INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2018/04/20 20:19:07 fuzzer started 2018/04/20 20:19:08 dialing manager at 10.128.0.26:40315 2018/04/20 20:19:14 kcov=true, comps=false 2018/04/20 20:19:17 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc0189436, &(0x7f0000000180)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x10000000007}) 2018/04/20 20:19:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') lseek(r0, 0x2, 0x0) 2018/04/20 20:19:17 executing program 7: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 2018/04/20 20:19:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") ioctl$fiemap(r1, 0x40086610, &(0x7f0000000100)=ANY=[]) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) r3 = dup3(r2, r0, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='9:4\r'], 0x4) preadv(r3, &(0x7f0000002440)=[{&(0x7f0000000140)=""/38, 0x26}], 0x1, 0x0) 2018/04/20 20:19:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000537000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000f54000)) 2018/04/20 20:19:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000010fdc)="2300000024009115460000000000001202000000000000270241000000000013007352", 0x23}], 0x1}, 0x0) 2018/04/20 20:19:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/20 20:19:17 executing program 6: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f00004fc000/0x2000)=nil, 0x2000, 0x1, 0xffffffffffffffff) syzkaller login: [ 45.245740] ip (3755) used greatest stack depth: 54688 bytes left [ 45.685497] ip (3795) used greatest stack depth: 54312 bytes left [ 46.752726] ip (3893) used greatest stack depth: 54200 bytes left [ 46.808776] ip (3899) used greatest stack depth: 53960 bytes left [ 47.037526] ip (3913) used greatest stack depth: 53640 bytes left [ 47.188721] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.195305] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.221289] device bridge_slave_0 entered promiscuous mode [ 47.252909] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.259440] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.270225] device bridge_slave_0 entered promiscuous mode [ 47.290096] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.296644] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.320348] device bridge_slave_0 entered promiscuous mode [ 47.340012] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.346635] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.380471] device bridge_slave_0 entered promiscuous mode [ 47.398883] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.405431] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.423495] device bridge_slave_0 entered promiscuous mode [ 47.432027] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.438578] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.453273] device bridge_slave_0 entered promiscuous mode [ 47.463981] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.470508] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.498132] device bridge_slave_0 entered promiscuous mode [ 47.512966] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.519492] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.527935] device bridge_slave_1 entered promiscuous mode [ 47.535751] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.542255] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.559258] device bridge_slave_1 entered promiscuous mode [ 47.569418] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.575912] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.604290] device bridge_slave_1 entered promiscuous mode [ 47.620597] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.627136] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.641481] device bridge_slave_1 entered promiscuous mode [ 47.650969] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.657501] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.672356] device bridge_slave_1 entered promiscuous mode [ 47.680738] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.687238] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.704259] device bridge_slave_0 entered promiscuous mode [ 47.734536] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.741099] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.764688] device bridge_slave_1 entered promiscuous mode [ 47.771870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.779502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.787316] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.793824] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.830012] device bridge_slave_1 entered promiscuous mode [ 47.837782] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.847679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.855695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.890835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.913071] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.919604] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.973111] device bridge_slave_1 entered promiscuous mode [ 