INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.54' (ECDSA) to the list of known hosts. 2018/04/19 08:20:22 fuzzer started 2018/04/19 08:20:22 dialing manager at 10.128.0.26:42695 2018/04/19 08:20:28 kcov=true, comps=false 2018/04/19 08:20:32 executing program 0: perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) dup(0xffffffffffffffff) 2018/04/19 08:20:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0), 0x0) 2018/04/19 08:20:32 executing program 7: mprotect(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 2018/04/19 08:20:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(r0, 0x0, 0x0) 2018/04/19 08:20:32 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/19 08:20:32 executing program 5: r0 = socket(0x40000000018, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/19 08:20:32 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000008000)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="180000002e00130800000000000000000300000004000000"], 0x1}, 0x1}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) 2018/04/19 08:20:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f0000000000)=0xb00, 0x1100000000) syzkaller login: [ 44.614823] ip (3782) used greatest stack depth: 54672 bytes left [ 45.008130] ip (3817) used greatest stack depth: 54312 bytes left [ 45.881278] ip (3903) used greatest stack depth: 54200 bytes left [ 46.167247] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.173739] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.234091] device bridge_slave_0 entered promiscuous mode [ 46.329772] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.336272] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.378141] device bridge_slave_0 entered promiscuous mode [ 46.405261] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.411763] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.441244] device bridge_slave_0 entered promiscuous mode [ 46.464258] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.470754] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.489386] device bridge_slave_1 entered promiscuous mode [ 46.498727] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.505177] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.515993] device bridge_slave_0 entered promiscuous mode [ 46.532015] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.538490] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.565298] device bridge_slave_0 entered promiscuous mode [ 46.582327] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.588812] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.596839] device bridge_slave_0 entered promiscuous mode [ 46.606078] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.612580] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.623440] device bridge_slave_0 entered promiscuous mode [ 46.630374] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.636872] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.660700] device bridge_slave_0 entered promiscuous mode [ 46.679863] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.686336] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.712279] device bridge_slave_1 entered promiscuous mode [ 46.725074] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.731539] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.745454] device bridge_slave_1 entered promiscuous mode [ 46.752724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.760741] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.767165] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.789195] device bridge_slave_1 entered promiscuous mode [ 46.814727] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.821222] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.854073] device bridge_slave_1 entered promiscuous mode [ 46.863963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.871121] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.877594] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.913554] device bridge_slave_1 entered promiscuous mode [ 46.928130] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.934592] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.954791] device bridge_slave_1 entered promiscuous mode [ 46.961790] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.968285] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.991305] device bridge_slave_1 entered promiscuous mode [ 47.000236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.007831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.017859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.035112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.043392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.106497] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.195806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.213642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.233172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.255214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.272114] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.282947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.333331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.455215] ip (4007) used greatest stack depth: 53976 bytes left [ 47.525675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.741545] ip (4030) used greatest stack depth: 53656 bytes left [ 47.837269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.045684] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.183933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.239315] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.254495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.262268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.327769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.375831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.432793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.454438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.466138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.498693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.565212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.575997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.621818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.781743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.054603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.278554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.478650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.497294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.506348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.516690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.523615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.543746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.597390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.608423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.619920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.710228