INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2018/04/05 13:46:48 fuzzer started 2018/04/05 13:46:48 dialing manager at 10.128.0.26:40813 syzkaller login: [ 37.720826] can: request_module (can-proto-0) failed. [ 37.731122] can: request_module (can-proto-0) failed. 2018/04/05 13:46:57 kcov=true, comps=true 2018/04/05 13:47:04 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) mq_timedsend(r0, &(0x7f0000000000)="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", 0xfe, 0x7f, &(0x7f0000000100)={0x77359400}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x1, @loopback={0x0, 0x1}, 0xffffffffffffffc0}, 0x1c) r2 = fcntl$getown(r0, 0x9) ptrace$poke(0x4, r2, &(0x7f00000001c0), 0x9) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x44) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x44) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000380)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) io_setup(0x6, &(0x7f00000003c0)=0x0) io_destroy(r3) getsockopt$inet6_dccp_int(r0, 0x21, 0x17, &(0x7f0000000400), &(0x7f0000000440)=0x4) r4 = semget$private(0x0, 0x5, 0x10) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000480)=""/251) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x20, r5, 0x305, 0x70bd2c, 0x25dfdbfb, {0x4}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x81}, 0xc040) fcntl$setsig(r1, 0xa, 0x1) get_robust_list(r2, &(0x7f0000000780)=&(0x7f0000000740)={&(0x7f0000000700)={&(0x7f00000006c0)}}, &(0x7f00000007c0)=0x18) userfaultfd(0x800) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000840)=""/163) r6 = msgget$private(0x0, 0x8) msgrcv(r6, &(0x7f0000000900)={0x0, ""/16}, 0x18, 0x2, 0x1000) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000940)={0x7, 0x7ff4}) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000980)) syz_open_dev$adsp(&(0x7f0000000a40)='/dev/adsp#\x00', 0x40, 0x0) sendto$inet(r1, &(0x7f0000000a80)="a39df5e260ae6d7d7ff3b06dc9283ef8d775bcdf8da39656f319d212b4940cd460f8b5ab511125c3c1fa432204b3ed40df729489f135d9a3f4a4b79171e6f793567570f6cef61df111a54e5a26043b2a1fdd15cae90ef5ed97895dabf2e5661d7142e5d2b85d3de4b634f707b136bbd94003ab02ff2b603801d3d44bc8109068d5c0cb432360d3e70c2cb52a22c12e8cb1173800e8b5be42993e3d94ed685f40efd25ba5f003465e59b54de08c1409a95da280806b2d009547a211f6f1f1f3a8d36380572e0a910b68d9e8a951cf2c650162297e3619490d0476c75e7b2c35996fbfe3979fec0436c9c3906271d9b061eda0df", 0xf3, 0x840, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fadvise64(r0, 0x0, 0x1, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000b80)=[@in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e20, 0x81, @empty, 0x7}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}], 0x3c) 2018/04/05 13:47:04 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x200001) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000200)={0x6, 0x3, r1, 0x3032270e, r3, 0x4, 0x80000000, 0x8001}) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000240)=0x9, 0x4) r4 = request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', r4) tee(r0, r0, 0x6, 0x6) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000480)={r5, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1f, 0x6}, &(0x7f0000000540)=0x90) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_id=r5, &(0x7f00000005c0)=0x4) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000600)={0x1, 0x1ff, r1, 0x5, r2, 0x4}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) connect$vsock_dgram(r0, &(0x7f0000000680)={0x28, 0x0, 0x0, @my=0x0}, 0x10) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000006c0), &(0x7f0000000700)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6, 0x1}, 0x8) getsockopt$inet_dccp_buf(r0, 0x21, 0x2, &(0x7f0000000780)=""/49, &(0x7f00000007c0)=0x31) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rtc\x00', 0x80, 0x0) r9 = creat(&(0x7f0000000840)='./file0\x00', 0x4) ioctl$sock_SIOCBRDELBR(r7, 0x89a1, &(0x7f0000000880)='ifb0\x00') epoll_ctl$EPOLL_CTL_DEL(r9, 0x2, r8) sendto$ipx(r8, &(0x7f00000008c0)="af93e3e48bc28eb81153ca6a27", 0xd, 0x80, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000900)='./file0\x00', 0x100, 0x1) socket$kcm(0x29, 0x7, 0x0) ioctl$sock_inet_SIOCADDRT(r9, 0x890b, &(0x7f0000000980)={0x6, {0x2, 0x4e24, @multicast2=0xe0000002}, {0x2, 0x4e20, @multicast2=0xe0000002}, {0x2, 0x4e23, @broadcast=0xffffffff}, 0x41, 0xfffffffffffffffd, 0xffff, 0x1f, 0x101, &(0x7f0000000940)='erspan0\x00', 0x3, 0x0, 0x10000}) setsockopt$inet6_udp_int(r9, 0x11, 0x67, &(0x7f0000000a00)=0xffffffffffffffc0, 