48.009987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.025771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.035838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.043573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.051295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.061670] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.109653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.191111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.307808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.434235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.004308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.031506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.048184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.085454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.112677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.152222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.240125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.250100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.263263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.288665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.307207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.327776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.401975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.421844] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.574476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.624943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.175313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.320481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.332376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.349930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.387705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.421804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.474789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.530915] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.539964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.553551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.564598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.604454] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.612464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.624517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.662534] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.670852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.687600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.764475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.773800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.794165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.822348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.835351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.843148] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.851455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.862975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.895143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.922278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.941001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.966166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.984348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.997167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.013139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.023102] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.030225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.041624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.055875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.064345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.084778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.104169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.118557] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.125961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.136870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.144150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.167270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.188829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.207457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.222675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.238099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.254245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.273256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.285614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.309382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.322213] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.329454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.346491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.465443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.472722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.484507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.528670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.536805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.560389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.787110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.794525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.809926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.420082] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.426624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.433547] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.440061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.467720] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.476350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.498528] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.505093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.511956] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.518461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.528227] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.541078] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.547595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.554458] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.560936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.582487] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.596523] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.603113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.609986] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.616455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.675202] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.809806] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.816335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.823289] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.829810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.915254] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.968801] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.975339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.982284] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.988769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.041284] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.048893] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.055372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.062256] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.068699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.079008] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.298684] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.305223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.312187] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.318694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.362118] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.497337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.517547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.561738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.588357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.603789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.612227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.620586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.344278] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.468984] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.489886] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.516700] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.685517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.755686] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.784879] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.054384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.164669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.170983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.181706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.281314] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.288626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.297596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.326345] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.334938] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.343735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.377914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.413292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.435854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.470639] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.482997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.491323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.694301] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.700854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.714654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.747494] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.756305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.775728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.035391] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.042703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.056967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 20:19:45 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/76) 2018/04/20 20:19:45 executing program 1: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001400ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 2018/04/20 20:19:45 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000aa9ffc), &(0x7f0000aa9000)=0x4) 2018/04/20 20:19:45 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in6=@loopback={0x0, 0x1}, 0x4e22, 0x2, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x2b}, 0x0, @in=@loopback=0x7f000001}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 20:19:45 executing program 4: socket$inet(0x2, 0x3, 0x32) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @rand_addr}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}}}, 0x0) 2018/04/20 20:19:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r1, 