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.729903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.740975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.756863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.764427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.782175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.819701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.830780] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.841991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.851665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.957479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.965944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.983785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.001969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.013979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.030770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.052107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.059521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.076133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.119763] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.126957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.143809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.156133] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.164127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.174119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.187850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.215469] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.225454] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.234171] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.243226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.292422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.322511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.341821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.355361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.363541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.380880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.391906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.407162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.415770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.433113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.451936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.470563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.478711] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.486294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.504393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.513222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.528183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.540197] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.554813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.563013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.610846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.620550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.649917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.393438] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.399958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.406863] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.413326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.474427] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.480961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.671395] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.677903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.684816] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.691271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.713143] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.734355] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.740844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.747694] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.754180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.799356] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.809225] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.815718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.822595] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.829103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.874429] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.905208] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.911717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.918610] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.925141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.984970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.998482] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.004995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.011937] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.018460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.085769] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.098665] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.105139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.111951] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.118377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.138234] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.156478] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.162966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.169786] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.176248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.253954] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.536521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.550650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.590642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.618751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.635713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.644455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.652662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.203721] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.253123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.417621] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.497716] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.667155] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.748144] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.757571] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.866380] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.040542] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.046801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.058624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.089120] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.095373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.112629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.169553] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.175846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.187739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.289181] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.295487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.312640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.473374] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.479677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.488986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.526693] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.532986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.551015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.632393] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.638692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.649717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.822573] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.828854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.840628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/19 