[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.063792] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 19.943924] random: sshd: uninitialized urandom read (32 bytes read) [ 20.205514] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.031585] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. [ 26.532214] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/06 23:11:52 fuzzer started 2018/05/06 23:11:52 dialing manager at 10.128.0.26:34507 [ 31.603353] random: crng init done [ 54.772958] can: request_module (can-proto-0) failed. [ 54.782269] can: request_module (can-proto-0) failed. 2018/05/06 23:12:22 kcov=true, comps=true 2018/05/06 23:12:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 2018/05/06 23:12:28 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) fchown(r1, 0x0, 0x0) 2018/05/06 23:12:28 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x12, 0x9, &(0x7f0000000040)="d749b72d0db51f4b2e"}) 2018/05/06 23:12:28 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) 2018/05/06 23:12:28 executing program 3: syz_read_part_table(0x0, 0x5, &(0x7f0000001600)=[{&(0x7f00000002c0)="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", 0x147, 0x81}, {&(0x7f0000000140)="127e2a2f04e2692fda053758067d886aaabd2457edac3824f69630d1a5ff56e603e314b742617b97b17048ba407732783bee667c6898ff555ebf7df5b114274b23a03b1294496412f046d0", 0x4b, 0x77}, {&(0x7f0000001380)="fa05896992059768c331b3f4b7a94744264807d6fc083bf625e427f50619df9154e548aa37a5eb14fc58e11351877dbc045300e5e5f41da531ff7933f7e33c8a5b14c9e1b070dbd69f0cba4ce7060c0feca2b3587dc5850d0ee97149d471e8bc7d96f4482a7e390426bbda4851467d4d0101c1b306964d72551e463723bb8b898438faac39117fd9f5fdeb6200581b4dd589e46245621ce2386a7ac0baad5065", 0xa0, 0x9}, {&(0x7f0000000200)="f42799e6c0c22552ba156d7b19de5235af47210cfbe56f9cf8aadf61", 0x1c, 0x9}, {&(0x7f0000000240)="07e62a04a415d04f7552beb1bcc38957cb2fb7b7a319e58579022192ccb41827189074d6b97dc567ecde262bf71e4996a7", 0x31}]) 2018/05/06 23:12:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x4000800}, 0xc) 2018/05/06 23:12:28 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x8) 2018/05/06 23:12:28 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6_vti0\x00', 0x10) [ 63.411258] IPVS: ftp: loaded support on port[0] = 21 [ 63.419668] IPVS: ftp: loaded support on port[0] = 21 [ 63.439165] IPVS: ftp: loaded support on port[0] = 21 [ 63.494486] IPVS: ftp: loaded support on port[0] = 21 [ 63.529204] IPVS: ftp: loaded support on port[0] = 21 [ 63.548518] IPVS: ftp: loaded support on port[0] = 21 [ 63.554567] IPVS: ftp: loaded support on port[0] = 21 [ 63.564262] IPVS: ftp: loaded support on port[0] = 21 [ 65.623821] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.630410] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.644133] device bridge_slave_0 entered promiscuous mode [ 65.689349] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.695925] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.727993] device bridge_slave_0 entered promiscuous mode [ 65.754852] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.761366] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.785862] device bridge_slave_0 entered promiscuous mode [ 65.794884] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.801325] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.814255] device bridge_slave_0 entered promiscuous mode [ 65.824188] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.830666] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.838434] device bridge_slave_1 entered promiscuous mode [ 65.856616] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.863086] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.873195] device bridge_slave_0 entered promiscuous mode [ 65.883297] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.889712] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.909502] device bridge_slave_0 entered promiscuous mode [ 65.921563] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.928009] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.936858] device bridge_slave_1 entered promiscuous mode [ 65.945702] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.952177] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.960630] device bridge_slave_0 entered promiscuous mode [ 65.970145] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.976578] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.995991] device bridge_slave_1 entered promiscuous mode [ 66.002947] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.009375] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.021248] device bridge_slave_1 entered promiscuous mode [ 66.030880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.038521] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.044941] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.060951] device bridge_slave_0 entered promiscuous mode [ 66.077276] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.083749] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.091560] device bridge_slave_1 entered promiscuous mode [ 66.101951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.111149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.122186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.135422] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.141888] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.168366] device bridge_slave_1 entered promiscuous mode [ 66.189694] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.196190] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.208395] device bridge_slave_1 entered promiscuous mode [ 66.216250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.234321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.242929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.254891] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.261349] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.296909] device bridge_slave_1 entered promiscuous mode [ 66.318352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.330135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.341355] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.349600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.391447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.435680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.463991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.513700] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.524279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.579567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.676588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.702258] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.723842] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.752409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.825691] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.840130] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.863431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.878319] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.904209] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.919548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.973485] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.991552] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.042396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 67.065884] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.110040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.117167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.142315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.149251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.168598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.175624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.194189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.214172] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.223285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.230260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.243766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.277397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.284841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.303488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.325136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.344991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.363269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.397793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.410382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.425976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.440470] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.464292] team0: Port device team_slave_0 added [ 67.476135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.530989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.541574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.577625] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.594278] team0: Port device team_slave_1 added [ 67.645568] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.658929] team0: Port device team_slave_0 added [ 