 13:14:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x84) 2018/04/12 13:14:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000ac5000), 0x4) 2018/04/12 13:14:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/76) 2018/04/12 13:14:57 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000040)={0x0, 0x3f}, &(0x7f0000000080)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 2018/04/12 13:14:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 2018/04/12 13:14:57 executing program 2: 2018/04/12 13:14:57 executing program 7: 2018/04/12 13:14:57 executing program 0: 2018/04/12 13:14:57 executing program 1: 2018/04/12 13:14:57 executing program 6: 2018/04/12 13:14:57 executing program 2: 2018/04/12 13:14:57 executing program 0: 2018/04/12 13:14:57 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0xc) 2018/04/12 13:14:57 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)) 2018/04/12 13:14:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:57 executing program 1: 2018/04/12 13:14:57 executing program 7: 2018/04/12 13:14:57 executing program 0: 2018/04/12 13:14:57 executing program 7: 2018/04/12 13:14:57 executing program 6: 2018/04/12 13:14:57 executing program 5: 2018/04/12 13:14:57 executing program 2: 2018/04/12 13:14:57 executing program 4: 2018/04/12 13:14:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:57 executing program 0: 2018/04/12 13:14:57 executing program 1: 2018/04/12 13:14:57 executing program 5: 2018/04/12 13:14:57 executing program 6: 2018/04/12 13:14:57 executing program 7: 2018/04/12 13:14:58 executing program 4: 2018/04/12 13:14:58 executing program 1: 2018/04/12 13:14:58 executing program 2: 2018/04/12 13:14:58 executing program 0: 2018/04/12 13:14:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022a2", 0x28, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:58 executing program 5: 2018/04/12 13:14:58 executing program 6: 2018/04/12 13:14:58 executing program 7: 2018/04/12 13:14:58 executing program 2: 2018/04/12 13:14:58 executing program 4: 2018/04/12 13:14:58 executing program 0: 2018/04/12 13:14:58 executing program 1: 2018/04/12 13:14:58 executing program 6: 2018/04/12 13:14:58 executing program 5: 2018/04/12 13:14:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:58 executing program 2: 2018/04/12 13:14:58 executing program 4: 2018/04/12 13:14:58 executing program 7: 2018/04/12 13:14:58 executing program 6: 2018/04/12 13:14:58 executing program 5: 2018/04/12 13:14:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 2018/04/12 13:14:58 executing program 0: 2018/04/12 13:14:58 executing program 2: 2018/04/12 13:14:58 executing program 4: 2018/04/12 13:14:58 executing program 7: 2018/04/12 13:14:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:58 executing program 5: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x400448c9, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 2018/04/12 13:14:58 executing program 6: 2018/04/12 13:14:58 executing program 0: 2018/04/12 13:14:58 executing program 2: 2018/04/12 13:14:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xb, 0x43, 0x4, 0x100000002, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180)='\'', &(0x7f0000eee000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000200), &(0x7f0000000100)=""/47}, 0x18) 2018/04/12 13:14:58 executing program 1: r0 = socket(0x1f, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000), 0x8) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f0000000ffc)) 2018/04/12 13:14:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:58 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4309(authenc(michael_mic-generic,chacha20-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="030058e758a741", 0x7) 2018/04/12 13:14:59 executing program 6: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x8, &(0x7f0000000000)={0x3, "bc34c9"}, 0x4) 2018/04/12 13:14:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x9, 0xe, 0x7b2, 0x1}, 0x16) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000001c0), &(0x7f00000004c0)=""/253}, 0x18) 2018/04/12 13:14:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000000240)={[{@flush='flush', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000180)="c6", 0x1, 0x0) close(r0) 2018/04/12 13:14:59 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x1) 2018/04/12 13:14:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x8}) 2018/04/12 13:14:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000300)="f006ec2d", 0x4) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000004c0)) 2018/04/12 13:14:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d", 0x14, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:59 executing program 6: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) connect$bt_rfcomm(r0, &(0x7f0000000ff7)={0x1f}, 0x76) poll(&(0x7f0000001000)=[{r0}], 0x1, 0x0) 2018/04/12 13:14:59 executing program 7: r0 = socket(0x1f, 0x2000002000000001, 0x3) accept$ipx(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 2018/04/12 13:14:59 executing program 2: r0 = socket$inet(0x2, 0x803, 0x5) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000680)={0x11, @multicast2=0xe0000002, 0x0, 0x0, 'lc\x00', 0x2a, 0x8, 0x2c}, 0x2c) 2018/04/12 13:14:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00009f2000)={&(0x7f000007cff4)={0x10}, 