08:20:58 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/19 08:20:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') sendfile(r1, r0, &(0x7f0000000000)=0xb00, 0x1100000000) 2018/04/19 08:20:59 executing program 4: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000700)={[{@umask={'umask', 0x3d, [0x37]}, 0x2c}]}) 2018/04/19 08:20:59 executing program 2: 2018/04/19 08:20:59 executing program 0: perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) dup(0xffffffffffffffff) 2018/04/19 08:20:59 executing program 1: 2018/04/19 08:20:59 executing program 2: 2018/04/19 08:20:59 executing program 7: 2018/04/19 08:20:59 executing program 4: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000700)={[{@umask={'umask', 0x3d, [0x37]}, 0x2c}]}) 2018/04/19 08:20:59 executing program 3: 2018/04/19 08:20:59 executing program 6: 2018/04/19 08:20:59 executing program 5: 2018/04/19 08:20:59 executing program 6: 2018/04/19 08:20:59 executing program 2: 2018/04/19 08:20:59 executing program 1: 2018/04/19 08:20:59 executing program 3: 2018/04/19 08:20:59 executing program 5: 2018/04/19 08:20:59 executing program 7: 2018/04/19 08:21:00 executing program 0: 2018/04/19 08:21:00 executing program 4: 2018/04/19 08:21:00 executing program 2: 2018/04/19 08:21:00 executing program 1: 2018/04/19 08:21:00 executing program 6: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="4c0000001200ff09fffefd956fa2830007a6000004c41180b598bc593eb6bd098b1a30de33a49868c62b2ca654a6613b2aabf35d4c1cbc882b07988100000000000000000000000000000000", 0x4c}], 0x1}, 0x0) 2018/04/19 08:21:00 executing program 0: 2018/04/19 08:21:00 executing program 5: 2018/04/19 08:21:00 executing program 7: 2018/04/19 08:21:00 executing program 3: 2018/04/19 08:21:00 executing program 2: 2018/04/19 08:21:00 executing program 4: 2018/04/19 08:21:00 executing program 1: 2018/04/19 08:21:00 executing program 6: 2018/04/19 08:21:00 executing program 0: 2018/04/19 08:21:00 executing program 7: 2018/04/19 08:21:00 executing program 3: 2018/04/19 08:21:00 executing program 5: 2018/04/19 08:21:00 executing program 7: 2018/04/19 08:21:00 executing program 4: 2018/04/19 08:21:00 executing program 2: 2018/04/19 08:21:00 executing program 1: 2018/04/19 08:21:00 executing program 3: 2018/04/19 08:21:00 executing program 6: 2018/04/19 08:21:00 executing program 0: 2018/04/19 08:21:00 executing program 0: 2018/04/19 08:21:00 executing program 5: 2018/04/19 08:21:00 executing program 6: 2018/04/19 08:21:00 executing program 1: 2018/04/19 08:21:00 executing program 3: 2018/04/19 08:21:00 executing program 2: 2018/04/19 08:21:00 executing program 4: 2018/04/19 08:21:01 executing program 7: 2018/04/19 08:21:01 executing program 6: 2018/04/19 08:21:01 executing program 0: 2018/04/19 08:21:01 executing program 3: 2018/04/19 08:21:01 executing program 5: 2018/04/19 08:21:01 executing program 1: 2018/04/19 08:21:01 executing program 2: 2018/04/19 08:21:01 executing program 4: 2018/04/19 08:21:01 executing program 7: 2018/04/19 08:21:01 executing program 4: 2018/04/19 08:21:01 executing program 6: 2018/04/19 08:21:01 executing program 5: 2018/04/19 08:21:01 executing program 0: 2018/04/19 08:21:01 executing program 3: 2018/04/19 08:21:01 executing program 1: 2018/04/19 08:21:01 executing program 7: 2018/04/19 08:21:01 executing program 2: 2018/04/19 08:21:01 executing program 2: 2018/04/19 08:21:01 executing program 1: 2018/04/19 08:21:01 executing program 6: 2018/04/19 08:21:01 executing program 5: 2018/04/19 08:21:01 executing program 4: 2018/04/19 08:21:01 executing program 0: 2018/04/19 08:21:01 executing program 3: 2018/04/19 08:21:01 executing program 7: 2018/04/19 08:21:01 executing program 5: 2018/04/19 08:21:01 executing program 0: 2018/04/19 08:21:01 executing program 3: 2018/04/19 08:21:01 executing program 6: 2018/04/19 08:21:01 executing program 4: 2018/04/19 08:21:01 executing program 1: 2018/04/19 08:21:01 executing program 2: 2018/04/19 08:21:01 executing program 7: 2018/04/19 08:21:01 executing program 0: 2018/04/19 08:21:01 executing program 5: 2018/04/19 08:21:02 executing program 6: 2018/04/19 08:21:02 executing program 5: 2018/04/19 08:21:02 executing program 7: 2018/04/19 08:21:02 executing program 0: 2018/04/19 08:21:02 executing program 3: 2018/04/19 08:21:02 executing program 4: 2018/04/19 08:21:02 executing program 1: 2018/04/19 08:21:02 executing program 2: 2018/04/19 08:21:02 executing program 0: 2018/04/19 08:21:02 executing program 7: 2018/04/19 08:21:02 executing program 3: 2018/04/19 08:21:02 executing program 4: 2018/04/19 08:21:02 executing program 5: 2018/04/19 08:21:02 executing program 6: 2018/04/19 08:21:02 executing program 1: 2018/04/19 08:21:02 executing program 2: 2018/04/19 08:21:02 executing program 0: 2018/04/19 08:21:02 executing program 7: 2018/04/19 08:21:02 executing program 3: 2018/04/19 08:21:02 executing program 2: 2018/04/19 08:21:02 executing program 6: 2018/04/19 08:21:02 executing program 4: 2018/04/19 08:21:02 executing program 0: 2018/04/19 08:21:02 executing program 1: 2018/04/19 08:21:02 executing program 5: 2018/04/19 08:21:02 executing program 7: 2018/04/19 08:21:02 executing program 3: 2018/04/19 08:21:02 executing program 6: 2018/04/19 08:21:02 executing program 0: 2018/04/19 08:21:02 executing program 2: 2018/04/19 08:21:02 executing program 1: 2018/04/19 08:21:02 executing program 7: 2018/04/19 08:21:02 executing program 5: 2018/04/19 08:21:02 executing program 3: 2018/04/19 08:21:02 executing program 4: 2018/04/19 08:21:03 executing program 2: 2018/04/19 08:21:03 executing program 3: 2018/04/19 08:21:03 executing program 0: 2018/04/19 08:21:03 executing program 6: 2018/04/19 08:21:03 executing program 1: 2018/04/19 08:21:03 executing program 7: 2018/04/19 08:21:03 executing program 5: 2018/04/19 08:21:03 executing program 4: 2018/04/19 08:21:03 executing program 2: 2018/04/19 08:21:03 executing program 3: 2018/04/19 08:21:03 executing program 6: 2018/04/19 08:21:03 executing program 1: 2018/04/19 08:21:03 executing