0x4) openat$cgroup(r9, &(0x7f0000000a40)='syz1\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/dsp\x00', 0x200100, 0x0) 2018/04/05 13:47:04 executing program 7: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000040)={0x1, 0xffffffffffffffff, 0x4f1, 'queue0\x00', 0xa8}) r1 = accept4$ax25(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x80000) ioctl$sock_ipx_SIOCIPXNCPCONN(r0, 0x89e3, &(0x7f0000000180)=0x3) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4010, r0, 0x0) bind$unix(r0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000002c0)={0x9, 0xffffffff, 0x6, 0x5e55ce62, 0x200, 0x9}) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000380)={@local, 0x0}, &(0x7f00000003c0)=0x14) fcntl$setpipe(r1, 0x407, 0xffffffffffffff6b) ioctl$TIOCGPTPEER(r0, 0x5441, 0x101) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000400)=""/64) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={0x0, 0x3}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000540)={r3, 0x2f1, 0x7ff, 0x5, 0x4, 0x6}, &(0x7f0000000580)=0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000005c0)=0x0) ptrace$getregset(0x4204, r5, 0x3, &(0x7f0000000640)={&(0x7f0000000600)}) accept4$packet(r0, 0x0, &(0x7f0000000680), 0x80000) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000006c0)={0x87, @multicast1=0xe0000001, 0x4e22, 0x2, 'lblc\x00', 0x2b, 0x4, 0x75}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000700)={0x0, 0x7}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000740)={'bcsf0\x00', r2}) setsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000000780), 0x4) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000800)={0x4, &(0x7f00000007c0)=[{0x400000000000, 0x3, 0x7ff, 0x8}, {0x468a, 0x3, 0x6, 0x80000001}, {0x1683, 0x1, 0x4, 0x3}, {0x1c, 0x0, 0x1, 0x7}]}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000880)={&(0x7f0000000840)=[0x6, 0x7ff, 0x3ff, 0x8, 0xff], 0x5, 0x40, 0x3f, 0x100000000, 0x200, 0x9, {0x28, 0x81, 0x7f, 0x6, 0x6, 0x0, 0x100000000, 0x400, 0x10001, 0xfffffffffffff801, 0x0, 0x1eae, 0x8, 0x2, "7d51e735fd338bf7a378e4f7e3d6c8d7def55949429e87b36f6824b26f476e38"}}) r6 = syz_open_dev$sndseq(&(0x7f0000000900)='/dev/snd/seq\x00', 0x0, 0x8000) ioctl$sock_ipx_SIOCIPXNCPCONN(r0, 0x89e3, &(0x7f0000000940)=0x2) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000980)={{0x89, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x1, 'none\x00', 0x1, 0x220, 0x5b}, {@rand_addr=0x1000, 0x4e20, 0x3, 0x40, 0x2, 0x4}}, 0x44) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r6, 0x6) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000a00)={r4, 0x2, 0x30, 0xde2, 0x7}, &(0x7f0000000a40)=0x18) 2018/04/05 13:47:04 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa0100, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0xc8, 0x4) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/209) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x214c00, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{}, {0x0}, {0x0}, {}, {}, {0x0}, {}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000001240)={r2, &(0x7f0000000240)=""/4096}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000001280)=""/4096) setsockopt(r0, 0x44cc, 0x80, &(0x7f0000002280)="66a34725812b7ebb92026b", 0xb) r6 = inotify_init() ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000022c0)='\x00') ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000002300)={r5, 0x1}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000002340)={r4}) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r7 = msgget(0x2, 0x123) msgctl$IPC_STAT(r7, 0x2, &(0x7f0000002380)=""/142) sendto$ax25(r1, &(0x7f0000002440)="5fb3220d6f0c89fcf47fa1b64ad5baa5891996ada8b81e67e032db601b403310f484db7465358675636cca3c9b89e2ddb71811d652130a7082db2b42bf07601f9394d2ae57568c9d0beaad7120c2af5727fa369d090559ddfc9275ff58fb875f86213a58d8d5f31221b5db730e00fbf1d052609488770d8064cf073ce52752b476f752cf88c048a308de0a7868cf01442a4bf85b8e08aa2d3b3f73690847faaadb1ce80bceec94480bc7", 0xaa, 0x4000010, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000002500)={0x84, 0xffffffff, 0x4000, 0x8, 0x4, 0x34, 0x9, 0x1, 0x450, 0x3f}, 0x10) ioctl$DRM_IOCTL_GET_UNIQUE(r6, 0xc0106401, &(0x7f0000003540)={0x1000, &(0x7f0000002540)=""/4096}) write$cgroup_type(r0, &(0x7f0000003580)='threaded\x00', 0x9) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000035c0)={r3, 