0x85c, &(0x7f0000226000)={&(0x7f00008bc000)={0x2c, 0x25, 0x2ff, 0x0, 0x0, {}, [@typed={0x7, 0x0, @u32}, @typed={0xc, 0x0, @u32}]}, 0x2c}, 0x1}, 0x0) 2018/04/12 13:14:59 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000f9b), 0x0) 2018/04/12 13:14:59 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x1a, &(0x7f0000000000), &(0x7f0000000040)=0x30) 2018/04/12 13:14:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd52", 0x1e, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000140)=0x54) 2018/04/12 13:14:59 executing program 1: r0 = syz_open_dev$urandom(&(0x7f000060f000)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, &(0x7f0000d78000)=""/12, 0xc, 0x0) 2018/04/12 13:14:59 executing program 7: rt_sigaction(0x0, &(0x7f0000000000), 0x0, 0x8, &(0x7f0000000040)) 2018/04/12 13:14:59 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000701000)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) [ 65.635074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/12 13:14:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b", 0x23, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:14:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d", 0x1}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/12 13:14:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xb, 0x43, 0x4, 0x100000002, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180)='\'', &(0x7f0000eee000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/84}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000200)="03", &(0x7f0000000100)=""/47}, 0x18) 2018/04/12 13:14:59 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/85, 0x55}, {&(0x7f0000000280)=""/191, 0xbf}, {&(0x7f0000000340)=""/65, 0x41}], 0x3, &(0x7f0000000400)=""/233, 0xe9, 0xfffffffffffffffb}, 0x40012020) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000540)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000600), &(0x7f0000698000)=0x4) socket$inet_sctp(0x2, 0x0, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000a34fff), 0x0, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f000026cfff), 0x0, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@mpls_newroute={0x1c, 0x18, 0x0, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00001afff8), 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000c60000), 0x10) write(0xffffffffffffffff, &(0x7f000052c000), 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000810000)={0x0, 0x1}, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00004b5ff0)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00007cdffc)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f000098dffc), 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), 0x8) bind$inet6(r1, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f00002a0b14), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto(r1, &(0x7f000092d000)="d5", 0x1, 0x1, &(0x7f0000ad9000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}}, 0x80) close(r1) 2018/04/12 13:14:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r0, &(0x7f0000002fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004fe0)=[{&(0x7f0000006000)="cf1616ca", 0x4}], 0x1, &(0x7f0000006000)}, 0x5dc) 2018/04/12 13:14:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000240)=""/43, 0x2b) 2018/04/12 13:14:59 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80002, 0x0) write$sndseq(r0, &(0x7f0000fbde80)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{0x81, 0x3}, 0x0, &(0x7f0000cdcfd0)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"d8ab0f014fb8ca604dbe1e54"}}}}], 0x30) 2018/04/12 13:15:00 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/mcfilter\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f000025d000), 0x3fc) 2018/04/12 13:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b10", 0x26, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) 2018/04/12 13:15:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000dd3f32), &(0x7f0000c95f34)}}, &(0x7f00009e4000)) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000d89fe0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/12 13:15:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1000000000003a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="1aa3", 0x2}], 0x1, &(0x7f0000000480)}, 0x8000) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000000)="0104", 0x2}], 0x1, &(0x7f0000000040)}, 0x0) 2018/04/12 13:15:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000461fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f000047efc8)={0x0, 0x0, &(0x7f000007afe0)=[{&(0x7f0000bf4fa8)="8d", 0x1}], 0x1, &(0x7f000048b000)}, 0x0) io_setup(0x100000001, &(0x7f0000f69000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/12 13:15:00 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 2018/04/12 13:15:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001040)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 2018/04/12 13:15:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000002c0)={"6d616e676c650200", 0x2, [{}, {}]}, 0x48) [ 66.243320] ================================================================== [ 66.250736] BUG: KMSAN: uninit-value in rawv6_sendmsg+0x4bee/0x4cc0 [ 66.257134] CPU: 0 PID: 5818 Comm: syz-executor2 Not tainted 4.16.0+ #83 [ 66.263964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.273308] Call Trace: [ 66.275902] dump_stack+0x185/0x1d0 [ 66.279532] ? rawv6_sendmsg+0x4bee/0x4cc0 [ 66.283801] kmsan_report+0x142/0x240 [ 66.287629] __msan_warning_32+0x6c/0xb0 [ 66.291690] rawv6_sendmsg+0x4bee/0x4cc0 [ 66.295764] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 66.301130] ? rw_copy_check_uvector+0x5af/0x6c0 [ 66.305904] ? compat_rawv6_ioctl+0x30/0x30 [ 66.310224] inet_sendmsg+0x48d/0x740 [ 66.314027] ? security_socket_sendmsg+0x9e/0x210 [ 66.318875] ? inet_getname+0x500/0x500 [ 66.322848] ___sys_sendmsg+0xec0/0x1310 [ 66.326917] ? __fdget+0x4e/0x60 [ 66.330286] ? __fget_light+0x56/0x710 [ 66.334169] ? __fdget+0x4e/0x60 [ 66.337535] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 66.342897] ? __fget_light+0x6b9/0x710 [ 66.346876] SYSC_sendmsg+0x2a3/0x3d0 [ 66.350682] SyS_sendmsg+0x54/0x80 [ 66.354228] do_syscall_64+0x309/0x430 [ 66.358117] ? ___sys_sendmsg+0x1310/0x1310 [ 66.362446] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.367631] RIP: 0033:0x455279 [ 66.370811] RSP: 002b:00007f1ea34a4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 66.378516] RAX: ffffffffffffffda RBX: 00007f1ea34a56d4 RCX: 0000000000455279 [ 66.385783] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000013 [ 66.393048] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 66.400315] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 66.407578] R13: 00000000000004cc R14: 00000000006fa3c0 R15: 0000000000000000 [ 66.414844] [ 66.416456] Uninit was stored to memory at: [ 66.420777] kmsan_internal_chain_origin+0x12b/0x210 [ 66.425875] kmsan_memcpy_origins+0x11d/0x170 [ 66.430371] __msan_memcpy+0x19f/0x1f0 [ 66.434261] skb_copy_bits+0x63a/0xdb0 [ 66.438145] rawv6_sendmsg+0x427e/0x4cc0 [ 66.442204] inet_sendmsg+0x48d/0x740 [ 66.446005] ___sys_sendmsg+0xec0/0x1310 [ 66.450065] SYSC_sendmsg+0x2a3/0x3d0 [ 66.453862] SyS_sendmsg+0x54/0x80 [ 66.457396] do_syscall_64+0x309/0x430 [ 66.461280] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.466457] Uninit was created at: [ 66.469999] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 66.475007] kmsan_alloc_page+0x82/0xe0 [ 66.478983] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 66.483734] alloc_pages_current+0x6b5/0x970 [ 66.488148] skb_page_frag_refill+0x3ba/0x5e0 [ 66.492655] sk_page_frag_refill+0xa4/0x340 [ 66.496977] __ip6_append_data+0x1a20/0x4bb0 [ 66.501382] ip6_append_data+0x40e/0x6b0 [ 66.505439] rawv6_sendmsg+0x2787/0x4cc0 [ 66.509499] inet_sendmsg+0x48d/0x740 [ 66.513295] ___sys_sendmsg+0xec0/0x1310 [ 66.517351] SYSC_sendmsg+0x2a3/0x3d0 [ 66.521148] SyS_sendmsg+0x54/0x80 [ 66.524683] do_syscall_64+0x309/0x430 [ 66.528576] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.533754] ================================================================== 2018/04/12 13:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cd", 0x5) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="8d85c86e46e8ef4fea219de5c76d9408bbfeca0d9741e1a0c43669d9bd527f6cd4cf5b0e1b1022", 0x27, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/144, 0x90}}], 0x1, 0x0, 0x0) [ 66.541100] Disabling lock debugging due to kernel taint [ 66.546542] Kernel panic - not syncing: panic_on_warn set ... [ 66.546542] [ 66.553908] CPU: 0 PID: 5818 Comm: syz-executor2 Tainted: G B 4.16.0+ #83 [ 66.562041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.571383] Call Trace: [ 66.573970] dump_stack+0x185/0x1d0 [ 66.577597] panic+0x39d/0x940 [ 66.580806] ? rawv6_sendmsg+0x4bee/0x4cc0 [ 66.585034] kmsan_report+0x238/0x240 [ 66.588836] __msan_warning_32+0x6c/0xb0 2018/04/12 13:15:00 executing program 4: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x14, 0x10}, 0x14}, 0x1}, 0x0) [ 66.592894] rawv6_sendmsg+0x4bee/0x4cc0 [ 66.596959] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 66.602321] ? rw_copy_check_uvector+0x5af/0x6c0 [ 66.607092] ? compat_rawv6_ioctl+0x30/0x30 [ 66.611406] inet_sendmsg+0x48d/0x740 [ 66.615204] ? security_socket_sendmsg+0x9e/0x210 [ 66.620050] ? inet_getname+0x500/0x500 [ 66.624020] ___sys_sendmsg+0xec0/0x1310 [ 66.628083] ? __fdget+0x4e/0x60 [ 66.631442] ? __fget_light+0x56/0x710 [ 66.635325] ? __fdget+0x4e/0x60 [ 66.638687] ? __msan_metadata_ptr_for_load_1+0x10/0x20 2018/04/12 13:15:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4b, &(0x7f0000000180)={@loopback={0x0, 0x1}}, 0x20) 2018/04/12 13:15:00 executing program 6: r0 = socket$inet(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x29, 0x13, &(0x7f0000000080)={0x0, 'ip6gretap0\x00'}, 0x18) [ 66.644055] ? __fget_light+0x6b9/0x710 [ 66.648037] SYSC_sendmsg+0x2a3/0x3d0 [ 66.651844] SyS_sendmsg+0x54/0x80 [ 66.655383] do_syscall_64+0x309/0x430 [ 66.659277] ? ___sys_sendmsg+0x1310/0x1310 [ 66.663607] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.668792] RIP: 0033:0x455279 [ 66.671973] RSP: 002b:00007f1ea34a4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 66.680212] RAX: ffffffffffffffda RBX: 00007f1ea34a56d4 RCX: 0000000000455279 [ 66.687479] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000013 [ 66.694740] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 66.702007] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 66.709273] R13: 00000000000004cc R14: 00000000006fa3c0 R15: 0000000000000000 [ 66.716954] Dumping ftrace buffer: [ 66.720471] (ftrace buffer empty) [ 66.724155] Kernel Offset: disabled [ 66.727756] Rebooting in 86400 seconds..