program 0: 2018/04/19 08:21:03 executing program 7: 2018/04/19 08:21:03 executing program 5: 2018/04/19 08:21:03 executing program 2: 2018/04/19 08:21:03 executing program 4: 2018/04/19 08:21:03 executing program 0: 2018/04/19 08:21:03 executing program 7: 2018/04/19 08:21:03 executing program 1: 2018/04/19 08:21:03 executing program 4: 2018/04/19 08:21:03 executing program 6: 2018/04/19 08:21:03 executing program 2: 2018/04/19 08:21:03 executing program 3: 2018/04/19 08:21:03 executing program 5: 2018/04/19 08:21:03 executing program 7: 2018/04/19 08:21:03 executing program 1: 2018/04/19 08:21:03 executing program 0: 2018/04/19 08:21:03 executing program 7: 2018/04/19 08:21:03 executing program 6: 2018/04/19 08:21:03 executing program 3: 2018/04/19 08:21:03 executing program 5: 2018/04/19 08:21:03 executing program 2: 2018/04/19 08:21:03 executing program 4: 2018/04/19 08:21:03 executing program 1: 2018/04/19 08:21:04 executing program 5: 2018/04/19 08:21:04 executing program 7: 2018/04/19 08:21:04 executing program 6: 2018/04/19 08:21:04 executing program 3: 2018/04/19 08:21:04 executing program 2: 2018/04/19 08:21:04 executing program 1: 2018/04/19 08:21:04 executing program 0: 2018/04/19 08:21:04 executing program 4: 2018/04/19 08:21:04 executing program 5: 2018/04/19 08:21:04 executing program 7: 2018/04/19 08:21:04 executing program 2: 2018/04/19 08:21:04 executing program 3: 2018/04/19 08:21:04 executing program 6: 2018/04/19 08:21:04 executing program 0: 2018/04/19 08:21:04 executing program 4: 2018/04/19 08:21:04 executing program 3: 2018/04/19 08:21:04 executing program 2: 2018/04/19 08:21:04 executing program 1: 2018/04/19 08:21:04 executing program 5: 2018/04/19 08:21:04 executing program 7: 2018/04/19 08:21:04 executing program 6: 2018/04/19 08:21:04 executing program 0: 2018/04/19 08:21:04 executing program 2: 2018/04/19 08:21:04 executing program 5: 2018/04/19 08:21:04 executing program 3: 2018/04/19 08:21:04 executing program 1: 2018/04/19 08:21:04 executing program 4: 2018/04/19 08:21:04 executing program 6: 2018/04/19 08:21:04 executing program 7: 2018/04/19 08:21:04 executing program 2: 2018/04/19 08:21:04 executing program 0: 2018/04/19 08:21:04 executing program 3: 2018/04/19 08:21:04 executing program 5: 2018/04/19 08:21:04 executing program 1: 2018/04/19 08:21:05 executing program 6: 2018/04/19 08:21:05 executing program 4: 2018/04/19 08:21:05 executing program 0: 2018/04/19 08:21:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f0000014000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa2830007a6000000000900000000683540150024001d0004c41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 2018/04/19 08:21:05 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000b90ffc), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00007a2000)=[@in6={0xa}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x290, "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"}, &(0x7f00000010c0)=0x298) 2018/04/19 08:21:05 executing program 6: 2018/04/19 08:21:05 executing program 1: 2018/04/19 08:21:05 executing program 5: 2018/04/19 08:21:05 executing program 3: 2018/04/19 08:21:05 executing program 4: 2018/04/19 08:21:05 executing program 4: 2018/04/19 08:21:05 executing program 5: 2018/04/19 08:21:05 executing program 0: 2018/04/19 08:21:05 executing program 3: 2018/04/19 08:21:05 executing program 1: 2018/04/19 08:21:05 executing program 6: 2018/04/19 08:21:05 executing program 4: 2018/04/19 08:21:05 executing program 5: 2018/04/19 08:21:05 executing program 2: 2018/04/19 08:21:05 executing program 7: 2018/04/19 08:21:05 executing program 3: 2018/04/19 08:21:05 executing program 0: 2018/04/19 08:21:05 executing program 1: 2018/04/19 08:21:05 executing program 5: 2018/04/19 08:21:05 executing program 6: 2018/04/19 08:21:05 executing program 2: 2018/04/19 08:21:05 executing program 7: 2018/04/19 08:21:05 executing program 3: 2018/04/19 08:21:05 executing program 4: 2018/04/19 08:21:05 executing program 6: 2018/04/19 08:21:05 executing program 7: 2018/04/19 08:21:05 executing program 2: 2018/04/19 08:21:06 executing program 1: 2018/04/19 08:21:06 executing program 4: 2018/04/19 08:21:06 executing program 0: 2018/04/19 08:21:06 executing program 5: 2018/04/19 08:21:06 executing program 3: 2018/04/19 08:21:06 executing program 6: 2018/04/19 08:21:06 executing program 7: 2018/04/19 08:21:06 executing program 1: 2018/04/19 08:21:06 executing program 2: 2018/04/19 08:21:06 executing program 4: 2018/04/19 08:21:06 executing program 0: 2018/04/19 08:21:06 executing program 3: 2018/04/19 08:21:06 executing program 6: 2018/04/19 08:21:06 executing program 5: 2018/04/19 08:21:06 executing program 2: 2018/04/19 08:21:06 executing program 7: 2018/04/19 08:21:06 executing program 1: 2018/04/19 08:21:06 executing program 4: 2018/04/19 08:21:06 executing program 6: 2018/04/19 08:21:06 executing program 3: 2018/04/19 08:21:06 executing program 5: 2018/04/19 08:21:06 executing program 4: 2018/04/19 08:21:06 executing program 0: 2018/04/19 08:21:06 executing program 7: 2018/04/19 08:21:06 executing program 2: 2018/04/19 08:21:06 executing program 1: 2018/04/19 08:21:06 executing program 1: 2018/04/19 08:21:06 executing program 0: 2018/04/19 08:21:06 executing program 5: 2018/04/19 08:21:06 executing program 3: 2018/04/19 08:21:06 executing program 7: 2018/04/19 08:21:06 executing program 2: 2018/04/19 08:21:06 executing program 6: 2018/04/19 08:21:06 executing program 4: 2018/04/19 08:21:07 executing program 1: 2018/04/19 08:21:07 executing program 4: 2018/04/19 08:21:07 executing program 5: 2018/04/19 08:21:07 executing program 2: 2018/04/19 08:21:07 executing program 6: 2018/04/19 08:21:07 executing program 3: 2018/04/19 08:21:07 executing program 7: 2018/04/19 08:21:07 executing program 0: 2018/04/19 08:21:07 executing program 4: 2018/04/19 08:21:07 executing program 1: 2018/04/19 08:21:07 executing program 3: 2018/04/19 08:21:07 executing program 0: 2018/04/19 08:21:07 executing program 4: 2018/04/19 08:21:07 executing program 2: 2018/04/19 08:21:07 executing program 6: 2018/04/19 08:21:07 executing program 1: 2018/04/19 08:21:07 executing program 7: 2018/04/19 08:21:07 executing program 5: 2018/04/19 08:21:07 executing program 4: 2018/04/19 08:21:07 executing program 3: 2018/04/19 08:21:07 executing program 0: 2018/04/19 08:21:07 executing program 4: 2018/04/19 08:21:07 executing program 5: 2018/04/19 08:21:07 executing program 2: 2018/04/19 08:21:07 executing program 1: 2018/04/19 08:21:07 executing program 6: 2018/04/19 08:21:07 executing program 7: 2018/04/19 08:21:07 executing program 4: 2018/04/19 08:21:07 executing program 5: 2018/04/19 08:21:07 executing program 0: 2018/04/19 08:21:07 executing program 1: 2018/04/19 08:21:08 executing program 7: 2018/04/19 08:21:08 executing program 3: 2018/04/19 08:21:08 executing program 2: 2018/04/19 08:21:08 executing program 6: 2018/04/19 08:21:08 executing program 5: 2018/04/19 08:21:08 executing program 0: 2018/04/19 08:21:08 executing