0xa01, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 2018/04/20 20:19:45 executing program 6: r0 = socket$inet(0xa, 0x803, 0xb7) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x29, 0x30, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x8f) 2018/04/20 20:19:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4, {0x2, 0x0, @rand_addr}, 'bond0\x00'}) 2018/04/20 20:19:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) read(r0, &(0x7f0000000040)=""/28, 0x1c) getpid() ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 20:19:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xf}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000100)="cf", &(0x7f0000000180)=""/160}, 0x18) 2018/04/20 20:19:45 executing program 7: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, r1+30000000}, {0x0, 0x989680}}, &(0x7f0000000000)) timerfd_gettime(r0, &(0x7f0000000080)) 2018/04/20 20:19:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 2018/04/20 20:19:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r0) 2018/04/20 20:19:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000003b80)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './bus', [{0x20, '['}], 0xa}, 0xb) 2018/04/20 20:19:45 executing program 6: r0 = gettid() timer_create(0x3, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) prctl$setptracer(0x59616d61, r0) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) 2018/04/20 20:19:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x0, 0x1}}) 2018/04/20 20:19:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xf}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000100)="cf", &(0x7f0000000180)=""/160}, 0x18) 2018/04/20 20:19:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x49249249249259f, 0x0) 2018/04/20 20:19:46 executing program 7: r0 = socket$inet(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x29, 0x17, &(0x7f0000000080)={0x803, 'ip6gretap0\x00'}, 0x18) 2018/04/20 20:19:46 executing program 0: r0 = socket(0x1f, 0x802, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0x9, &(0x7f00000000c0), 0x4) 2018/04/20 20:19:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x8, 0x35aa}, 0x0) 2018/04/20 20:19:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x6}, 0x10) 2018/04/20 20:19:46 executing program 4: clock_gettime(0x4, &(0x7f0000000000)) 2018/04/20 20:19:46 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, &(0x7f0000014000), 0x10001) 2018/04/20 20:19:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x49249249249259f, 0x0) 2018/04/20 20:19:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x49249249249259f, 0x0) 2018/04/20 20:19:47 executing program 6: open(&(0x7f0000000180)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1200, &(0x7f0000004080)=ANY=[]) syz_emit_ethernet(0x106, &(0x7f00000004c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, "276b89", 0xd0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[@hopopts={0x0, 0x11, [], [@generic, @generic={0x0, 0x88, "a89e5689f1d6b1e43eb8e2c413759e42bfe333efa76cbce56b80bed4e221e8e6481e957a870ae88a65bbcaa99e980dcaf02da19aac9bc6012a0f547deac309d30eb87c2d8303a69afe4134bbf5ba15fcd5c13663d62a63e1b497420e2c12714a4213af444f1acf7edf74446843b12d163cf63d4d23a49d36fea068abd964c659e5e8ac9fcf98826c"}]}], @icmpv6=@time_exceed={0x3, 0x1, 0x0, 0x0, [], {0x4, 0x6, "a9edae", 0x9, 0x3b, 0x9, @mcast2={0xff, 0x2, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, [@fragment={0x2e, 0x0, 0x0, 0x4, 0x0, 0x780000000000, 0x66}]}}}}}}}, &(0x7f0000000000)={0x1, 0x2, [0x0, 0x770, 0xd47, 0x12]}) r0 = open(&(0x7f0000002000)='./bus\x00', 0x4202, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) write$cgroup_pid(r0, &(0x7f0000000400)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0xff9f) 2018/04/20 20:19:47 executing program 4: r0 = socket(0x1f, 0x2000000000000005, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)='g', 0x1}], 0x1}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000180)=@ethtool_sset_info={0x37}}) 2018/04/20 20:19:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0xb1aa9f069e0a3aed, &(0x7f0000000040)) 2018/04/20 20:19:47 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x4, 0x32, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/20 20:19:47 executing program 7: syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)={[{@nocompress='nocompress', 0x2c}]}) 2018/04/20 20:19:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x6}, 0x10) 2018/04/20 20:19:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x80000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0x3}]}, 0x20}, 0x1}, 0x0) 2018/04/20 20:19:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff60061"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5, 0x0, 0x1018}], {0x95}}, &(0x7f0000002cc0)="73797a6b616c6c657201", 0x7, 0xfde1, &(0x7f00000003c0)=""/187}, 0x48) 2018/04/20 20:19:47 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000003c0)='./control/file0\x00', &(0x7f0000000380)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='btrfs\x00', 0x1000, &(0x7f0000000240)) getresuid(&(0x7f0000000080), &(0x7f0000000400), &(0x7f0000000440)) umount2(&(0x7f0000000200)='./file0\x00', 0x0) rename(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./control\x00') close(r0) 2018/04/20 20:19:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/20 20:19:47 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000040)=@random={'user.', 