0x3}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003600)={{{@in=@broadcast, @in=@broadcast}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000003700)=0xe8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000003740)={0x7, 0x4, 0x5, {}, 0xfffffffffffffeff, 0x5}) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000037c0)={0x74, 0x0, [0x80, 0x40, 0x52d080b7]}) r9 = gettid() fcntl$setownex(r8, 0xf, &(0x7f0000003840)={0x0, r9}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003880)={0x0, r1, 0x6, 0x2}, 0x14) connect$vsock_stream(r1, &(0x7f00000038c0)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10) ptrace$setopts(0x4206, r9, 0x5, 0x40) connect$rds(r0, &(0x7f0000003900)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 2018/04/05 13:47:04 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f0000000000)="d39897041518d1fb25f8863cbe5ddef9b0946474e27568e4459ae8c3f5795e1b4ad0a4381c1faac688c4523b91c214987dafd872495ec797d27593491d5113f6abb196434435a1466c0ca976117ed89b2e1661f083a18e8ff7bebad11b739385a2e5836bd77e5e560f06c685b6bfcb49364029c5014fd144fbdf90870bf4745863743889b1291be59bb0a2b177c805577d84ed18b4614ce367c3253050969fa5c28160e916e1ed3144f70240e3fd49ce515fd4") getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x8, &(0x7f0000000100)=0x4) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xffff, 0x10002) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e23, 0x182, @empty, 0x7fff}, {0xa, 0x4e21, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x9b, [0x1f, 0xfffffffffffffffc, 0x4, 0x6, 0x1, 0x4, 0x2, 0x1]}, 0x5c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x104c0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xfbf1462fe3e0fd4c) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x100, 0x70bd25, 0x25dfdbff, {0x3}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000380)={0x0, 0xeb7, 0x30, 0x7f, 0x5}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000480)={r4, 0x4c, &(0x7f0000000400)=[@in={0x2, 0x4e20, @loopback=0x7f000001}, @in={0x2, 0x4e21, @rand_addr=0x5}, @in6={0xa, 0x4e24, 0x200, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, @in={0x2, 0x4e24, @broadcast=0xffffffff}]}, &(0x7f00000004c0)=0x10) r5 = memfd_create(&(0x7f0000000500)='/dev/dsp\x00', 0x2) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0xc122, 0x10840) shutdown(r5, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000580)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) clock_adjtime(0x7, &(0x7f0000000600)={0x5, 0x489c, 0x5, 0x1, 0xffffffffffffffff, 0x2, 0x401, 0x0, 0x3, 0x401, 0x6, 0xffff, 0xffff, 0x100000001, 0x8000, 0x4, 0x13, 0x0, 0xb9, 0x8, 0xf50, 0x2, 0x2, 0xbe16, 0xcf, 0x1}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000700)={0x6, 0x6, 0x5, 0x3f8}, 0x10) r7 = gettid() process_vm_writev(r7, &(0x7f0000000940)=[{&(0x7f0000000740)=""/116, 0x74}, {&(0x7f00000007c0)=""/189, 0xbd}, {&(0x7f0000000880)=""/35, 0x23}, {&(0x7f00000008c0)=""/78, 0x4e}], 0x4, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/96, 0x60}, {&(0x7f0000000a00)=""/78, 0x4e}], 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000ac0)={0x256b, 0x8, [0x80000000, 0x100000000]}) r8 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r8, &(0x7f0000ffb000/0x4000)=nil, 0x2000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000cc0)={'nat\x00', 0x0, 0x4, 0xb0, [], 0x5, &(0x7f0000000b80)=[{}, {}, {}, {}, {}], &(0x7f0000000c00)=""/176}, &(0x7f0000000d40)=0x78) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$llc_int(r2, 0x10c, 0x3, &(0x7f0000000d80)=0x9, 0x4) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000dc0)) 2018/04/05 13:47:04 executing program 6: r0 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000340)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}}, 0x10) r2 = open(&(0x7f0000000380)='./file0\x00', 0x4400, 0x150) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000003c0)={0x0, 0x2}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000440)={0x8, 0x200, 0x1, 0x81, r3}, 0x10) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000500)="5d5047f4d728c860e16d625588b9f53cbc", 0x11, r4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000005c0)=0x8001, 0x4) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000600)={0xffffffffffff7fff, 0x3000}) keyctl$instantiate(0xc, r4, 0x0, 