program 1: 2018/04/19 08:21:08 executing program 4: 2018/04/19 08:21:08 executing program 7: 2018/04/19 08:21:08 executing program 4: 2018/04/19 08:21:08 executing program 3: 2018/04/19 08:21:08 executing program 6: 2018/04/19 08:21:08 executing program 5: 2018/04/19 08:21:08 executing program 0: 2018/04/19 08:21:08 executing program 2: 2018/04/19 08:21:08 executing program 4: 2018/04/19 08:21:08 executing program 1: 2018/04/19 08:21:08 executing program 7: 2018/04/19 08:21:08 executing program 3: 2018/04/19 08:21:08 executing program 5: 2018/04/19 08:21:08 executing program 6: 2018/04/19 08:21:08 executing program 4: 2018/04/19 08:21:08 executing program 0: 2018/04/19 08:21:08 executing program 2: 2018/04/19 08:21:08 executing program 1: 2018/04/19 08:21:08 executing program 7: 2018/04/19 08:21:08 executing program 5: 2018/04/19 08:21:08 executing program 3: 2018/04/19 08:21:08 executing program 1: 2018/04/19 08:21:08 executing program 6: 2018/04/19 08:21:08 executing program 0: 2018/04/19 08:21:08 executing program 4: 2018/04/19 08:21:08 executing program 7: 2018/04/19 08:21:08 executing program 3: 2018/04/19 08:21:08 executing program 1: 2018/04/19 08:21:08 executing program 2: 2018/04/19 08:21:08 executing program 5: 2018/04/19 08:21:08 executing program 7: 2018/04/19 08:21:08 executing program 4: 2018/04/19 08:21:08 executing program 6: 2018/04/19 08:21:08 executing program 0: 2018/04/19 08:21:09 executing program 5: 2018/04/19 08:21:09 executing program 3: 2018/04/19 08:21:09 executing program 4: 2018/04/19 08:21:09 executing program 2: 2018/04/19 08:21:09 executing program 7: 2018/04/19 08:21:09 executing program 1: 2018/04/19 08:21:09 executing program 0: 2018/04/19 08:21:09 executing program 6: 2018/04/19 08:21:09 executing program 5: 2018/04/19 08:21:09 executing program 2: 2018/04/19 08:21:09 executing program 1: 2018/04/19 08:21:09 executing program 7: 2018/04/19 08:21:09 executing program 3: 2018/04/19 08:21:09 executing program 0: 2018/04/19 08:21:09 executing program 4: 2018/04/19 08:21:09 executing program 6: 2018/04/19 08:21:09 executing program 5: 2018/04/19 08:21:09 executing program 0: 2018/04/19 08:21:09 executing program 3: 2018/04/19 08:21:09 executing program 2: 2018/04/19 08:21:09 executing program 1: 2018/04/19 08:21:09 executing program 7: 2018/04/19 08:21:09 executing program 2: 2018/04/19 08:21:09 executing program 6: 2018/04/19 08:21:09 executing program 0: 2018/04/19 08:21:09 executing program 5: 2018/04/19 08:21:09 executing program 7: 2018/04/19 08:21:10 executing program 3: 2018/04/19 08:21:10 executing program 4: 2018/04/19 08:21:10 executing program 1: 2018/04/19 08:21:10 executing program 5: 2018/04/19 08:21:10 executing program 2: 2018/04/19 08:21:10 executing program 0: 2018/04/19 08:21:10 executing program 7: 2018/04/19 08:21:10 executing program 6: 2018/04/19 08:21:10 executing program 1: 2018/04/19 08:21:10 executing program 5: 2018/04/19 08:21:10 executing program 4: 2018/04/19 08:21:10 executing program 6: 2018/04/19 08:21:10 executing program 0: 2018/04/19 08:21:10 executing program 2: 2018/04/19 08:21:10 executing program 3: 2018/04/19 08:21:10 executing program 7: 2018/04/19 08:21:10 executing program 4: 2018/04/19 08:21:10 executing program 1: 2018/04/19 08:21:10 executing program 5: 2018/04/19 08:21:10 executing program 6: 2018/04/19 08:21:10 executing program 3: 2018/04/19 08:21:10 executing program 0: 2018/04/19 08:21:10 executing program 7: 2018/04/19 08:21:10 executing program 2: 2018/04/19 08:21:10 executing program 1: 2018/04/19 08:21:10 executing program 5: 2018/04/19 08:21:10 executing program 4: 2018/04/19 08:21:10 executing program 6: 2018/04/19 08:21:10 executing program 3: removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.advise\x00') 2018/04/19 08:21:10 executing program 0: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{0x3, 0x25}, {0x0, 0x4}, {0x3, 0x8}, {0xb, 0xfffffffffffffff8}, {0xb, 0xd8}, {0x2, 0x7}, {0x3, 0x80}, {0x3, 0x23}, {0x4, 0xfff}], 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) pwrite64(r1, &(0x7f0000000240), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x1, 0x8, 0x0, 0x10000, 0x80]}, 0xe) fallocate(r2, 0x1, 0xd371, 0x3) pwritev(r2, &(0x7f00000012c0)=[{&(0x7f0000000140)='l', 0x1}], 0x1, 0x200000) fcntl$setstatus(r1, 0x4, 0x4000) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/19 08:21:10 executing program 7: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) 2018/04/19 08:21:11 executing program 2: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)="6e65e026cdc17000") 2018/04/19 08:21:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setns(r0, 0x0) 2018/04/19 08:21:11 executing program 1: 2018/04/19 08:21:11 executing program 6: 2018/04/19 08:21:11 executing program 4: 2018/04/19 08:21:11 executing program 7: 2018/04/19 08:21:11 executing program 0: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{0x3, 0x25}, {0x0, 0x4}, {0x3, 0x8}, {0xb, 0xfffffffffffffff8}, {0xb, 0xd8}, {0x2, 0x7}, {0x3, 0x80}, {0x3, 0x23}, {0x4, 0xfff}], 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) pwrite64(r1, &(0x7f0000000240), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x1, 0x8, 0x0, 0x10000, 0x80]}, 0xe) fallocate(r2, 0x1, 0xd371, 0x3) pwritev(r2, &(0x7f00000012c0)=[{&(0x7f0000000140)='l', 0x1}], 0x1, 0x200000) fcntl$setstatus(r1, 0x4, 0x4000) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/19 08:21:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/anycast6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/179, 0xb3}], 0x1, 0x0) 2018/04/19 08:21:11 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000012000), 0x4) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/19 08:21:11 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)) 2018/04/19 08:21:11 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x402, 0x0) 2018/04/19 08:21:11 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x400) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c05, 0x100000000) 2018/04/19 08:21:11 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) 2018/04/19 08:21:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 2018/04/19 08:21:11 executing program 5: getpid() bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xdf}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xd, 0xffffffffffffffff, 0xb) socketpair$inet_icmp(0x7fffffffefff, 0x2, 0x730000, &(0x7f00000003c0)) 2018/04/19 08:21:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000013c0), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/19 08:21:11 executing program 6: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) sendmsg(r0, &(0x7f0000000200)={0x0, 0x290, &(0x7f0000000140), 0x1}, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 2018/04/19 08:21:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000980)={"6c6f0000000004e7ffffff00", 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000040)=@setlink={0x34, 0x13, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, 'eql\x00'}]}, 0x34}, 