'trusted\x00'}) 2018/04/20 20:19:47 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10}, 0xc) 2018/04/20 20:19:47 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f00004cfff8)=0x6) sendto$inet(r0, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000004c0)=0x1, 0x4) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg$kcm(r0, &(0x7f00000060c0)={&(0x7f0000002dc0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000005040), 0x0, &(0x7f00000050c0)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000002d80)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000000980)=""/220, 0xdc}], 0x1}, 0x100) 2018/04/20 20:19:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) 2018/04/20 20:19:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x49249249249259f, 0x0) 2018/04/20 20:19:48 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000003c0)='./control/file0\x00', &(0x7f0000000380)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='btrfs\x00', 0x1000, &(0x7f0000000240)) getresuid(&(0x7f0000000080), &(0x7f0000000400), &(0x7f0000000440)) umount2(&(0x7f0000000200)='./file0\x00', 0x0) rename(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./control\x00') close(r0) 2018/04/20 20:19:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000040)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff81, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}}}}}}}, 0x0) 2018/04/20 20:19:48 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e0000000000160000000000000040000000000000000000000000000000000000000000380002"], 0x39) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/20 20:19:48 executing program 6: r0 = socket(0x1f, 0x2000000000000005, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xc) 2018/04/20 20:19:48 executing program 5: process_vm_writev(0x0, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/10, 0xa}], 0x1, &(0x7f00000029c0)=[{&(0x7f0000000540)=""/210, 0xd2}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/115, 0x73}, {&(0x7f00000026c0)=""/183, 0xb7}, {&(0x7f0000002780)=""/74, 0x4a}, {&(0x7f0000002800)=""/104, 0x7fffcdba}, {&(0x7f0000002880)=""/117, 0x75}, {&(0x7f0000002900)=""/160, 0xa0}], 0x9, 0x0) 2018/04/20 20:19:48 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"626373685c41000f00000038c500", 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000026c0)={0x1, &(0x7f0000002680)=[{0x6}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) 2018/04/20 20:19:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x13, &(0x7f00000003c0)={'nouuid,', {[{@filestreams='filestreams', 0x2c}]}}) 2018/04/20 20:19:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00007b1000)={&(0x7f0000da5000)={0x10}, 0xc, &(0x7f0000c24000)={&(0x7f0000539000)={0x24, 0xd, 0xa, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x10, 0x1, [@typed={0xc, 0x0, @fd}]}]}, 0x24}, 0x1}, 0x0) 2018/04/20 20:19:48 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000001fed8)=@dellink={0x28, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IF_NETNSID={0x8, 0x2e}]}, 0x28}, 0x1}, 0x0) 2018/04/20 20:19:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6", 0x11}], 0x1, &(0x7f000006a000)}], 0x1, 0x0) 2018/04/20 20:19:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x13, &(0x7f00000003c0)={'nouuid,', {[{@filestreams='filestreams', 0x2c}]}}) 2018/04/20 20:19:48 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2=0xe0000002, @multicast1=0xe0000001, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2=0xe0000002, @multicast1=0xe0000001}, 0xc) 2018/04/20 20:19:48 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000aeb000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, {[@timestamp={0x44, 0x10, 0x7, 0x1, 0x0, [{[@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}]}, {}]}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000000100)) 2018/04/20 20:19:48 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x2002) close(r0) 2018/04/20 20:19:48 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) 2018/04/20 20:19:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xc8) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000340), 0x0, &(0x7f00000003c0)}, 0x0) ioctl$TUNGETSNDBUF(r0, 0x541b, &(0x7f0000000100)) 2018/04/20 20:19:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x49249249249259f, 0x0) 2018/04/20 20:19:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x10000000001) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0x0, 0x0, {@in=@rand_addr}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) 2018/04/20 20:19:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000640)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000780)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x20000010800a}) r1 = memfd_create(&(0x7f0000000000)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 20:19:49 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x0) listen(r0, 0x0) 2018/04/20 20:19:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x20, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 2018/04/20 20:19:49 executing program 0: r0 = memfd_create(&(0x7f0000ee6ff4)='--vboxnet0.