0x0, r4) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000640)={0x3}) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000780)=@buf={0xf7, &(0x7f0000000680)="b721c3b853a50b331b25c4033765ed5dab7ee88bb517e8a68e44566d406782fff492c1e0ed35fa3df9eeeaa4c0c576f754f1092e807eb9d11ddd30726af9dd4ba58b07c2fc2821911e9662ad2fdb75e65d197e32c2735e48044d55be7289c0443e3725999fc419e83bd989f6c47f2c9c7967100422480a8cea981d417b722adf8c6ca0776aea8387504fdca6767c3a9af06598923fd7b5b79016531dd62e165c480b6a720c83bcd9a78a060b40ae74a7eecfce4a9db4b98b19258dffe946af42e5eaa6963ccbcf9792279014dbc8bc63b438c5f61cc1939b4bd4ef2839334eb2438cb124fc8812b26c4f25b2c91adf4797f3dfc1eb41aa"}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000007c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000800)={0x3, r5}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000840), &(0x7f00000008c0)=0x68) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000900)={0x40, 0x8002, 0x6, 0x4, r3}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000980)={0x3, [0x0, 0x0, 0x0]}) ptrace(0x11, r5) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f00000009c0)=0x9) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000a00)) socket$pptp(0x18, 0x1, 0x2) r6 = epoll_create1(0x80000) prctl$setmm(0x23, 0x2, &(0x7f0000ffa000/0x3000)=nil) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000a40)) add_key$user(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000b00)="faf8ca06a965a42581568d6e8021387c751c50af77aa06bf3ae298571ca4f06bdaf21bdcf104ccf8862198c2d4195f0e9ca60ecbd4f09e0f74437ceadb34af07202b6f67018c2f9c2e0a68ef18bc1e514192f3655bb8978d660aba0836b2c4a40b8185a38fd741cf2c14dd0fa55c34fa142b8bbfb2bb8689a0b704f45223275c28a542a833bd4e61a8783d", 0x8b, r4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000bc0)={r3, 0x3, 0x81}, &(0x7f0000000c00)=0x8) 2018/04/05 13:47:04 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8000, 0x400000) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x3, 0xffffffff00000000}) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x3, 0xffffffffffff274e}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)="7bd7eb4ffb193ea05e3e59dd53f2aa8f59db8d2c0dd831b8cd9fe89d91f899523deff67615813c772a96293702db8756e74247cfda8885619c3af7877fb0dadb1f2b071e1edd7265720f2fac65bdad05a3731ebfa846371081b1fde004f9a5873b7e1a133796d847a968f5cbae41b8d6df9fbbdebc643d9ae064d5ddece0ad234caa18a78115b884300a97"}, 0x10) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000001c0)=0x90000000000000, &(0x7f0000000200)=0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000240)={0x5, [0x5, 0x1f, 0x100000000, 0x3, 0x3]}, 0xe) r1 = add_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r1, 0x7fff) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000300)={0x0, 0x7530}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x60, 0x31, &(0x7f0000000380)="b87d9468be41b9f81a28ebaa902cebe29b62aa14ebd30ee2ed15c84de8330aedbf594c8f6d1e5531f124f04b9728b5f2d7bf82c70d206774f41767ed8140236984ac337eda99b1d11e0a052d74bb30cc86abb5ff36b475cf52366b6239017f5f", &(0x7f0000000400)=""/49, 0x1, 0x2}, 0x28) keyctl$set_timeout(0xf, r1, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@rand_addr=0xffffffffffffffff, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e24, 0x8, 0x4e23, 0x0, 0xa, 0x20, 0xa0, 0x2f, r3, r4}, {0x7, 0x7f, 0x0, 0x100, 0x800, 0x1000, 0x9, 0x10001}, {0xfffffffffffffff9, 0x3, 0x0, 0x5}, 0x7f, 0x6e6bb9, 0x1, 0x1, 0x2}, {{@in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x4d5, 0xff}, 0xa, @in6=@loopback={0x0, 0x1}, 0x0, 0x7, 0x0, 0x5, 0x1c, 0x0, 0x3}}, 0xe8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000880)={r5, 0x3}, 0x8) keyctl$dh_compute(0x17, &(0x7f00000008c0)={r1, r1, r1}, &(0x7f0000000900)=""/3, 0x3, &(0x7f0000000980)={&(0x7f0000000940)={'wp256-generic\x00'}}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000009c0)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000a00)={r5, 0x3, 0x3}, 0x8) syz_mount_image$gfs2(&(0x7f0000000a40)='gfs2\x00', &(0x7f0000000a80)='./file0\x00', 0x8000, 0x2, &(0x7f0000000c00)=[{&(0x7f0000000ac0), 0x0, 0x80000001}, {&(0x7f0000000b00)="84ae9d1ae738090237c70c1dab57b6da614afbec91dcb3a6dfb846b20729c51bb65bc4800969124d2ebfe5dc00bf2e639a48d2ecab6d6706e972d326c3242f4593b8c70ff0e18d368117be108615ae6424deff8214c858c2d035f03ca6dc0dae51a523d27e3f28872460b9edd0eb4e010bd0168e3fdf7099a629afa61d99f5f74cfe44183044e7cb3361a9a7d11fbc8fe47b52fe3946a07e6c247d8d27f2924757fd469dd4b20db5eebda53124048f2f96031ce3a54b28f0f952cf64da5e979ba6bdf3a7eceb076eda018471f66302e718", 0xd1, 0x4}], 0x44000, &(0x7f0000000c40)={[{@noloccookie='noloccookie', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@locktable={'locktable', 0x3d, "5b2d5c402fb682"}, 0x2c}, {@upgrade='upgrade', 0x2c}, {@rgrplvb='rgrplvb', 