0x1}, 0x0) 2018/04/19 08:21:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000380)=0x1, 0xe01fcf4c3277e25e) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a6efff)="cf", 0x1, 0x20008000, &(0x7f0000000080)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x264) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x7ffb, 0x7fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000600)="3ef9", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/19 08:21:11 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000002ec0)={&(0x7f0000001dc0)=@ipv6_newroute={0x1c, 0x18, 0x7de1124c6ffd611d, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}, 0x1}, 0x0) 2018/04/19 08:21:11 executing program 0: sysfs$2(0x2, 0xac3, &(0x7f0000006b00)=""/4096) 2018/04/19 08:21:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @broadcast=0xffffffff}}) 2018/04/19 08:21:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000013c0), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/19 08:21:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000), 0x4) [ 81.844309] IPv6: NLM_F_REPLACE set, but no existing node found! 2018/04/19 08:21:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) bind$inet6(r0, &(0x7f000044f000)={0xa}, 0x1c) 2018/04/19 08:21:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2203, &(0x7f0000007000)) 2018/04/19 08:21:11 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) listen(r0, 0x3) 2018/04/19 08:21:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/19 08:21:12 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000940000)={0x1000000000000005, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setown(r1, 0x8, r2) bind$inet(r1, &(0x7f0000dec000)={0x2, 0x8000000000004e20, @loopback=0x7f000001}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x82000, 0x0) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000040), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000df1000)=0x6, 0x4) r4 = dup(r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f000093fffc)=0xffffffffffffffd8) ioctl$KDSETLED(r4, 0x4b32, 0x7fff) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000f7a000)) sendto$inet(r1, &(0x7f0000de1fff), 0xffffffffffffffe6, 0x20008045, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r5 = accept4(r1, 0x0, &(0x7f0000213ffc)=0x194, 0x80000) getpeername$unix(0xffffffffffffffff, &(0x7f000062efeb), &(0x7f0000d0a000)=0x15) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) fcntl$getown(0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000504000)={&(0x7f0000078ff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000c7bf92), &(0x7f0000e7dffc)=0x6e) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f00000010c0)={0x20, 0x4}) fstatfs(r5, &(0x7f0000001100)=""/152) mmap(&(0x7f0000aa7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000aa7000)='coredump_filter\x00') sendfile(r4, r6, 0x0, 0xef5d) 2018/04/19 08:21:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0xfffffffffffffffc, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/19 08:21:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x800000000003c, &(0x7f00000000c0), 0x0) 2018/04/19 08:21:12 executing program 5: semget$private(0x0, 0x8020000002c71, 0x0) 2018/04/19 08:21:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x19, &(0x7f0000000040), &(0x7f0000000080), 0x8, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000500)) 2018/04/19 08:21:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00000016c0)={0x20, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x1}, [@nested={0xa, 0x1, [@typed={0x8, 0x0, @pid}]}]}, 0x20}, 0x1}, 0x0) 2018/04/19 08:21:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={r2}) 2018/04/19 08:21:13 executing program 2: request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) 2018/04/19 08:21:13 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x2) 2018/04/19 08:21:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) 2018/04/19 08:21:13 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/19 08:21:13 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000940000)={0x1000000000000005, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setown(r1, 0x8, r2) bind$inet(r1, &(0x7f0000dec000)={0x2, 0x8000000000004e20, @loopback=0x7f000001}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x82000, 0x0) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000040), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000df1000)=0x6, 0x4) r4 = dup(r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f000093fffc)=0xffffffffffffffd8) ioctl$KDSETLED(r4, 0x4b32, 0x7fff) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000f7a000)) sendto$inet(r1, &(0x7f0000de1fff), 0xffffffffffffffe6, 0x20008045, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r5 = accept4(r1, 0x0, &(0x7f0000213ffc)=0x194, 0x80000) getpeername$unix(0xffffffffffffffff, &(0x7f000062efeb), &(0x7f0000d0a000)=0x15) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) fcntl$getown(0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000504000)={&(0x7f0000078ff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000c7bf92), &(0x7f0000e7dffc)=0x6e) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f00000010c0)={0x20, 0x4}) fstatfs(r5, &(0x7f0000001100)=""/152) mmap(&(0x7f0000aa7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000aa7000)='coredump_filter\x00') sendfile(r4, r6, 0x0, 0xef5d) 2018/04/19 08:21:13 executing program 0: semget$private(0x0, 0x8020000000818, 0x0) 2018/04/19 08:21:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={r1}, 0x14) 2018/04/19 08:21:13 executing program 2: semget$private(0x0, 0x8020000003876, 0x0) 2018/04/19 08:21:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a31232b15f6342c21d560e2a910601453b1e463a67b008d1b004d5083847e5589c2"], 0x24) 2018/04/19 08:21:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000080)={0x0, 0x8, 0x2, 0x0, 0x1, [{}]}) 2018/04/19 08:21:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x19, &(0x7f0000000040), &(0x7f0000000080), 0x8, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000500)) 2018/04/19 08:21:14 executing program 0: syslog(0x3, &(0x7f00000004c0)=""/3, 0x95) 2018/04/19 08:21:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2276, &(0x7f0000007000)='S') 2018/04/19 08:21:14 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/244, 0xf4, 0x40000022, 0x0, 0x22c) 2018/04/19 08:21:14 executing program 2: request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) 2018/04/19 08:21:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket(0xa, 0x2, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0xffff, 0x1f) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendfile(r1, r2, &(0x7f00005faff8), 0xfffb) 2018/04/19 08:21:14 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000ed3000)=0x3e, 0x4) bind$inet6(r0, &(0x7f0000afe000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) 2018/04/19 08:21:14 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xffffffffffffff81}, 0x1c) 2018/04/19 08:21:14 