67.664448] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.671888] team0: Port device team_slave_0 added [ 67.701927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.718400] team0: Port device team_slave_0 added [ 67.731542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 67.748379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.767334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.794235] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.807482] team0: Port device team_slave_0 added [ 67.829044] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.841012] team0: Port device team_slave_1 added [ 67.851991] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.865957] team0: Port device team_slave_0 added [ 67.872805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.886091] team0: Port device team_slave_1 added [ 67.894764] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.907264] team0: Port device team_slave_1 added [ 67.926567] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.937779] team0: Port device team_slave_1 added [ 67.948781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.966734] team0: Port device team_slave_0 added [ 67.981218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.995225] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 68.004159] team0: Port device team_slave_0 added [ 68.012195] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 68.020123] team0: Port device team_slave_1 added [ 68.027723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.042875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.062730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.088846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.106670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.124661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.143327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 68.150713] team0: Port device team_slave_1 added [ 68.158133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.179965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.203345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.227822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.250933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.258900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.266619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.275866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.283870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.292403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.302161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.313184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.321902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.329389] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 68.341704] team0: Port device team_slave_1 added [ 68.359300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 68.367899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.375878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.393856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.428448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.447942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.455665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.463671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.471427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.479301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.486759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.494567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.503923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.511299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.519476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.531687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.546553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.555995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.566795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.582246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.604254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.619770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.632279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.640542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.649164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.656761] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.664038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 68.670933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.679504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.693212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.711451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.726461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.734457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.744479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.751628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.760117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.773990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.784108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.796760] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.810330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.823102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.852323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.885340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.904808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.912676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.920630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.928398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.936294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.956533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.969487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.980354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.000540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.033143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.056837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.102122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 69.109869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.119119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.055195] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.061752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.068807] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.075215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.104412] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.126867] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.133328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.140058] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.146472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.166738] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.183419] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.189857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.196549] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.202949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.210802] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.230242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.244136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.275699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.319890] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.326340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.333076] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.339478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.365612] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.374421] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.380845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.387472] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.393860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.402073] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.419718] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.426145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.432792] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.439193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.461136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.587645] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.594079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.600761] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.607129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.629465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.642553] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.648983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.655687] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.662096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.671661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 