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000951000)='/dev/snd/seq\x00', 0x0, 0x200008000020002) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000fbef74)={0x0, 0x0, 0x0, "71756575650000005d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ffffffffffffff00"}) clock_gettime(0x0, &(0x7f0000aedff0)={0x0}) write$sndseq(r0, &(0x7f0000040000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @result}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time={r3}, {}, {}, @result}], 0xf0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000045000)={0x1f}) 2018/04/20 20:19:49 executing program 7: r0 = socket(0x1000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000f81fc8)={&(0x7f0000f81000)={0x10}, 0xc, &(0x7f0000f75ff0)={&(0x7f0000a28000)=@newlink={0x38, 0x10, 0xffffffffffffffff, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, [@IFLA_INFO_KIND={0x14, 0x1, "69703667726500000000000000060000"}]}]}, 0x38}, 0x1}, 0x0) 2018/04/20 20:19:49 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='zkeyringmime_typelo\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0x40bc5311, &(0x7f00006e7f50)={{0x80}, 'port0\x00'}) 2018/04/20 20:19:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00003b9fee)='/dev/input/event#\x00', 0xa2bd, 0x0) arch_prctl(0x0, &(0x7f0000000080)="0601") ioctl$EVIOCGKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)=""/107) 2018/04/20 20:19:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) 2018/04/20 20:19:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="24004aa36137330b6679374db37718af3f91b00a9235908dee589c597d8f7dec52277a92830ed6390522aaa8662471dca5bc1ae79e22e989a6c1afbb60ef513138ee6f16e5f1c4ac2753aa7a9f0686bddd9caff81015270a50677cddcba54d0f919d68d550479c63e9b64156513c474e0cca868cd6832affb597", 0x0) write(r0, &(0x7f0000000140)="b28de81d3752985a46b9b9", 0xb) sendfile(r0, r0, &(0x7f0000001000), 0xfec) 2018/04/20 20:19:50 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') rmdir(&(0x7f0000000040)='./control/file0\x00') close(r0) 2018/04/20 20:19:50 executing program 7: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents64(r0, &(0x7f0000ceffd4)=""/44, 0x2c) 2018/04/20 20:19:50 executing program 2: r0 = socket$inet(0x2, 0x8080a, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @multicast1=0xe0000001}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x6d2d1a7b8f49fea8, {0x2}, 'gre0\x00'}) 2018/04/20 20:19:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) 2018/04/20 20:19:50 executing program 6: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="cefaad1b", 0x4}], 0x208000, 0x0) 2018/04/20 20:19:50 executing program 1: r0 = gettid() r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) [ 75.560480] syz-executor2 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/20 20:19:50 executing program 4: r0 = socket$nl_xfrm(0xa, 0x5, 0x84) getsockopt$bt_hci(r0, 0x84, 0x7d, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x3) 2018/04/20 20:19:50 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x100000000013, 0x17c) 2018/04/20 20:19:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000656000), 0x0) 2018/04/20 20:19:50 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000001031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) 2018/04/20 20:19:51 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000e2b000)='/dev/vcsa#\x00', 0xc81, 0x1) pwrite64(r0, &(0x7f0000000000)='L', 0x1, 0x5) 2018/04/20 20:19:51 executing program 2: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ftruncate(r0, 0x8001) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) read(r1, &(0x7f0000003600)=""/4096, 0x1000) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) ftruncate(r0, 0x0) fallocate(r1, 0x3, 0x0, 0xffffffff000) 2018/04/20 20:19:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) sched_rr_get_interval(0x0, &(0x7f00004bb4a0)={0x0, 0x0}) io_setup(0x2, &(0x7f0000000180)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0}) io_getevents(r2, 0x1, 0x1, &(0x7f00000001c0)=[{}], &(0x7f0000000240)={r3}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, r1}}, &(0x7f0000ec6000)) tkill(r0, 0x15) 2018/04/20 20:19:51 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000), 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x9800, &(0x7f0000653ff0)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f00000002c0)=@nl=@unspec, 0xc, &(0x7f0000000400), 0x1e1, &(0x7f0000000440)}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500), 0xfea8}], 0x9d, &(0x7f0000000200), 0x15d}}], 0x2, 0x8000) 2018/04/20 20:19:51 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000079fee)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$evdev(r0, &(0x7f0000057fa0)=[{{0x100000}, 0x2}], 0x18) 2018/04/20 20:19:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) 2018/04/20 20:19:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="400000000002000019000000dc0100002c000000010000000000000000000000002000000020000040000000000000003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@norecovery='norecovery', 0x2c}, {@nolazytime='nolazytime', 0x2c}, {@auto_da_alloc='auto_da_alloc', 0x2c}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}, 0x2c}]}) 2018/04/20 20:19:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000fcb000)=0xffffffa4, 0x4) 2018/04/20 20:19:51 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="617474722f63757272656e7400400d250332c827c0954b2ded6a8ce2b36786ad7cc625889d378ac359f8d15849097c9748d719c0cfaa7476d4f657822604def858d36f2982fbe223633f8a18d29ac42e495539a1d5004a065a00d12c127dcb81f1a0aa26c7cef9883ed76cde9551fa5996b10426fcfcd79e01b8dce2670d0381153d62e1afc1a87ab7a934691829a779f74826946d9429b34ab41dd6df2d8346be2d") ftruncate(r0, 