executing program 3: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000a00)=""/209, 0xaf) 2018/04/19 08:21:14 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 2018/04/19 08:21:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002fe8)={0xaa}) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/59, 0x3b}], 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000013000/0xe000)=nil, 0xe000}, 0x1}) pselect6(0x40, &(0x7f0000011fc0), &(0x7f0000011000), &(0x7f0000003000), &(0x7f0000013000), &(0x7f0000001ff8)={&(0x7f0000012000), 0x8}) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000b4bff8), 0x0) 2018/04/19 08:21:14 executing program 7: semget$private(0x0, 0x80200000012de, 0x0) 2018/04/19 08:21:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r0, &(0x7f0000004fc8)={&(0x7f000000aff4)={0x10}, 0xc, &(0x7f0000001000)={&(0x7f000000f000)=ANY=[@ANYBLOB="1cff050000000000000000000000080000000500"], 0x1}, 0x1}, 0x0) 2018/04/19 08:21:14 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10012, r0, 0x1) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 2018/04/19 08:21:14 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0xfffffffb, 0xfffffffc, &(0x7f0000000180)) 2018/04/19 08:21:14 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x9, 0xfffffffb, 0xfffffffc, &(0x7f0000000180)) 2018/04/19 08:21:14 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0xfffffffffffffe77) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000001c40)) 2018/04/19 08:21:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x2c}, 0x1}, 0x0) 2018/04/19 08:21:15 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20014000}, 0xc, &(0x7f0000001940)=[{&(0x7f00000003c0)={0x10, 0x0, 0x1, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x408c0}, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0xffff, 0x4) 2018/04/19 08:21:15 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x92492492492494a, 0x0) close(r0) 2018/04/19 08:21:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000866ff8)=0x80000001) sendmmsg$unix(r1, &(0x7f00000bd000), 0x92492492492494a, 0x0) close(r0) 2018/04/19 08:21:15 executing program 1: socket$inet(0x2, 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, {[@timestamp={0x44, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}}}, &(0x7f0000000100)) 2018/04/19 08:21:15 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYBLOB="060002000a0002000000000000000000"], 0x2}, 0x1}, 0x0) 2018/04/19 08:21:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000040), 0x0) 2018/04/19 08:21:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000008040000209000024460e2000000000000000"], &(0x7f0000000440)=0x1) 2018/04/19 08:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f0000000000), 0x0) 2018/04/19 08:21:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000ec0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f00000001c0)="1b6f27f1819aa2a60a63f85d400b2fd5dab06f07885329ea82007ea85a9584241157e250f48fa7c85046ddda19715f8c4f273193528406795ed332f96630d13490e6439a4e7ca14b221a68fd7b52d790e5898d1f78dbfdc49c10395f65adc0d2f87564ff1ba401688b36f33c569479b28ae77fda", 0x74}, {&(0x7f0000000f40)="b4abeb2e6d77532c18e867470c3801b710a7f38bc9671987eb66519e2e6b6fb1d1d3bdf78046a30fe1755d5edb49ca352a1b9ba5d8449a6ddf02948b385afabce7d9a0f3a01273d085a8a4c268fe5e9aa999d5592afa47e47275d1c33246cd32e9eb89cf421a132f64f6e847d4520122375416a470be3c5f30d69fb944ed577a57222faea5c64ab7fa2028a934e74accfa9f377f514e84c872c6845b8b6898ebe6d85423b5c4d2092e6e7392315cb60848024f32cf5f4d5711b754e94ac7123218e55adc23dde8b5e7007e09160b526235e858ce697bf8ff472340", 0xdb}, {&(0x7f00000004c0)="336c2d9fb39385ea13acaa97efca9f79ad3967c87143a3117c5b65b71e5eb9af56d64f", 0x23}], 0x3, &(0x7f0000000940)=[@cred={0x18, 0x1, 0x2}, @cred={0x18, 0x1, 0x2}, @rights={0x14, 0x1, 0x1, [r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r0, r1, r0]}], 0x6c, 0x44840}, {&(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000a40)="3ebbb7c55a821c047c19468d3188f872909d42344d9176a55343af4f22a89d194d749f62ea934ffbf28794a118a81e6b9c4d42752de384cd9947c58046a2505e189fa0569cb1fe540481ee7ffe42", 0x4e}], 0x1, 0x0, 0x0, 0x10}, {&(0x7f0000000c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e00)=[{&(0x7f0000000c80)="324aa73e76b8c26d462be965538ea3068dcf2fe29236217a0ec476148bf183aeac3c60e64e9d491eddb4534e7e9a18", 0x2f}, {&(0x7f0000000d00)="edad92a1f4879d7467ba7c8a0dd6c89af2be536221c078", 0x17}], 0x2, &(0x7f0000001040)=[@rights={0x10, 0x1, 0x1, [r0]}, @cred={0x18, 0x1, 0x2}, @rights={0x24, 0x1, 0x1, [r1, r0, r0, r1, r0, r0]}, @cred={0x18, 0x1, 0x2}, @cred={0x18, 0x1, 0x2}], 0x7c, 0x4885}], 0x3, 0x0) 2018/04/19 08:21:15 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f000088c000)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0x2000ff, 0x5}, 0xfffffdd4) 2018/04/19 08:21:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000e78fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x5}}, 0x1c) 2018/04/19 08:21:15 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000b3dfc8)={&(0x7f0000001580)={0x10}, 0xc, &(0x7f00000015c0)={&(0x7f0000abf000)=ANY=[@ANYBLOB="14000000220009010000000000000000018eb18c"], 0x1}, 0x1}, 0x0) 2018/04/19 08:21:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x5, 0x408000) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000180)) socket$inet6_sctp(0xa, 0x5, 0x84) syslog(0x3, &(0x7f0000000040)=""/128, 0x80) 2018/04/19 08:21:15 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20014000}, 0xc, &(0x7f0000001940)=[{&(0x7f00000003c0)={0x10, 0x0, 0x1, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x408c0}, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0xffff, 0x4) 2018/04/19 08:21:16 executing program 5: mlock2(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x0) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002380)) mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000040)='./file1\x00', 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 2018/04/19 08:21:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10012, r0, 0x1) 2018/04/19 08:21:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000866ff8)=0x80000001) 2018/04/19 08:21:16 executing program 6: r0 = socket(0x1001000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000f81000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001000ff3bfd24df6a29a1781954963f14e72c9eb2e4b01a9d45f3a5049f2fff026e3b6a33f9ba9fc90f21c36f4199f8", @ANYBLOB="0000000000000000180012001400010069703667726500000000000000060000"], 0x2}, 0x1}, 0x0) 2018/04/19 08:21:16 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20014000}, 0xc, &(0x7f0000001940)=[{&(0x7f00000003c0)={0x10, 0x0, 0x1, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x408c0}, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0xffff, 0x4) 2018/04/19 08:21:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000866ff8)=0x80000001) sendmmsg$unix(r1, &(0x7f00000bd000), 0x92492492492494a, 0x0) close(r0) 2018/04/19 08:21:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) 2018/04/19 08:21:16 