71.263318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.278806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.297262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.304624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.312675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.263778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.370168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.393810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.511456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.653209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.676150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.706664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.745710] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.753458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.864546] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.877448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.067661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.124543] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.158368] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.180230] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.186463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.197531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.228276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.266564] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.346708] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.353138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.360821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.391778] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.398472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.413729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.589789] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.596228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.611345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.655006] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.661353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.675851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.713775] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.720131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.731213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.764677] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.771792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.783576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.801784] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.813200] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.824257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.849804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.886658] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.922725] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.042916] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.255427] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.284886] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.305180] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.322716] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/06 23:12:45 executing program 5: 2018/05/06 23:12:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') getdents(r0, &(0x7f00000002c0)=""/143, 0x8f) 2018/05/06 23:12:45 executing program 4: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x2, 0x0) write(r1, &(0x7f000006e000), 0xfffffdd8) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000080), 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) pipe2(&(0x7f0000000300), 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000013) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) 2018/05/06 23:12:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) pread64(r0, &(0x7f0000000180)=""/217, 0xd9, 0x0) 2018/05/06 23:12:45 executing program 5: r0 = memfd_create(&(0x7f00000005c0)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da49550403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d758337ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70f42b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0x3) write(r0, &(0x7f0000000240)='v', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0xffff) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 2018/05/06 23:12:45 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000340)="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") fgetxattr(r0, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000040), 0xb9) 2018/05/06 23:12:45 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x3bb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/05/06 23:12:45 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) socketpair(0x0, 0x3, 0x40, &(0x7f0000000000)) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000040)=0x7) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f000008affd)='nv\x00', 0x39d) shutdown(r0, 0x1) 2018/05/06 23:12:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) sendmsg(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000280)="e619", 0x2}], 0x1, &(0x7f0000026000)}, 0x2000c080) write(r0, &(0x7f0000000000)="e99978a76319", 0x6) 2018/05/06 23:12:46 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f00000009c0)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000001c0)='*', &(0x7f00000002c0)=""/209}, 0x18) 2018/05/06 23:12:46 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x20) 2018/05/06 23:12:46 executing program 6: io_setup(0x803, &(0x7f00000004c0)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], &(0x7f0000000000)={0x4000000000001, 0x7}) seccomp(0x0, 0x0, &(0x7f0000044ff0)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000500)=':+lo#\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)}]) 2018/05/06 23:12:46 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000001680)=[{&(0x7f00000015c0)}], 0x0, &(0x7f0000001740)) 2018/05/06 23:12:46 executing program 5: pipe2(&(0x7f00007f2000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000001440)=[{&(0x7f0000000000)="4f0302caac6077fa895bac62f3cfb4cac8551c17a997b752c23431e0015c52eed34acea235838161e7452461b80b24dfdfdf9c019cc3b7ebca628c8b097860051c8f327af9ad9b670cad3c0af2805e77653185df6d17ddbc01e96143f76d57d47b0478c5b0c8fcdafe77d09663e88c460ff7a24a7f0af52be753a1b0a2b034979b59fabf48d6483cbb2e13b234dc6e4077569bf6f88bb04306e3e561e4763cdd610d7c72967238a0d9fe7f7a09a7b5e74f9bf0ffdaa94f06bb", 0xb9}, {&(0x7f0000000180)="3428681a244b37b30f4ad567d18ef07862e977b4bae195fa61038537d3e9", 0x1e}, {&(0x7f0000000200)="be8d11dfbf724594b4bb38bc2c1111a4f44858c9cd57d1128563f0da360ab2b5a6a603aa755479bd2a316ee3acf4acd254e34d736021fde624f5125947c68d7ff40091745ed2c00c864c93d5947a55c0a78c4235", 0x54}, {&(0x7f0000001280)="dba3c56cb84aa20c785001fdc41b492f7781f0682181805031c26768ab143165499e1c83ec27deac81", 0x29}, {&(0x7f0000001380)="61c2d1ebbe996056908818750b0415e9998eba409fe97cbf27d8370dda5fc5bb730501586aca3dedf308a6e5b84d333949dfe741a0055629042dc9f0c7b2299e9754e778b4f7b7591cc5d1af5a693768fcf710d08bc040b5bb4d41886259c8c9750731307f5af329208c93349823d8c1ad9be0517ce4ad661cf96d0d44379981e0a36eb14af046106e", 0x89}], 0x5, 0x0) 2018/05/06 23:12:46 executing program 4: msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/55) 2018/05/06 23:12:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 2018/05/06 23:12:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000180)=0x68) r3 = open(&(0x7f0000000040)='./file0\x00', 0x402, 0xc0) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000080)=0x2, &(0x7f0000000100)=0x4) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={"627269646765300000000000000400", 0x22001}) 2018/05/06 23:12:47 executing program 0: process_vm_writev(0x0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/231, 0xe7}], 0x1, &(0x7f00000007c0)=[{&(0x7f0000000740)=""/106, 0x6a}], 0x1, 0x0) 2018/05/06 23:12:47 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000400)="97", 0x1, 0xffffffffffffffff) 2018/05/06 23:12:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) io_setup(0x7, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00001b0000)='l', 0x1}]) io_destroy(r1) shutdown(r0, 0x0) 2018/05/06 23:12:47 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000700)}, {&(0x7f0000000400), 0x0, 0x8}]) 2018/05/06 23:12:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000080)=""/217) 2018/05/06 23:12:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={&(0x7f000087fff4)={0x10}, 0xc, &(0x7f0000a40000)={&(0x7f0000b9e000)=ANY=[@ANYBLOB="b8000000210011040000000000000000e0000001000000000000000000000000ff01000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000005c00110000000000000000000000000000000001e0000002000000000000000000000000000000000000000000000000ff010000000000000000000000000001ff01000000000000000000000000000100000000000000000000fabbb3d0b03a7000000c00100005"], 0x3}, 0x1}, 0x0) 2018/05/06 23:12:47 executing program 6: r0 = shmget$private(0x0, 0x2000, 0x11, &(0x7f0000ff8000/0x2000)=nil) r1 = shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x7000) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) shmdt(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x40000000020) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e21, 0x8, @loopback={0x0, 0x1}, 0xa374}}, 0xf8000, 0xffffffffffff0001, 0x8, 0x100000000000007f, 0x100000004}, &(0x7f0000000580)=0x98) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000880)={r4, @in={{0x2, 0x4e23, @loopback=0x7f000001}}}, 