0x0) 2018/04/20 20:19:51 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000), 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x9800, &(0x7f0000653ff0)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f00000002c0)=@nl=@unspec, 0xc, &(0x7f0000000400), 0x1e1, &(0x7f0000000440)}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500), 0xfea8}], 0x9d, &(0x7f0000000200), 0x15d}}], 0x2, 0x8000) 2018/04/20 20:19:51 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x0, 0xffffffffffffffff) 2018/04/20 20:19:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="c8"]) 2018/04/20 20:19:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000776000)=[{&(0x7f0000000040)="240000004f00030207fffd946fa283bc0ae6e60000000000000c5a00000003a2d189737e", 0x24}], 0x1}, 0x0) 2018/04/20 20:19:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="400000000002000019000000dc0100002c000000010000000000000000000000002000000020000040000000000000003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@norecovery='norecovery', 0x2c}, {@nolazytime='nolazytime', 0x2c}, {@auto_da_alloc='auto_da_alloc', 0x2c}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}, 0x2c}]}) 2018/04/20 20:19:51 executing program 6: r0 = socket(0x1f, 0x2000000000000005, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004cc0)=[{{&(0x7f0000004680)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a00)=""/43, 0x2b}}, {{&(0x7f0000000180)=@ax25, 0x80, &(0x7f0000004b80), 0x10000000000000e2, &(0x7f0000004bc0)=""/224, 0xe0}}], 0x2, 0x0, 0x0) close(r0) 2018/04/20 20:19:51 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00006da000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/20 20:19:52 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x6e, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}], 0x1c) 2018/04/20 20:19:52 executing program 4: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000340)="034bc1bc2a205ed115e5b2fd9faf563bd310bad5921fdec4f03af0c797c301a22b64c86f063c7f4cb535b5595151c70dbeeecdd731591c0a136610ab6be61ae531025d27962a0ade68a46ba5fb28e585fbb4dbb08c0fc2430bbf119f738428c90211f035e02cdc9036c161f805dc907707a47c65ff03c3f7288d9b587b17fed9b75294a8c551dedfa3", 0x89}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="cefaad1b000e0000ffff", 0xa}], 0x1, 0x0) 2018/04/20 20:19:52 executing program 1: r0 = socket(0x18, 0x0, 0x2) getpeername(r0, &(0x7f0000000fa0)=@nfc_llcp, &(0x7f0000001000)=0x60) 2018/04/20 20:19:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) read(r1, &(0x7f0000001140)=""/20, 0x5) 2018/04/20 20:19:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000c03000)={{0x20000000000080}, "0a4ceaa05dad126e00000002a1569b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42d576589701a4", 0x77, 0x10000a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000b65000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 20:19:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00001c5d9f)={0x6, 0x4, 0x87, 0xf}, 0x2c) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x39, "679946a0ed7c3503deb2e7ef1c32337be6362a8aa042cbc45b0aec20f62ab0f8f4c7821ee00eb82eb5669667f83173118d7db981b4a5bb5e2d"}, &(0x7f00000001c0)=0x41) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f00000000c0), &(0x7f0000000100)=""/136}, 0x18) 2018/04/20 20:19:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="a7118230eef5e420406dc6a099da077d", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0xc000) recvmsg(r1, &(0x7f0000003780)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000000140)=""/5, 0x7ffff000}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/5, 0x5}, 0x0) 2018/04/20 20:19:52 executing program 6: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x250, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x2, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'rose0\x00', 'lo\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'ftp-20000\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {{{0x0, 0x0, 0x0, 'teql0\x00', 'ip6gretap0\x00', 'ip_vti0\x00', 'bond0\x00', @random="5d049f1ec9d6", [], @random="e77cf6eed1be", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x2c8) 2018/04/20 20:19:52 executing program 5: r0 = socket$kcm(0x29, 0x802, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000000)=@in6={0xa}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="a0", 0x1}], 0x1, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ab00)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x80, &(0x7f000000a280), 0x0, &(0x7f0000000100)}}, {{&(0x7f000000a440)=@nfc={0x27}, 0x80, &(0x7f000000a5c0), 0x0, &(0x7f000000a600)}}], 0x2, 0x0) 2018/04/20 20:19:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14}}]}, 0x24}, 0x1}, 0x0) 2018/04/20 20:19:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d556b895298992ea54d60004002c5b534c90c20000000000", 0x18) 2018/04/20 20:19:53 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\f'], &(0x7f0000001ffc), 0x1400) 2018/04/20 20:19:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x40605346, &(0x7f0000000100)={0x0, @time}) 2018/04/20 20:19:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) 2018/04/20 20:19:53 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, &(0x7f0000000000)=0xa0) 2018/04/20 20:19:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14}}]}, 