0x2c}, {@statfs_percent={'statfs_percent', 0x3d, [0x82bd8d6240a469ff, 0x2d, 0x37, 0x31, 0x3f, 0x37, 0x3f, 0x36]}, 0x2c}, {@ignore_local_fs='ignore_local_fs', 0x2c}, {@acl='acl', 0x2c}, {@acl='acl', 0x2c}]}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000cc0)={r5, 0x55ae}, &(0x7f0000000d00)=0x8) r6 = gettid() open$dir(&(0x7f0000000d40)='./file0\x00', 0x2600, 0x1b4) accept4$netrom(r0, 0x0, &(0x7f0000000d80), 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000dc0)={'filter\x00', 0x4}, 0x68) mount(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)='fuseblk\x00', 0x40040, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000f00)={0x3, 0x3, 'client1\x00', 0x4, "738486bd6eff81f4", "a1a1571b2f4ec8b66e2cfbeeccf9585e2fd0c6b183d87e8902b55f3291879e53", 0x9, 0x7}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000001000)={{0x9, 0x6, 0x8, 0x6f, "c9c6555d96747a23cb87565f5b99e777a8193b7320cf83e10af01e353f1ccba04ffcabe245ebb94a56adf19b", 0x8}, 0x0, 0x0, 0x200, r6, 0x6, 0x0, "08a85eec63aedab40ed1b905b496b014383031d31dd4bdefdf820708308dc9d418b82ee790f8793172327aecc15459d9b824dc30a4f7bc14c5d60d6ee135fda3", &(0x7f0000000fc0)='\x00', 0x1, [], [0x40, 0x519a, 0x7]}) kcmp$KCMP_EPOLL_TFD(r6, r6, 0x7, r2, &(0x7f0000001140)={r0, r2, 0x800}) 2018/04/05 13:47:04 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x80}, 0x8) recvfrom$packet(r1, &(0x7f00000000c0)=""/250, 0xfa, 0x12000, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x6, 0x1, 0x4, 0x3}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000340)={0x1, 0x0, [{0x4, 0x7, &(0x7f0000000300)=""/7}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000003c0)=0xa05) fchdir(r0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000400)={'ifb0\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @local}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000580)=r4) flistxattr(r1, &(0x7f00000005c0)=""/215, 0xd7) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000006c0)=0x9902, 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000700)={'nat\x00'}, &(0x7f0000000780)=0x78) ioctl$sock_ipx_SIOCSIFADDR(r1, 0x8916, &(0x7f00000007c0)={'ip_vti0\x00', {0x4, 0x0, 0x42, "04974e28597f", 0x8}}) bind$nfc_llcp(r0, &(0x7f0000000800)={0x27, 0x1, 0x0, 0x0, 0x8, 0xffff, "56d12415dd59efc6b0cb59049fbde1604f714886fd6b23464e9792d4766972dc6d42c51c2d7ccd62ca896f3eaed9d86f1454e34aeb0879abd3771164a8e136", 0x1f}, 0x60) io_setup(0x8000, &(0x7f0000000880)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x6, 0x3, r3, &(0x7f00000008c0)="a91c7315479250abb339c29091c84c9a7b40fb4df738f4c5e7b52863314fd3e6a8634a7bd112f6ea394a1b606c7f547783221ceec791afd0bd851e6ecdb60499bbb94ecd96340b15faa86824f8ddd36e5b1f896726e8a0f86305717d8f5f5c2ec85448b6944c7e87176f103c9447119452d1e9c6d63871d39c23ee94a61e3b9c3953c8b5bc859738f3ff14ee4f36fdec15f7c4424fba6519ffa793a5c9556360da3231973f46e282ee43fb13e42a42f4de7b09392ae147d41301404f3bb5c52313bf25adaa7d328d1bfa244c61223c0841d6f80bc03aed9bc03648ed1cfdbb0d3785243258394929dc39d6a37a2bc16535d9dda3539f009556ee64", 0xfb, 0x7ff, 0x0, 0x1, r1}]) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) accept$netrom(r0, &(0x7f0000000ac0), &(0x7f0000000b00)=0x10) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) name_to_handle_at(r0, &(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0xe1, 0x0, "e1e3f4103962624273e8093d8927ae28773789a3ae5713c19b7aa63dd1e2e30b0a9a8b0f9e751511371434b4f9232e3a03a96ebca05337f160fe8173bed84669e04b6cfb0e2818d5e9e01bea94af7cfcb738e2c84632051e4a418fe33310ef5e94bf388997217a574d5d082a21d08aff74e6736a2c1a533e7e08faf8fc72c8ba1e380af13f85df8b1a4d2fe6df223b5abfa184839a00bed1faa4eada9685970c1c9aed1a938b41a2480c64c091e9081090f7d305174f9bfa72fb5ada9ffa014fb4fd6af171308fde7d6135ff50069e7462ea6833fa2c0dece6"}, &(0x7f0000000d00), 0x400) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000d40)) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000d80), &(0x7f0000000dc0)=0x4) r6 = request_key(&(0x7f0000000e00)='id_resolver\x00', &(0x7f0000000e40)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000e80)='ip_vti0\x00', 0xfffffffffffffffc) keyctl$get_security(0x11, r6, &(0x7f0000000ec0)=""/186, 0xba) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000f80)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000fc0)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001000)={r7, 0x5}, &(0x7f0000001040)=0x8) [ 45.221342] IPVS: ftp: loaded support on port[0] = 21 [ 45.232186] IPVS: ftp: loaded support on port[0] = 21 [ 45.260785] IPVS: ftp: loaded support on port[0] = 21 [ 45.266348] IPVS: ftp: loaded support on port[0] = 21 [ 45.304375] IPVS: ftp: loaded support on port[0] = 21 [ 45.311483] IPVS: ftp: loaded support on port[0] = 21 [ 45.345985] IPVS: ftp: loaded support on port[0] = 21 [ 45.353983] IPVS: ftp: loaded support on port[0] = 21 [ 48.225760] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.412485] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.434923] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.463431] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.474013] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.484943] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.514126] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.692592] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.533205] ================================================================== [ 52.540791] BUG: KASAN: alloca-out-of-bounds in tick_sched_handle+0x16d/0x180 [ 52.548124] Read of size 8 at addr ffff8801b273f1a0 by task ip/5514 [ 52.554518] [ 52.556155] CPU: 1 PID: 5514 Comm: ip Not tainted 4.16.0+ #1 [ 52.561952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.571308] Call Trace: [ 52.573896] [ 52.576054] dump_stack+0x1b9/0x29f [ 52.579701] ? arch_local_irq_restore+0x52/0x52 [ 52.584385] ? printk+0x9e/0xba [ 52.587671] ? show_regs_print_info+0x18/0x18 [ 52.592185] ? kasan_check_write+0x14/0x20 [ 52.596426] print_address_description+0x6c/0x20b [ 52.601254] ? tick_sched_handle+0x16d/0x180 [ 52.605646] kasan_report.cold.7+0xac/0x2f5 [ 52.609956] __asan_report_load8_noabort+0x14/0x20 [ 52.614880] tick_sched_handle+0x16d/0x180 [ 52.619105] tick_sched_timer+0x42/0x130 [ 52.623153] __hrtimer_run_queues+0x3e3/0x10a0 [ 52.627723] ? tick_sched_do_timer+0x100/0x100 [ 52.632309] ? hrtimer_start_range_ns+0xd10/0xd10 [ 52.637137] ? pvclock_read_flags+0x160/0x160 [ 52.641619] ? __local_bh_enable+0xef/0x130 [ 52.645932] ? kvm_clock_read+0x25/0x30 [ 52.649896] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 52.654899] ? ktime_get_update_offsets_now+0x3a6/0x570 [ 52.660250] ? do_timer+0x50/0x50 [ 52.663686] ? rcu_nmi_exit+0xd7/0x2b0 [ 52.667563] ? do_raw_spin_lock+0xc1/0x200 [ 52.671784] hrtimer_interrupt+0x286/0x650 [ 52.676033] smp_apic_timer_interrupt+0x15d/0x710 [ 52.680880] ? smp_call_function_single_interrupt+0x650/0x650 [ 52.686775] ? _raw_spin_lock+0x32/0x40 [ 52.690766] ? _raw_spin_unlock+0x22/0x30 [ 52.694921] ? handle_edge_irq+0x330/0x870 [ 52.699143] ? task_prio+0x50/0x50 [ 52.702673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 52.707504] apic_timer_interrupt+0xf/0x20 [ 52.711718] [ 52.713943] RIP: 0010:rtnl_newlink+0x1085/0x1a40 [ 52.718675] RSP: 0018:ffff8801b273f1c8 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 52.726366] RAX: ffff8801a99d82c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 52.733619] RDX: 0000000000000000 RSI: ffffffff85c09f2e RDI: ffffed00364e7e18 [ 52.740870] RBP: ffff8801b273f5f8 R08: ffff8801a99d82c0 R09: 0000000000000001 [ 52.748124] R10: ffff8801a99d82c0 R11: 0000000000000000 R12: ffff8801b273f5d0 [ 52.755371] R13: 0000000000000005 R14: 0000000000000000 R15: 0000000000000000 [ 52.762632] ? rtnl_newlink+0x107e/0x1a40 [ 52.766763] ? rtnl_newlink+0x4e7/0x1a40 [ 52.770813] ? rtnl_link_unregister+0x370/0x370 [ 52.775468] ? kasan_check_read+0x11/0x20 [ 52.779601] ? rcu_is_watching+0x85/0x140 [ 52.783733] ? __lock_acquire+0x7f5/0x5130 [ 52.787954] ? graph_lock+0x170/0x170 [ 52.791755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.797273] ? rtnl_get_link+0x164/0x350 [ 52.801310] ? rtnl_dump_all+0x5e0/0x5e0 [ 52.805347] ? rcu_is_watching+0x85/0x140 [ 52.809474] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 52.814644] ? __netlink_ns_capable+0x100/0x130 [ 52.819292] ? rtnl_link_unregister+0x370/0x370 [ 52.823946] rtnetlink_rcv_msg+0x466/0xc10 [ 52.828163] ? rtnetlink_put_metrics+0x690/0x690 [ 52.832902] netlink_rcv_skb+0x172/0x440 [ 52.837036] ? rtnetlink_put_metrics+0x690/0x690 [ 52.841778] ? netlink_ack+0xbc0/0xbc0 [ 52.845658] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 52.850837] ? netlink_skb_destructor+0x210/0x210 [ 52.855674] rtnetlink_rcv+0x1c/0x20 [ 52.859368] netlink_unicast+0x58b/0x740 [ 52.863413] ? netlink_attachskb+0x970/0x970 [ 52.867800] ? import_iovec+0x24b/0x420 [ 52.871755] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 52.876752] ? security_netlink_send+0x8f/0xc0 [ 52.882183] netlink_sendmsg+0x9d8/0xf80 [ 