0x325) write$cgroup_pid(r3, &(0x7f0000000580)=ANY=[], 0xa83f9ba3) unlink(&(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) mkdir(&(0x7f0000000600)='./file0\x00', 0xfffffffffffffffa) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)="61740002970f", 0x1029, &(0x7f0000000000)) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)=ANY=[]) umount2(&(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffc) r5 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r5, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semtimedop(r5, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000100)={0x0, 0x989680}) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000380)=[0x8c38, 0x7, 0x6, 0x6, 0x5]) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x3) accept4$inet(r3, &(0x7f00000002c0)={0x0, 0x0, @dev}, &(0x7f0000000000)=0x10, 0x80000) acct(&(0x7f0000000840)='./file0\x00') futex(&(0x7f0000000140), 0x0, 0x4, &(0x7f0000564000)={0x77359400}, &(0x7f0000000080), 0x0) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x2) r7 = memfd_create(&(0x7f0000000740)='^)mime_type(\x00', 0x3) linkat(r7, &(0x7f0000000780)='./file0/file0\x00', r6, &(0x7f00000007c0)='./file0\x00', 0x400) 2018/05/06 23:12:47 executing program 4: ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x8, 0x0, "7c6466b48e820ef5080e1706c24e1d02d7136e029bfe6fdeeed6db357e9818f0373f71c64cfcbfd93e6e525164337a97345146790fd3f0b4bd8455577279239c61e2fe16a59f804b41c845ac9d947213"}, 0xd8) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/05/06 23:12:47 executing program 0: r0 = socket$kcm(0x2, 0x4000000001, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "08c79f967ae350b8335bd36c1d5aa605e9c0dedb6c68689d14b03a7186fa6173d30e2dc2eb40e6ce424a674c63662b119124e0e1678f8ee79ff021926670f7"}, 0x80, &(0x7f0000000080), 0x391}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89a0, &(0x7f0000000000)) 2018/05/06 23:12:47 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000100)='./file0//./..\x00', &(0x7f00000001c0)='./file0//./..\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000400)) 2018/05/06 23:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4042) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) 2018/05/06 23:12:47 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:47 executing program 1: unshare(0x60000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/05/06 23:12:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000340)=0x0) syz_open_procfs(r2, &(0x7f00000001c0)='autogroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000003ff6)=@un=@file={0x0, './file0\x00'}, 0xa) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) [ 82.057766] hrtimer: interrupt took 32143 ns [ 82.062674] IPVS: ftp: loaded support on port[0] = 21 2018/05/06 23:12:48 executing program 4: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x0, 0x1, 0x9}) mq_timedsend(r0, &(0x7f0000000140), 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f000066c000), 0x0, 0x0, &(0x7f000058eff0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000000200)=""/131, 0x83, 0x0, 0x0) 2018/05/06 23:12:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x52b, 0x8000) 2018/05/06 23:12:48 executing program 1: socketpair$inet(0x1e, 0x4, 0x0, &(0x7f0000000080)={0x0}) sendmsg(r0, &(0x7f0000001840)={&(0x7f0000f18000)=@in={0x1e, 0x300, @multicast1=0xe0000001}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000001800)}, 0x0) 2018/05/06 23:12:48 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:48 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000b90ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000340), 0x20) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f000082ef0a)=""/246) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 2018/05/06 23:12:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000340)=0x0) syz_open_procfs(r2, &(0x7f00000001c0)='autogroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000003ff6)=@un=@file={0x0, './file0\x00'}, 0xa) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) 2018/05/06 23:12:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 2018/05/06 23:12:48 executing program 6: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) 2018/05/06 23:12:48 executing program 2: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)) 2018/05/06 23:12:48 executing program 1: socketpair$inet(0x1e, 0x4, 0x0, &(0x7f0000000080)={0x0}) sendmsg(r0, &(0x7f0000001840)={&(0x7f0000f18000)=@in={0x1e, 0x300, @multicast1=0xe0000001}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000001800)}, 0x0) 2018/05/06 23:12:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1000006) readv(0xffffffffffffffff, &(0x7f0000000080), 0x0) mmap(&(0x7f00006ff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='/dev/ashmem\x00') 2018/05/06 23:12:48 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, {0x2, 0x0, @multicast1=0xe0000001}, 0x14c}) 2018/05/06 23:12:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) 2018/05/06 23:12:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f0000c57ff8)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmsg(r1, &(0x7f00003d6fc8)={&(0x7f0000698000)=@generic, 0x80, &(0x7f000081afd0), 0x0, &(0x7f0000f9fff8)=""/90, 0x5a}, 0x0) 2018/05/06 23:12:49 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000140)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/05/06 23:12:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) gettid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x200002, 0xa}) getpeername(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) 2018/05/06 23:12:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) 2018/05/06 23:12:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xea2000)=nil, 0xea2000, 0x0, 0x10, r0, 0x0) 2018/05/06 23:12:49 executing program 2: r0 = socket$kcm(0xa, 0x200000005, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x80, &(0x7f0000000000)=[{&(0x7f0000001680)='?', 0x1}], 0x1, &(0x7f0000000740)=ANY=[]}, 0x20000841) 2018/05/06 23:12:49 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) close(r0) 2018/05/06 23:12:49 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x8000000020011, r0, 0x0) syslog(0x3, &(0x7f0000000040)=""/4096, 0xb743478b0b68caf0) 2018/05/06 23:12:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000900)={0x0, 0x7530}, 0x10) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)) 2018/05/06 23:12:49 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/05/06 23:12:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00007d7f41), 0x1}], 0x1a1, 0x0) 2018/05/06 23:12:49 executing program 1: timer_create(0x3, &(0x7f0000366000)={0x0, 0x21}, &(0x7f0000aef000)) seccomp(0x1, 0x0, &(0x7f0000e8c000)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) timer_delete(0x0) [ 84.273373] syz-executor2 (6767) used greatest stack depth: 13544 bytes left 2018/05/06 23:12:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f0000000340)={0xa}, 0x1c) sendmsg(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x0) 2018/05/06 23:12:49 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f7000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 2018/05/06 23:12:50 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000), 0x4) [ 84.578503] audit: type=1326 audit(1525648370.103:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6810 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 2018/05/06 23:12:50 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300090a0000000000000000000000030006000000000002000000e0000001000000000000000002000100000000000000000200000000030005000000000002000000e00000010000000000000000a526049faabbd4849e176f67af1d6308649f4e6b737b516f7149a43e7faab7ffa3367e64930679b1fd0fca2cf4ca15b8a4800b0f4030063c0638888fcc778d13e7211637a07d1acf314829ae3db6ee0bfdc91cfdcf39927807fa97887ca8b9bafd92e20b5e63635492ce29d0a02a387ae7b93231a159647944"], 0xc9}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/05/06 23:12:50 executing program 6: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600c70100000000000000000000000000aafe800000000000aa00004e200000000000000000", @ANYRES32=0x41424344, @ANYBLOB="500200009078efff"], &(0x7f00000002c0)) 2018/05/06 23:12:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000040)='./file0/file0\x00') rmdir(&(0x7f00000000c0)='./file0\x00') 2018/05/06 23:12:50 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x291) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet(r1, &(0x7f00000001c0)="ac139ea8dba7fd4e3eeb5b20c9c31e72757dcada00ffdec470e4a87e13f14dc37bb7de13c225adf2f5410a7b0c7a168d4af601e631a64f4f5b99e773f336c6d5188600172dcf19296d1585218e50c580f2fd722bfc95536f09196a54a68345171dc7ea3603ed4717952e1447f298f1d59b9af8b49f52", 0x76, 0x40001, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/05/06 23:12:50 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000480)=""/138, 0x8a}], 0x1, 0x0) 2018/05/06 23:12:50 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/06 23:12:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="240000001300090e000000000000000007000000", @ANYBLOB="000000000000000004000c80"], 0x2}, 0x1}, 0x0) [ 85.340324] audit: type=1326 audit(1525648370.865:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6810 