0x24}, 0x1}, 0x0) 2018/04/20 20:19:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) [ 78.238210] ================================================================== [ 78.245656] BUG: KMSAN: uninit-value in __twofish_setkey+0x269/0xa150 [ 78.252246] CPU: 0 PID: 6206 Comm: syz-executor2 Not tainted 4.16.0+ #84 [ 78.259089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.268449] Call Trace: [ 78.271080] dump_stack+0x185/0x1d0 [ 78.274729] ? __twofish_setkey+0x269/0xa150 [ 78.279150] kmsan_report+0x142/0x240 [ 78.282968] __msan_warning_32+0x6c/0xb0 2018/04/20 20:19:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x14, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x8, 0x100000000000000}}, 0x14}, 0x1}, 0x0) [ 78.287048] __twofish_setkey+0x269/0xa150 [ 78.291333] twofish_setkey+0x9a/0xb0 [ 78.295150] ? __twofish_setkey+0xa150/0xa150 [ 78.299650] setkey+0x50f/0x5a0 [ 78.302968] crypto_xcbc_digest_setkey+0x4b7/0x570 [ 78.307904] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 78.312755] ? twofish_dec_blk+0x7c0/0x7c0 [ 78.316997] ? twofish_dec_blk+0x7c0/0x7c0 [ 78.321241] ? twofish_dec_blk+0x7c0/0x7c0 [ 78.325509] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 78.330359] ? shash_async_setkey+0x2c8/0x4c0 [ 78.334869] ? crypto_xcbc_digest_final+0x530/0x530 [ 78.339896] shash_async_setkey+0x337/0x4c0 [ 78.344240] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 78.349616] ? trace_kmalloc+0xb6/0x2b0 [ 78.353624] ? shash_async_digest+0x1b0/0x1b0 [ 78.358138] crypto_ahash_setkey+0x31a/0x470 [ 78.362563] hash_setkey+0x8b/0xa0 [ 78.366117] alg_setsockopt+0x6c5/0x740 [ 78.370110] ? hash_release+0x50/0x50 [ 78.373918] ? alg_accept+0xd0/0xd0 [ 78.377556] SYSC_setsockopt+0x4b8/0x570 [ 78.381656] SyS_setsockopt+0x76/0xa0 [ 78.385465] do_syscall_64+0x309/0x430 [ 78.389365] ? SYSC_recv+0xe0/0xe0 [ 78.392920] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.398111] RIP: 0033:0x455379 [ 78.401301] RSP: 002b:00007f7c3936ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 78.409019] RAX: ffffffffffffffda RBX: 00007f7c3936b6d4 RCX: 0000000000455379 [ 78.416299] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 78.423581] RBP: 000000000072bea0 R08: 0000000000000018 R09: 0000000000000000 [ 78.430854] R10: 0000000020000400 R11: 0000000000000246 R12: 00000000ffffffff [ 78.438127] R13: 0000000000000519 R14: 00000000006faaf8 R15: 0000000000000000 [ 78.445405] [ 78.447035] Local variable description: ----vla@crypto_xcbc_digest_setkey [ 78.453964] Variable was created at: [ 78.457729] crypto_xcbc_digest_setkey+0x12e/0x570 [ 78.462677] shash_async_setkey+0x337/0x4c0 [ 78.466997] ================================================================== [ 78.474357] Disabling lock debugging due to kernel taint [ 78.479807] Kernel panic - not syncing: panic_on_warn set ... [ 78.479807] 2018/04/20 20:19:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14}}]}, 0x24}, 0x1}, 0x0) 2018/04/20 20:19:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(serpent),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f00000025c0)=[{&(0x7f0000001480)="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", 0xc5e}], 0x1) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) [ 78.487184] CPU: 0 PID: 6206 Comm: syz-executor2 Tainted: G B 4.16.0+ #84 [ 78.495327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.504773] Call Trace: [ 78.507385] dump_stack+0x185/0x1d0 [ 78.511029] panic+0x39d/0x940 [ 78.514257] ? __twofish_setkey+0x269/0xa150 [ 78.518674] kmsan_report+0x238/0x240 [ 78.522483] __msan_warning_32+0x6c/0xb0 [ 78.526552] __twofish_setkey+0x269/0xa150 [ 78.530814] twofish_setkey+0x9a/0xb0 [ 78.534624] ? __twofish_setkey+0xa150/0xa150 [ 78.539126] setkey+0x50f/0x5a0 [ 78.542424] crypto_xcbc_digest_setkey+0x4b7/0x570 [ 78.547367] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 78.552224] ? twofish_dec_blk+0x7c0/0x7c0 [ 78.556467] ? twofish_dec_blk+0x7c0/0x7c0 [ 78.560715] ? twofish_dec_blk+0x7c0/0x7c0 [ 78.564962] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 78.569814] ? shash_async_setkey+0x2c8/0x4c0 [ 78.574325] ? crypto_xcbc_digest_final+0x530/0x530 [ 78.579352] shash_async_setkey+0x337/0x4c0 [ 78.583689] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 78.589065] ? trace_kmalloc+0xb6/0x2b0 [ 78.593065] ? shash_async_digest+0x1b0/0x1b0 [ 78.597583] crypto_ahash_setkey+0x31a/0x470 [ 78.602007] hash_setkey+0x8b/0xa0 [ 78.605557] alg_setsockopt+0x6c5/0x740 [ 78.609539] ? hash_release+0x50/0x50 [ 78.613347] ? alg_accept+0xd0/0xd0 [ 78.616987] SYSC_setsockopt+0x4b8/0x570 [ 78.621070] SyS_setsockopt+0x76/0xa0 [ 78.624882] do_syscall_64+0x309/0x430 [ 78.628783] ? SYSC_recv+0xe0/0xe0 [ 78.632334] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.637529] RIP: 0033:0x455379 [ 78.640718] RSP: 002b:00007f7c3936ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 78.648430] RAX: ffffffffffffffda RBX: 00007f7c3936b6d4 RCX: 0000000000455379 [ 78.655695] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 78.662966] RBP: 000000000072bea0 R08: 0000000000000018 R09: 0000000000000000 [ 78.670226] R10: 0000000020000400 R11: 0000000000000246 R12: 00000000ffffffff [ 78.677488] R13: 0000000000000519 R14: 00000000006faaf8 R15: 0000000000000000 [ 78.685269] Dumping ftrace buffer: [ 78.688798] (ftrace buffer empty) [ 78.692483] Kernel Offset: disabled [ 78.696087] Rebooting in 86400 seconds..