52.886224] ? netlink_unicast+0x740/0x740 [ 52.890439] ? security_socket_sendmsg+0x9b/0xd0 [ 52.895176] ? netlink_unicast+0x740/0x740 [ 52.899403] sock_sendmsg+0xd5/0x120 [ 52.903098] ___sys_sendmsg+0x805/0x940 [ 52.907054] ? copy_msghdr_from_user+0x560/0x560 [ 52.911798] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 52.916533] ? graph_lock+0x170/0x170 [ 52.920312] ? graph_lock+0x170/0x170 [ 52.924090] ? find_held_lock+0x36/0x1c0 [ 52.928143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.933662] ? __fget_light+0x2ef/0x430 [ 52.937627] ? fget_raw+0x20/0x20 [ 52.941063] ? find_held_lock+0x36/0x1c0 [ 52.945111] ? lock_downgrade+0x8e0/0x8e0 [ 52.949241] ? handle_mm_fault+0x8c0/0xc70 [ 52.953462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.958979] ? sockfd_lookup_light+0xc5/0x160 [ 52.963455] __sys_sendmsg+0x115/0x270 [ 52.967321] ? SyS_shutdown+0x30/0x30 [ 52.971102] ? __do_page_fault+0x441/0xe40 [ 52.975324] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 52.980148] SyS_sendmsg+0x29/0x30 [ 52.983665] ? __sys_sendmsg+0x270/0x270 [ 52.987705] do_syscall_64+0x29e/0x9d0 [ 52.991570] ? vmalloc_sync_all+0x30/0x30 [ 52.995697] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 53.000534] ? syscall_return_slowpath+0x5c0/0x5c0 [ 53.005447] ? syscall_return_slowpath+0x30f/0x5c0 [ 53.010356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.015872] ? retint_user+0x18/0x18 [ 53.019573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.024419] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 53.029596] RIP: 0033:0x7f7ca9285320 [ 53.033283] RSP: 002b:00007ffcee3e4628 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.040969] RAX: ffffffffffffffda RBX: 00007ffcee3e8720 RCX: 00007f7ca9285320 [ 53.048224] RDX: 0000000000000000 RSI: 00007ffcee3e4660 RDI: 0000000000000013 [ 53.055472] RBP: 00007ffcee3e4660 R08: 0000000000000000 R09: 00007f7ca92cbc00 [ 53.062723] R10: 0000000000000000 R11: 0000000000000246 R12: 000000005ac628e1 [ 53.069970] R13: 0000000000000000 R14: 00000000006395c0 R15: 00007ffcee3e8f00 [ 53.077225] [ 53.078826] The buggy address belongs to the page: [ 53.083734] page:ffffea0006c9cfc0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 53.091851] flags: 0x2fffc0000000000() [ 53.095727] raw: 02fffc0000000000 0000000000000000 0000000000000000 00000000ffffffff [ 53.103589] raw: 0000000000000000 ffffea0006c90101 0000000000000000 0000000000000000 [ 53.111452] page dumped because: kasan: bad access detected [ 53.117139] [ 53.118741] Memory state around the buggy address: [ 53.123650] ffff8801b273f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.130985] ffff8801b273f100: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca [ 53.138322] >ffff8801b273f180: 00 cb cb cb cb cb cb cb 00 00 00 00 00 00 00 00 [ 53.145663] ^ [ 53.150050] ffff8801b273f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 [ 53.157387] ffff8801b273f280: f1 f1 00 f2 f2 f2 f2 f2 f2 f2 00 00 f2 f2 f2 f2 [ 53.164722] ================================================================== [ 53.172098] Disabling lock debugging due to kernel taint [ 53.177520] Kernel panic - not syncing: panic_on_warn set ... [ 53.177520] [ 53.184867] CPU: 1 PID: 5514 Comm: ip Tainted: G B 4.16.0+ #1 [ 53.191940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.201287] Call Trace: [ 53.203843] [ 53.205974] dump_stack+0x1b9/0x29f [ 53.209580] ? arch_local_irq_restore+0x52/0x52 [ 53.214226] ? lock_downgrade+0x8e0/0x8e0 [ 53.218349] ? vprintk_default+0x28/0x30 [ 53.222388] ? tick_sched_handle+0x120/0x180 [ 53.226781] panic+0x22f/0x4de [ 53.229950] ? add_taint.cold.5+0x16/0x16 [ 53.234161] ? add_taint.cold.5+0x5/0x16 [ 53.238206] ? do_raw_spin_unlock+0x9e/0x2e0 [ 53.242594] ? tick_sched_handle+0x16d/0x180 [ 53.246988] kasan_end_report+0x47/0x4f [ 53.250947] kasan_report.cold.7+0xc9/0x2f5 [ 53.255254] __asan_report_load8_noabort+0x14/0x20 [ 53.260159] tick_sched_handle+0x16d/0x180 [ 53.264389] tick_sched_timer+0x42/0x130 [ 53.268429] __hrtimer_run_queues+0x3e3/0x10a0 [ 53.272996] ? tick_sched_do_timer+0x100/0x100 [ 53.277559] ? hrtimer_start_range_ns+0xd10/0xd10 [ 53.282383] ? pvclock_read_flags+0x160/0x160 [ 53.286854] ? __local_bh_enable+0xef/0x130 [ 53.291152] ? kvm_clock_read+0x25/0x30 [ 53.295105] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 53.300097] ? ktime_get_update_offsets_now+0x3a6/0x570 [ 53.305436] ? do_timer+0x50/0x50 [ 53.308880] ? rcu_nmi_exit+0xd7/0x2b0 [ 53.312746] ? do_raw_spin_lock+0xc1/0x200 [ 53.316964] hrtimer_interrupt+0x286/0x650 [ 53.321179] smp_apic_timer_interrupt+0x15d/0x710 [ 53.326001] ? smp_call_function_single_interrupt+0x650/0x650 [ 53.331870] ? _raw_spin_lock+0x32/0x40 [ 53.335828] ? _raw_spin_unlock+0x22/0x30 [ 53.339953] ? handle_edge_irq+0x330/0x870 [ 53.344165] ? task_prio+0x50/0x50 [ 53.347697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.352521] apic_timer_interrupt+0xf/0x20 [ 53.356725] [ 53.358950] RIP: 0010:rtnl_newlink+0x1085/0x1a40 [ 53.363678] RSP: 0018:ffff8801b273f1c8 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 53.371362] RAX: ffff8801a99d82c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 53.378641] RDX: 0000000000000000 RSI: ffffffff85c09f2e RDI: ffffed00364e7e18 [ 53.385907] RBP: ffff8801b273f5f8 R08: ffff8801a99d82c0 R09: 0000000000000001 [ 53.393153] R10: ffff8801a99d82c0 R11: 0000000000000000 R12: ffff8801b273f5d0 [ 53.400396] R13: 0000000000000005 R14: 0000000000000000 R15: 0000000000000000 [ 53.408301] ? rtnl_newlink+0x107e/0x1a40 [ 53.412428] ? rtnl_newlink+0x4e7/0x1a40 [ 53.416472] ? rtnl_link_unregister+0x370/0x370 [ 53.421127] ? kasan_check_read+0x11/0x20 [ 53.425249] ? rcu_is_watching+0x85/0x140 [ 53.429373] ? __lock_acquire+0x7f5/0x5130 [ 53.433583] ? graph_lock+0x170/0x170 [ 53.437368] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 53.442882] ? rtnl_get_link+0x164/0x350 [ 53.446934] ? rtnl_dump_all+0x5e0/0x5e0 [ 53.450978] ? rcu_is_watching+0x85/0x140 [ 53.455109] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 53.460277] ? __netlink_ns_capable+0x100/0x130 [ 53.464934] ? rtnl_link_unregister+0x370/0x370 [ 53.469581] rtnetlink_rcv_msg+0x466/0xc10 [ 53.473807] ? rtnetlink_put_metrics+0x690/0x690 [ 53.478549] netlink_rcv_skb+0x172/0x440 [ 53.482599] ? rtnetlink_put_metrics+0x690/0x690 [ 53.487336] ? netlink_ack+0xbc0/0xbc0 [ 53.491217] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 53.496387] ? netlink_skb_destructor+0x210/0x210 [ 53.501206] rtnetlink_rcv+0x1c/0x20 [ 53.504893] netlink_unicast+0x58b/0x740 [ 53.508933] ? netlink_attachskb+0x970/0x970 [ 53.513320] ? import_iovec+0x24b/0x420 [ 53.517272] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 53.522262] ? security_netlink_send+0x8f/0xc0 [ 53.526823] netlink_sendmsg+0x9d8/0xf80 [ 53.530865] ? netlink_unicast+0x740/0x740 [ 53.535083] ? security_socket_sendmsg+0x9b/0xd0 [ 53.539816] ? netlink_unicast+0x740/0x740 [ 53.544033] sock_sendmsg+0xd5/0x120 [ 53.547731] ___sys_sendmsg+0x805/0x940 [ 53.551699] ? copy_msghdr_from_user+0x560/0x560 [ 53.556442] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 53.561174] ? graph_lock+0x170/0x170 [ 53.564952] ? graph_lock+0x170/0x170 [ 53.568727] ? find_held_lock+0x36/0x1c0 [ 53.572766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.578280] ? __fget_light+0x2ef/0x430 [ 53.582232] ? fget_raw+0x20/0x20 [ 53.585662] ? find_held_lock+0x36/0x1c0 [ 53.589698] ? lock_downgrade+0x8e0/0x8e0 [ 53.593822] ? handle_mm_fault+0x8c0/0xc70 [ 53.598037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 53.603565] ? sockfd_lookup_light+0xc5/0x160 [ 53.608040] __sys_sendmsg+0x115/0x270 [ 53.611906] ? SyS_shutdown+0x30/0x30 [ 53.615687] ? __do_page_fault+0x441/0xe40 [ 53.619911] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 53.624732] SyS_sendmsg+0x29/0x30 [ 53.628262] ? __sys_sendmsg+0x270/0x270 [ 53.632300] do_syscall_64+0x29e/0x9d0 [ 53.636163] ? vmalloc_sync_all+0x30/0x30 [ 53.640291] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 53.645112] ? syscall_return_slowpath+0x5c0/0x5c0 [ 53.650025] ? syscall_return_slowpath+0x30f/0x5c0 [ 53.654937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.660450] ? retint_user+0x18/0x18 [ 53.664141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.668966] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 53.674142] RIP: 0033:0x7f7ca9285320 [ 53.677851] RSP: 002b:00007ffcee3e4628 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.685535] RAX: ffffffffffffffda RBX: 00007ffcee3e8720 RCX: 00007f7ca9285320 [ 53.692785] RDX: 0000000000000000 RSI: 00007ffcee3e4660 RDI: 0000000000000013 [ 53.700039] RBP: 00007ffcee3e4660 R08: 0000000000000000 R09: 00007f7ca92cbc00 [ 53.707287] R10: 0000000000000000 R11: 0000000000000246 R12: 000000005ac628e1 [ 53.714545] R13: 0000000000000000 R14: 00000000006395c0 R15: 00007ffcee3e8f00 [ 53.721843] Dumping ftrace buffer: [ 53.725361] (ftrace buffer empty) [ 53.729067] Kernel Offset: disabled [ 53.732679] Rebooting in 86400 seconds..