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 2018/05/06 23:12:50 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x80247008, &(0x7f0000000140)) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 2018/05/06 23:12:50 executing program 1: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback=0x7f000001, @in=@multicast2=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffd}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x33}, 0x0, @in=@broadcast=0xffffffff}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) 2018/05/06 23:12:50 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000002040)=""/4096, 0x1000}], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@rand_addr, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000002c0)={'ifb0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) setfsuid(r1) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000001000)={0x14, 0x42, 0x2ff}, 0x14}, 0x1}, 0x0) 2018/05/06 23:12:51 executing program 6: getsockopt$ipx_IPX_TYPE(0xffffffffffffffff, 0x100, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x0, &(0x7f0000000180)) 2018/05/06 23:12:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0xffffffffffffffff, 0x100032, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 2018/05/06 23:12:51 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb855) accept4$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) 2018/05/06 23:12:51 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000580)="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", 0xfc) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000a07fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) recvfrom$ipx(r0, &(0x7f0000000440)=""/18, 0x0, 0x0, 0x0, 0x1cc) 2018/05/06 23:12:51 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000380)="74086e750000000000000000cdb700", 0x0) timer_create(0x7, &(0x7f0000000300)={0x0, 0x0, 0x1}, &(0x7f0000000400)) timer_gettime(0x0, &(0x7f00000004c0)) 2018/05/06 23:12:51 executing program 6: pipe2(&(0x7f0000000180)={0x0, 0x0}, 0x0) io_setup(0x94f4, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000001540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200)="19", 0x1}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x20000000001, 0x31, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="86a03297eb066061ebe8f8a401330600567a5c0ce111cb296194a3a2f2a781e638f8fbc62bc20dbcfac687339611b62ef05a464a41f808c60b134e3eb62a16b770d5f4251490e19579fac6bea9461430e1e9de0e2a0fdb1d74b806bbb948639fd8f619787649cf9301bade5dc8617f7c63a6da4609ed31fa74c584f61442fa441cbf10d1c6028414f29f0497e551d2fbd366cfbea4a025f2c28eab6417048d82c75130ec7aa4d263c71063f28c033e6d71d61b5c479c2a86d93347cb9722e9686abafdb40e67b8ce8483b6e3351ee40221e810947f307336a150749df977a50815594730a69592416135fd359447f7bdbfcdb97e896f5ae81dcdd06d686956f0c160e8de20a4597399"], 0x1) 2018/05/06 23:12:51 executing program 1: fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000000c0)={0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETSW(r0, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x80000000}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0x47c}], 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x81) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'teql0\x00'}) fcntl$setownex(r1, 0xf, &(0x7f0000000100)) close(r0) syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x00') 2018/05/06 23:12:51 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0xa9) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/06 23:12:51 executing program 2: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7f, 0x200) 2018/05/06 23:12:51 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000000)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2018/05/06 23:12:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x5) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 2018/05/06 23:12:51 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000340)="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") fgetxattr(r0, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000040), 0x0) [ 86.455772] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 2018/05/06 23:12:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4) sendto$inet6(r0, &(0x7f0000adb000)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 86.529832] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 2018/05/06 23:12:52 executing program 3: syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) 2018/05/06 23:12:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x8000000020011, r0, 0x0) syslog(0x3, &(0x7f0000000040)=""/4096, 0xb743478b0b68caf0) 2018/05/06 23:12:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f0000000400)='./file0\x00', &(0x7f0000cbeff8)='.', &(0x7f0000000440)='ramfs\x00', 0x2000, &(0x7f000002f000)) mount(&(0x7f0000000140)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/05/06 23:12:52 executing program 4: 2018/05/06 23:12:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) [ 86.712380] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 86.781831] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 2018/05/06 23:12:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x40406301, {0x3, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x68, 0x10, &(0x7f00000001c0)=[@ptr={0x70742a85, 0x1, &(0x7f00000000c0), 0x1, 0x4, 0x3d}, @fda={0x66646185, 0x8, 0x3, 0x33}, @fda={0x66646185, 0x3, 0x3, 0x31}], &(0x7f0000000140)=[0x28, 0x40]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="05630440000000000e631640000000002fc268355083b4544d68065233dedb62ddb8190f630551e53db03139797fb57a7abd194b462f04c18fc66cf590a7066fed06086ce6b5202b9941c8de5cbff104dfac5d67baf22af43a7c2b72e9a3fe36845a668c514e4e66410e1037daa5594b12ae9522896d3e29c7394b6c5e1a2eed32892d40cb67c647467bbd553c64b9e768565b070bd39412e26ca7d7783309913c0153abd00848a97ea5c2e4e0f2031d0e8017486a"], 0xe9, 0x0, &(0x7f0000000580)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000180)=[@request_death={0x400c630e, 0x3, 0x1}], 0xffffffffffffffab, 0x0, &(0x7f00000000c0)}) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x111080) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000003c0)={0xffffffffffffffff, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000400)={r2, 0x810e}) 2018/05/06 23:12:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:52 executing program 4: 2018/05/06 23:12:52 executing program 5: 2018/05/06 23:12:52 executing program 2: 2018/05/06 23:12:52 executing program 3: 2018/05/06 23:12:52 executing program 6: 2018/05/06 23:12:52 executing program 1: 2018/05/06 23:12:52 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000800000/0x3000)=nil, 0x3000, 0x2, 0x4d031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x2000) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000100)={0x0, 0x1ff}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/05/06 23:12:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000400)="7f", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080), 0x4) 2018/05/06 23:12:52 executing program 2: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x25) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) sendto$unix(r0, &(0x7f0000000040)="65c00b8818fc6539b2d318ef593a00a680f3733ba6ff64b0ce8c4f28c617f980ddfe79a29dc9c5a967c1bd2726b096b74cfe336ddd47e4c9a8446d3b3a99a2d4df188b31ba50d7da7f999b3cb9332ba6ea978ad03e0a9fb9a3367bf374e02096df63c70ecce6f7f6dd80e40499d8dc97395a49e99e8761f381ed23e6ee7ddba249c137fe8ad039a4a64014464a4a6586eca4420a5a175c25e2d6ca173c992947", 0xa0, 0x4000000, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x24fe1123, 0x0, 0x8, 0x1ff, 0xc, 0x7, 0x1, 0x6, 0x7, 0x3}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000380)={0x0, 0xb2ed, 0x4, &(0x7f0000000340)=0x6}) ioctl$fiemap(r0, 0x40086602, &(0x7f00000001c0)=ANY=[]) r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000200)={0x20071026, r1}, &(0x7f0000000240)={0x6, 0x4, 0x839, 0x80c5, 0xfffffffffffffff7, 0x5}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @remote, @rand_addr}, &(0x7f0000000300)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000280)) ftruncate(r0, 0x0) 2018/05/06 23:12:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000000)=0x1) r1 = dup2(r0, r0) recvfrom$ipx(r1, &(0x7f00000000c0)=""/155, 0x9b, 0x2, &(0x7f0000000180)={0x4, 0x20, 0xdf6e, "38f22ba73945"}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 87.327649] binder: 6964:6971 got reply transaction with no transaction stack [ 87.335134] binder: 6964:6971 transaction failed 29201/-71, size 104-16 line 2763 2018/05/06 23:12:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') read$eventfd(r0, &(0x7f00000000c0), 0x64c) sendmsg$nl_xfrm(r0, &(0x7f0000005200)={&(0x7f0000004e80)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000051c0)={&(0x7f0000004ec0)=@getspdinfo={0x2c4, 0x25, 0x800, 0x70bd29, 0x25dfdbff, 0xef33, [@srcaddr={0x14, 0xd, @in6=@mcast2={0xff, 0x2, [], 0x1}}, @algo_auth_trunc={0x124, 0x14, {{'sha224-generic\x00'}, 0x6b0, 0x200, "2b153b930f1d5dc40fed351748a3a0ef84b901399c7e0d411b79a42989be9dcf93ed5320d25b244fdb9c83e40d90f6c3ce62f1300c2ac62b70d960125519ada47333563a96d27eb1dc42ccc28e836a218c1bc440fa9530958b27c5815656ceb6685d83598831593892db8cf4265a48d1d72f4514f697dc26acc282ad3d9a21c96136110ddf1ccf53ecf629d87c2eafd8f1286d48638c1afb10c2193dbdce3b90714301761e8f82f570dc0083294e233bdb18cac76be8617d98b1baff45d42ddfa649dfa8dcf3e4211bbaebad8e0600a605e2f28f79bd"}}, @lifetime_val={0x24, 0x9, {0x7, 0x7, 0x2, 0x6}}, @tmpl={0x144, 0x5, [{{@in6=@loopback={0x0, 0x1}, 0x4d2, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3503, 0x0, 0x3, 0x20, 0x200, 0x6, 0x7f}, {{@in=@rand_addr=0x1f, 0x4d2, 0x2b}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3507, 0x4, 0x3, 0x6c61, 0x1, 0x3, 0xabc}, {{@in, 0x4d5}, 0xa, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x3507, 0x2, 0x3, 0x7, 0x8, 0x7f, 0xe9e9}, {{@in=@multicast1=0xe0000001, 0x4d3, 0x3c}, 0x2, @in=@rand_addr=0x7fffffff, 0x3500, 0x0, 0x3, 0x6, 0x1ff, 0x6, 0x9}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x4d3}, 0x2, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x3, 0x3, 0x80000000, 0x3ff, 0x8, 0x6}]}, @replay_val={0x10, 0xa, {0x70bd28, 0x70bd2b, 0x9}}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) flistxattr(r0, &(0x7f0000000100)=""/171, 0xab) recvmmsg(r0, &(0x7f0000004c00)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f00000002c0)=""/66, 0x42}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000400)=""/17, 0x11}], 0x4, &(0x7f0000000480)=""/116, 0x74, 0x9}, 0x4}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000580)=""/249, 0xf9}, {&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/85, 0x55}, {&(0x7f00000017c0)=""/208, 0xd0}, {&(0x7f00000018c0)=""/205, 0xcd}], 0x7, &(0x7f0000001a40)=""/253, 0xfd, 0x81}, 0x7}, {{&(0x7f0000001b40)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/99, 0x63}, {&(0x7f0000001c40)=""/60, 0x3c}], 0x2, 0x0, 0x0, 0x7f}, 0x5}, {{&(0x7f0000001cc0)=@ax25, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001d40)=""/152, 0x98}, {&(0x7f0000001e00)=""/77, 0x4d}], 0x2, &(0x7f0000001ec0)=""/152, 0x98, 0x3}, 0x10000}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000001f80)=""/124, 0x7c}, {&(0x7f0000002000)=""/165, 0xa5}, {&(0x7f00000020c0)=""/66, 0x42}, {&(0x7f0000002140)=""/113, 0x71}, {&(0x7f00000021c0)=""/208, 0xd0}, {&(0x7f00000022c0)=""/232, 0xe8}, {&(0x7f00000023c0)=""/157, 0x9d}], 0x7, &(0x7f0000002500)=""/231, 0xe7, 0x6}, 0x5}, {{&(0x7f0000002600)=@can={0x0, 0x0}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002680)=""/120, 0x78}, {&(0x7f0000002700)=""/6, 0x6}, {&(0x7f0000002740)=""/4, 0x4}, {&(0x7f0000002780)=""/52, 0x34}, {&(0x7f00000027c0)=""/111, 0x6f}, {&(0x7f0000002840)=""/216, 0xd8}, {&(0x7f0000002940)=""/116, 0x74}], 0x7, 0x0, 0x0, 0xfff}, 0x6}, {{&(0x7f0000002a40)=@sco, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000002ac0)=""/250, 0xfa}, {&(0x7f0000002bc0)=""/4096, 0x1000}], 0x2, &(0x7f0000003c00)=""/4096, 0x1000, 0x80000000}, 0xffff}], 0x7, 0x40, &(0x7f0000004dc0)={0x0, 0x989680}) bind$packet(r0, &(0x7f0000004e00)={0x11, 0xff, r1, 0x1, 0x7ff, 0x6, @random="dfa20778de48"}, 0x14) syz_open_dev$dmmidi(&(0x7f0000004e40)='/dev/dmmidi#\x00', 0x8, 0x0) 2018/05/06 23:12:52 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) fstatfs(r2, &(0x7f0000000080)=""/173) r3 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) dup2(r2, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000180)={r5, r6+30000000}) io_submit(r4, 0x1, &(0x7f0000001440)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000001780)}]) 2018/05/06 23:12:52 executing program 7: perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) [ 87.380769] binder: 6964:6971 BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 87.440570] capability: warning: `syz-executor2' uses deprecated v2 capabilities in a way that may be insecure 2018/05/06 23:12:53 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) socket(0x4, 0xe, 0xdf) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00006da000)=0x2, 0x4) bind$inet(r0, &(0x7f0000bf4000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 87.525329] sctp: [Deprecated]: syz-executor1 (pid 6975) Use of int in maxseg socket option. [ 87.525329] Use struct sctp_assoc_value instead [ 87.813414] device bridge_slave_1 left promiscuous mode [ 87.819469] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.837333] device bridge_slave_0 left promiscuous mode [ 87.842929] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.883482] team0 (unregistering): Port device team_slave_1 removed [ 87.893545] team0 (unregistering): Port device team_slave_0 removed [ 87.906722] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 87.921217] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 87.951289] bond0 (unregistering): Released all slaves [ 88.198662] binder: 6964:7014 got reply transaction with no transaction stack [ 88.206109] binder: 6964:7014 transaction failed 29201/-71, size 104-16 line 2763 [ 88.217522] binder: BINDER_SET_CONTEXT_MGR already set [ 88.223145] binder: 6964:7013 ioctl 40046207 0 returned -16 [ 88.229184] binder: 6964:7014 unknown command 1075208974 [ 88.234791] binder: 6964:7014 ioctl c0306201 20000080 returned -22 [ 88.244792] binder: 6964:7013 BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 88.371822] binder: undelivered TRANSACTION_ERROR: 29201 2018/05/06 23:12:54 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x1) shutdown(r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000380)="74086e750000000000000000cdb700", 0x1) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x7, 0x20080) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, 0x0, 0xb089}, &(0x7f0000000300)=0x90) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in, @in6=@mcast2}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setfsuid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) syz_open_procfs$namespace(r3, &(0x7f0000000400)='ns/mnt\x00') sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000500)) 2018/05/06 23:12:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000000100)={0x2, 0x14, 0xfffffffffffffffe, 0x7, 0x12, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x6, 0x0, 0x0, 0x6e6bbe, 0x3ff, {0x6, 0x1a057bfbbf119adf, 0x1, 0x1, 0x0, 0x5, 0x0, @in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@broadcast=0xffffffff}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_x_filter={0x5, 0x1a, @in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3, 0x0, 0x4}]}, 0x90}, 0x1}, 0xfffffffffffffffd) 2018/05/06 23:12:54 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x2}) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400, 0x0) sigaltstack(&(0x7f0000152000/0x4000)=nil, &(0x7f0000000000)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={&(0x7f0000151000/0x3000)=nil, 0x3000}) 2018/05/06 23:12:54 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) socket(0x4, 0xe, 0xdf) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00006da000)=0x2, 0x4) bind$inet(r0, &(0x7f0000bf4000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/05/06 23:12:54 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001ac0)={@mcast2}, &(0x7f0000000180)=0x14) recvmsg(r0, &(0x7f00000016c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000001400)=""/81, 0x51}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000000180)}, {&(0x7f0000001580)=""/155, 0xfffffd92}], 0x8, &(0x7f0000001b80)=""/4096, 0x371}, 0x40002100) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000000)={"62076f757445001a000000000000000000000000000000001000"}, &(0x7f0000000280)=0x78) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001480)={0x0, 0x1000, 0xaf57, 'queue1\x00', 0x7}) 2018/05/06 23:12:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, [0x4, 0x100000001, 0x100000001, 0x2, 0xbf5, 0x400, 0x10000, 0x7, 0x0, 0x4, 0x6, 0x2, 0x1000000000000, 0x1600cbf6, 0x8]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000780)=ANY=[@ANYRES32=r1], &(0x7f00000005c0)=0x1) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000880)={r1, 0xf1, 0x401, 0x100000000, 0xd3d9, 0x0, 0xffffffffffffffe1, 0x2, {r1, @in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x4}}, 0x6, 0x2, 0x0, 0x1}}, &(0x7f0000000940)=0xb0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0)=0x400, 0x4) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[0x0, 0x800, 0x3, 0xc285]}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000600)={r1, 0x10000}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000004c0), &(0x7f0000000500)=0x4) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/179, 0xb3}], 0x1, 0x0) r3 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4000) getdents64(r0, &(0x7f0000000340)=""/1, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x4, 0x6, 0x3, 0x40, r2}, &(0x7f0000000580)=0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0x8000, r4, 0x0, 0x0, 0xfff, 0x8000) vmsplice(r3, &(0x7f0000000740)=[{&(0x7f0000000680)}], 0x1, 0x4) 2018/05/06 23:12:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f00009b3000)={0x1}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="05", 0x1, 0xffffffffffffffff) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, 0x0, r2) 2018/05/06 23:12:54 executing program 7: perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x8) 2018/05/06 23:12:54 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6272696467653000000000008698bac7", 0x1001}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/65) 2018/05/06 23:12:54 executing program 4: r0 = inotify_init1(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x28000, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000000c0)) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 2018/05/06 23:12:54 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000006c0)=@broute={'%route\x00', 0x20, 0x3, 0x5d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'bond0\x00', 'ip6tnl0\x00', "01616d61000000004ab2cec800", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x2a8, 0x2a8, 0x2f0, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x15, 0x0, 0x0, 'bond0\x00', 'bridge_slave_1\x00', 'bond0\x00', 'teql0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xc0, 0xf0}, [@common=@log={'log\x00', 0x28, {{0x0, "3580c2d34060970a770cec122d335c8066565f6b08f3f34bfcbee2c96bdf"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}, {{{0xf, 0x0, 0x0, 'ip6tnl0\x00', 'eql\x00', 'teql0\x00', 'bcsh0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xe0, 0xe0, 0x130, [@rateest={'rateest\x00', 0x48, {{'syzkaller0\x00', 'veth0_to_bridge\x00', 0x0, 0x0, 0x0, 0x7, 0x2, 0x2, 0x40, 0x5}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x1, 0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc}, {0x0, '\x00', 0x3, 0xffffffdffffffffc}]}, 0x648) 2018/05/06 23:12:54 executing program 7: perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:54 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000080)={@empty, @empty, [{[], {0x8100}}], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @random="40b0a541b112", @empty, @link_local={0x1, 0x80, 0xc2}, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000000)) 2018/05/06 23:12:54 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000000)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f0000000a00)) [ 88.791279] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not '%route' [ 88.936489] FAT-fs (loop3): bogus number of reserved sectors [ 88.942594] FAT-fs (loop3): Can't find a valid FAT filesystem [ 89.021733] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 89.047280] FAT-fs (loop3): bogus number of reserved sectors [ 89.053282] FAT-fs (loop3): Can't find a valid FAT filesystem [ 90.495682] IPVS: ftp: loaded support on port[0] = 21 [ 90.830137] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.836550] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.844164] device bridge_slave_0 entered promiscuous mode [ 90.868180] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.874594] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.881724] device bridge_slave_1 entered promiscuous mode [ 90.905185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 90.929139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 90.994120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 91.020063] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 91.122916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 91.130139] team0: Port device team_slave_0 added [ 91.152745] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.159924] team0: Port device team_slave_1 added [ 91.182849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.207731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.232882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.258369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.473228] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.479657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.486319] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.492710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.269527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.346446] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 92.422937] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.429184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.436297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.519347] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/06 23:12:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x440000000000127c, &(0x7f000002cfff)) 2018/05/06 23:12:58 executing program 6: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000000)="d50c22", 0x3, 0x8086, &(0x7f00004d4000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="b21188af2a", 0x5, 0x0, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/05/06 23:12:58 executing program 5: r0 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r0, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0x0, 0x0, {@in=@rand_addr}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) 2018/05/06 23:12:58 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:58 executing program 3: semget$private(0x0, 0x2, 0x0) 2018/05/06 23:12:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c26e1500aaaaaaaaaaaa8100080008004500001c00000000000090787f000001ac1414aa0000000000089078"], 0x0) 2018/05/06 23:12:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xa, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x77359400}, {0x0, 0xe4c}}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7041, 0x0, 0x0, 0x0, 0x0, 0x2, 0xff, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0xbd06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x9) rt_sigtimedwait(&(0x7f0000000140)={0xfff}, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}, 0x8) 2018/05/06 23:12:58 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x1) shutdown(r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000380)="74086e750000000000000000cdb700", 0x1) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x7, 0x20080) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, 0x0, 0xb089}, &(0x7f0000000300)=0x90) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in, @in6=@mcast2}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setfsuid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) syz_open_procfs$namespace(r3, &(0x7f0000000400)='ns/mnt\x00') sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000500)) 2018/05/06 23:12:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{0x4}]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000040)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000000c0)) 2018/05/06 23:12:58 executing program 4: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60d8652b00068700fe8000000400000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f0000000000)) 2018/05/06 23:12:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x80, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=ANY=[]}, 0x0) 2018/05/06 23:12:58 executing program 5: 2018/05/06 23:12:58 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000), 0x4) 2018/05/06 23:12:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xa, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x77359400}, {0x0, 0xe4c}}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7041, 0x0, 0x0, 0x0, 0x0, 0x2, 0xff, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0xbd06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x9) rt_sigtimedwait(&(0x7f0000000140)={0xfff}, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}, 0x8) [ 93.430045] ================================================================== [ 93.437631] BUG: KASAN: use-after-free in tls_sk_proto_close+0x8ab/0x9c0 [ 93.444490] Read of size 1 at addr ffff8801cde40498 by task syz-executor6/7372 [ 93.451856] [ 93.453505] CPU: 0 PID: 7372 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #36 [ 93.460696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.470065] Call Trace: [ 93.472669] dump_stack+0x1b9/0x294 [ 93.476325] ? dump_stack_print_info.cold.2+0x52/0x52 [ 93.481536] ? printk+0x9e/0xba [ 93.484840] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 93.489622] ? kasan_check_write+0x14/0x20 [ 93.493875] print_address_description+0x6c/0x20b [ 93.498738] ? tls_sk_proto_close+0x8ab/0x9c0 [ 93.503258] kasan_report.cold.7+0x242/0x2fe [ 93.507694] __asan_report_load1_noabort+0x14/0x20 [ 93.512648] tls_sk_proto_close+0x8ab/0x9c0 [ 93.517003] ? tcp_check_oom+0x520/0x520 [ 93.521077] ? perf_trace_lock+0x900/0x900 [ 93.525304] ? perf_trace_lock_acquire+0xe3/0x980 [ 93.530140] ? tls_write_space+0x340/0x340 [ 93.534363] ? graph_lock+0x170/0x170 [ 93.538157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.543684] ? ipv6_sock_ac_close+0x34e/0x480 [ 93.548171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 93.553700] ? ipv6_sock_mc_close+0x161/0x1c0 [ 93.558183] ? ip_mc_drop_socket+0x20f/0x270 [ 93.562587] inet_release+0x104/0x1f0 [ 93.566378] inet6_release+0x50/0x70 [ 93.570082] sock_release+0x96/0x1b0 [ 93.573788] ? sock_alloc_file+0x4e0/0x4e0 [ 93.578014] sock_close+0x16/0x20 [ 93.581460] __fput+0x34d/0x890 [ 93.584771] ? fput+0x1a0/0x1a0 [ 93.588080] ? _raw_spin_unlock_irq+0x27/0x70 [ 93.592569] ____fput+0x15/0x20 [ 93.595841] task_work_run+0x1e4/0x290 [ 93.599720] ? task_work_cancel+0x240/0x240 [ 93.604040] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 93.609569] ? switch_task_namespaces+0xa2/0xd0 [ 93.614230] do_exit+0x1aee/0x2730 [ 93.617765] ? mm_update_next_owner+0x980/0x980 [ 93.622437] ? dequeue_task_fair+0x9c0/0x9c0 [ 93.626842] ? find_held_lock+0x36/0x1c0 [ 93.630899] ? lock_downgrade+0x8e0/0x8e0 [ 93.635040] ? lock_downgrade+0x8e0/0x8e0 [ 93.639180] ? kasan_check_read+0x11/0x20 [ 93.643316] ? do_raw_spin_unlock+0x9e/0x2e0 [ 93.647712] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 93.652284] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 93.656858] ? rcu_read_lock+0x70/0x70 [ 93.660738] ? trace_hardirqs_off+0xd/0x10 [ 93.664965] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 93.670059] ? zap_class+0x720/0x720 [ 93.673766] ? graph_lock+0x170/0x170 [ 93.677567] ? lock_downgrade+0x8e0/0x8e0 [ 93.681708] ? pvclock_read_flags+0x160/0x160 [ 93.686193] ? find_held_lock+0x36/0x1c0 [ 93.690250] ? lock_downgrade+0x8e0/0x8e0 [ 93.694389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.699919] ? kasan_check_read+0x11/0x20 [ 93.704061] ? do_raw_spin_unlock+0x9e/0x2e0 [ 93.708461] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 93.713039] ? force_sig+0x30/0x30 [ 93.716566] ? _raw_spin_unlock_irq+0x27/0x70 [ 93.721054] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 93.726073] do_group_exit+0x16f/0x430 [ 93.729955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.735619] ? __ia32_sys_exit+0x50/0x50 [ 93.739673] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 93.744504] ? do_syscall_64+0x92/0x800 [ 93.748472] __x64_sys_exit_group+0x3e/0x50 [ 93.752783] do_syscall_64+0x1b1/0x800 [ 93.756662] ? syscall_return_slowpath+0x5c0/0x5c0 [ 93.761582] ? syscall_return_slowpath+0x30f/0x5c0 [ 93.766503] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 93.771864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.776800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 93.781974] RIP: 0033:0x455979 [ 93.785149] RSP: 002b:00007ffebe15d838 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 93.792848] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000455979 [ 93.800105] RDX: 0000000000000006 RSI: 0000000000730998 RDI: 0000000000000000 [ 93.807361] RBP: 0000000000000013 R08: 0000000000000000 R09: 0000000000000000 [ 93.814628] R10: 00007ffebe15d7d0 R11: 0000000000000246 R12: 0000000000000013 [ 93.821899] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000001380 [ 93.829171] [ 93.830786] Allocated by task 7373: [ 93.834403] save_stack+0x43/0xd0 [ 93.837842] kasan_kmalloc+0xc4/0xe0 [ 93.841540] kmem_cache_alloc_trace+0x152/0x780 [ 93.846197] tls_init+0x1f9/0xb00 [ 93.849638] tcp_set_ulp+0x1bc/0x520 [ 93.853340] do_tcp_setsockopt.isra.39+0x44a/0x2600 [ 93.858341] tcp_setsockopt+0xc1/0xe0 [ 93.862128] sock_common_setsockopt+0x9a/0xe0 [ 93.866610] __sys_setsockopt+0x1bd/0x390 [ 93.870745] __x64_sys_setsockopt+0xbe/0x150 [ 93.875139] do_syscall_64+0x1b1/0x800 [ 93.879021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 93.884194] [ 93.885806] Freed by task 7372: [ 93.889077] save_stack+0x43/0xd0 [ 93.892517] __kasan_slab_free+0x11a/0x170 [ 93.896738] kasan_slab_free+0xe/0x10 [ 93.900522] kfree+0xd9/0x260 [ 93.903614] tls_sw_free_resources+0x2a3/0x360 [ 93.908182] tls_sk_proto_close+0x67c/0x9c0 [ 93.912490] inet_release+0x104/0x1f0 [ 93.916276] inet6_release+0x50/0x70 [ 93.919981] sock_release+0x96/0x1b0 [ 93.923692] sock_close+0x16/0x20 [ 93.927140] __fput+0x34d/0x890 [ 93.930425] ____fput+0x15/0x20 [ 93.933701] task_work_run+0x1e4/0x290 [ 93.937585] do_exit+0x1aee/0x2730 [ 93.941115] do_group_exit+0x16f/0x430 [ 93.944994] __x64_sys_exit_group+0x3e/0x50 [ 93.949312] do_syscall_64+0x1b1/0x800 [ 93.953201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 93.958369] [ 93.959984] The buggy address belongs to the object at ffff8801cde40440 [ 93.959984] which belongs to the cache kmalloc-256 of size 256 [ 93.972633] The buggy address is located 88 bytes inside of [ 93.972633] 256-byte region [ffff8801cde40440, ffff8801cde40540) [ 93.984408] The buggy address belongs to the page: [ 93.989328] page:ffffea0007379000 count:1 mapcount:0 mapping:ffff8801cde40080 index:0x0 [ 93.997469] flags: 0x2fffc0000000100(slab) [ 94.001695] raw: 02fffc0000000100 ffff8801cde40080 0000000000000000 000000010000000c [ 94.009566] raw: ffffea0006339160 ffffea00075ec8e0 ffff8801da8007c0 0000000000000000 [ 94.017440] page dumped because: kasan: bad access detected [ 94.023129] [ 94.024738] Memory state around the buggy address: [ 94.029651] ffff8801cde40380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.036996] ffff8801cde40400: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 94.044347] >ffff8801cde40480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.051688] ^ [ 94.055821] ffff8801cde40500: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.063165] ffff8801cde40580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.070519] ================================================================== [ 94.077864] Disabling lock debugging due to kernel taint [ 94.083938] Kernel panic - not syncing: panic_on_warn set ... [ 94.083938] [ 94.091327] CPU: 0 PID: 7372 Comm: syz-executor6 Tainted: G B 4.17.0-rc3+ #36 [ 94.099900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.109238] Call Trace: [ 94.111831] dump_stack+0x1b9/0x294 [ 94.115448] ? dump_stack_print_info.cold.2+0x52/0x52 [ 94.120626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 94.125373] ? tls_sk_proto_close+0x7f0/0x9c0 [ 94.129857] panic+0x22f/0x4de [ 94.133035] ? add_taint.cold.5+0x16/0x16 [ 94.137177] ? do_raw_spin_unlock+0x9e/0x2e0 [ 94.141581] ? do_raw_spin_unlock+0x9e/0x2e0 [ 94.145978] ? tls_sk_proto_close+0x8ab/0x9c0 [ 94.150461] kasan_end_report+0x47/0x4f [ 94.154419] kasan_report.cold.7+0x76/0x2fe [ 94.158743] __asan_report_load1_noabort+0x14/0x20 [ 94.163663] tls_sk_proto_close+0x8ab/0x9c0 [ 94.167978] ? tcp_check_oom+0x520/0x520 [ 94.172027] ? perf_trace_lock+0x900/0x900 [ 94.176246] ? perf_trace_lock_acquire+0xe3/0x980 [ 94.181080] ? tls_write_space+0x340/0x340 [ 94.185299] ? graph_lock+0x170/0x170 [ 94.189099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.194631] ? ipv6_sock_ac_close+0x34e/0x480 [ 94.199115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 94.204648] ? ipv6_sock_mc_close+0x161/0x1c0 [ 94.209131] ? ip_mc_drop_socket+0x20f/0x270 [ 94.213528] inet_release+0x104/0x1f0 [ 94.217315] inet6_release+0x50/0x70 [ 94.221021] sock_release+0x96/0x1b0 [ 94.224727] ? sock_alloc_file+0x4e0/0x4e0 [ 94.228950] sock_close+0x16/0x20 [ 94.232388] __fput+0x34d/0x890 [ 94.235655] ? fput+0x1a0/0x1a0 [ 94.238924] ? _raw_spin_unlock_irq+0x27/0x70 [ 94.243407] ____fput+0x15/0x20 [ 94.246674] task_work_run+0x1e4/0x290 [ 94.250560] ? task_work_cancel+0x240/0x240 [ 94.254882] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 94.260407] ? switch_task_namespaces+0xa2/0xd0 [ 94.265069] do_exit+0x1aee/0x2730 [ 94.268600] ? mm_update_next_owner+0x980/0x980 [ 94.273259] ? dequeue_task_fair+0x9c0/0x9c0 [ 94.277660] ? find_held_lock+0x36/0x1c0 [ 94.281716] ? lock_downgrade+0x8e0/0x8e0 [ 94.285849] ? lock_downgrade+0x8e0/0x8e0 [ 94.290002] ? kasan_check_read+0x11/0x20 [ 94.294145] ? do_raw_spin_unlock+0x9e/0x2e0 [ 94.298540] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 94.303105] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 94.307673] ? rcu_read_lock+0x70/0x70 [ 94.311548] ? trace_hardirqs_off+0xd/0x10 [ 94.315771] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 94.320862] ? zap_class+0x720/0x720 [ 94.324567] ? graph_lock+0x170/0x170 [ 94.328363] ? lock_downgrade+0x8e0/0x8e0 [ 94.332501] ? pvclock_read_flags+0x160/0x160 [ 94.336984] ? find_held_lock+0x36/0x1c0 [ 94.341043] ? lock_downgrade+0x8e0/0x8e0 [ 94.345178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.350705] ? kasan_check_read+0x11/0x20 [ 94.354848] ? do_raw_spin_unlock+0x9e/0x2e0 [ 94.359252] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 94.363830] ? force_sig+0x30/0x30 [ 94.367356] ? _raw_spin_unlock_irq+0x27/0x70 [ 94.371837] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 94.376844] do_group_exit+0x16f/0x430 [ 94.380723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.386248] ? __ia32_sys_exit+0x50/0x50 [ 94.390295] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 94.395126] ? do_syscall_64+0x92/0x800 [ 94.399090] __x64_sys_exit_group+0x3e/0x50 [ 94.403397] do_syscall_64+0x1b1/0x800 [ 94.407269] ? syscall_return_slowpath+0x5c0/0x5c0 [ 94.412199] ? syscall_return_slowpath+0x30f/0x5c0 [ 94.417116] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 94.422478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 94.427407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 94.432580] RIP: 0033:0x455979 [ 94.435751] RSP: 002b:00007ffebe15d838 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 94.443456] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000455979 [ 94.450715] RDX: 0000000000000006 RSI: 0000000000730998 RDI: 0000000000000000 [ 94.457977] RBP: 0000000000000013 R08: 0000000000000000 R09: 0000000000000000 [ 94.465235] R10: 00007ffebe15d7d0 R11: 0000000000000246 R12: 0000000000000013 [ 94.472503] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000001380 [ 94.480426] Dumping ftrace buffer: [ 94.483965] (ftrace buffer empty) [ 94.487661] Kernel Offset: disabled [ 94.491278] Rebooting in 86400 seconds..