executing program 0: mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 2018/04/19 08:21:16 executing program 0: mlock2(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x0) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002380)) mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34123610) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 2018/04/19 08:21:16 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0xffffffffffffff99, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/19 08:21:16 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xffffffffffffffff}, 0x4) 2018/04/19 08:21:16 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@multicast2=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) 2018/04/19 08:21:16 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20014000}, 0xc, &(0x7f0000001940)=[{&(0x7f00000003c0)={0x10, 0x0, 0x1, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x408c0}, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0xffff, 0x4) 2018/04/19 08:21:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)=@migrate={0xac, 0x21, 0x23, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, [@migrate={0x5c, 0x11, [{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@broadcast=0xffffffff}, {@in6, @in=@dev={0xac, 0x14, 0x14}}]}]}, 0xac}, 0x1}, 0x0) 2018/04/19 08:21:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000021c0)='smaps\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000002200)=[{&(0x7f0000000000)=""/180, 0xb4}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x3) 2018/04/19 08:21:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00003b8ffc)=0x51) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0xfff}) 2018/04/19 08:21:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000866ff8)=0x80000001) sendmmsg$unix(r1, &(0x7f00000bd000), 0x92492492492494a, 0x0) close(r0) 2018/04/19 08:21:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000013db4)=ANY=[@ANYBLOB="140000001e00ff02000000004dd8000000000000"], 0x1}, 0x1}, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/178, 0xb2}], 0x1) 2018/04/19 08:21:17 executing program 5: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) dup3(0xffffffffffffffff, r0, 0x0) 2018/04/19 08:21:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x7, 0x0, "70739a0ebe4ac9fea0d1f41b412878a5b6b09a357732eb1beaa5f7ffd5345333d326060f0cdeef303977eddb549970cadb75a15db7efaa43e8c3c79d29f15979133dd10315a3c2f16c7dd02273c10768"}, 0xd8) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x8}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x6, 0x1000010008}, 0x14) sendto$inet(r0, &(0x7f00006e2000)='!', 0x1, 0x0, 0x0, 0x0) 2018/04/19 08:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x7, 0x0, "70739a0ebe4ac9fea0d1f41b412878a5b6b09a357732eb1beaa5f7ffd5345333d326060f0cdeef303977eddb549970cadb75a15db7efaa43e8c3c79d29f15979133dd10315a3c2f16c7dd02273c10768"}, 0xd8) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x8}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x6, 0x1000010008}, 0x14) sendto$inet(r0, &(0x7f0000000240)="11", 0x1, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/19 08:21:17 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20014000}, 0xc, &(0x7f0000001940)=[{&(0x7f00000003c0)={0x10, 0x0, 0x1, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x408c0}, 0x0) 2018/04/19 08:21:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) dup3(r1, r0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x4) 2018/04/19 08:21:17 executing program 3: mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/19 08:21:17 executing program 1: mlock2(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x0) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002380)) mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 2018/04/19 08:21:17 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20014000}, 0xc, &(0x7f0000001940)=[{&(0x7f00000003c0)={0x10, 0x0, 0x1, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, 0x0, 0x0, 0x408c0}, 0x0) 2018/04/19 08:21:17 executing program 5: clone(0x4000, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000ce4000), &(0x7f00000022c0)) 2018/04/19 08:21:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/19 08:21:17 executing program 0: socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x890c, 0x6f2000, &(0x7f00000003c0)) [ 87.464730] xprt_adjust_timeout: rq_timeout = 0! 2018/04/19 08:21:17 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) ptrace$setregs(0xf, r1, 0x100000000, &(0x7f0000000300)="3977852ffc70a908555ed33b15e31bc619b77beb1e114db0f512242b2c0fc345c3d1e892d4617d0a3bfe91ac560344cb1623965fda67683f90af164ab25e1a96ad16d8") 2018/04/19 08:21:17 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x8, 0xfffffffb, 0xfffffffc, &(0x7f0000000180)) 2018/04/19 08:21:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/19 08:21:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e23, @loopback=0x7f000001}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={r1, 0x38, "d3929a709daaf0eea1bc73d77f4fe263a2fc33ae7b914b539af40aa2d6a6cc45cb16cbdb84798091318e8699f015c571ac1bac254c4c4ae5"}, &(0x7f0000000000)=0x40) 2018/04/19 08:21:18 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r3, &(0x7f0000fd0000), 0x67d0a4f154ddf4a1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = syz_open_procfs(r1, &(0x7f0000000a80)="6665742f746370005c51ae32f098424533a6d415780820fc1b57352325d269c65f30e86d3f4b9808db8052b552a6f62b7f3b8f3ec6444123ce19228f007b") preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000480)=""/144, 0x90}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x76e, 0x8, 0x81, 0x3f, 0x5}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000580)={r5, 0x3f, 0x2, 0x100000001, 0x8000, 0x2, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x3685, @local={0xfe, 0x80, [], 0xaa}, 0xcfb}}, 0x9, 0x51c, 0x80000001, 0x4, 0x1}}, &(0x7f0000000640)=0xb0) kexec_load(0xffffffffffffffc1, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000680)="b291a57f8ca8be91c8e4494ea411d0543d53934780bb4f97a9db2c9b70dd6a1cd8b1d0ee3c129f25", 0x28, 0xce, 0x7}], 0x160000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000240)=0x8) getpeername$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$getregs(0x1f, r1, 0x5, &(0x7f0000000ac0)=""/229) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001600)=0xe8) 2018/04/19 08:21:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000098effc), 0x4) shutdown(r0, 0x0) writev(r0, &(0x7f0000447ff0)=[{&(0x7f00008889ff)="b6b23ebe2094b6c296b7f43c2ff9cec9a414ac8ab00820fbde9a0f4a1bd2773a23ca881cb2b8f6f7676ec3e23411c9a7b90c0d98413505ae48a6f9680b3b1c7d9d2083981adb57cc49d7c44eb888269d5ddad8a8ece4937a8c1bd5f6d54eb2fee4344a60a71f21a02b71241caa5bfb30ef20735987815557dd0712275e1cab0562f6e71d00f07d832fff291844ad8c73a6b27652f46020e42eebd5fd185751187d8455017d6e42c6492f282d3fcea50ef7e26862684165a175a262d5fdb1562a9dd53028ed11564d449b40c3dc6e1500aff5eb7c7ac29b27bcac0249c746425160e164ce64e5180f5b19b180bfa5a14ff6d6bac621a1723ffe9dbd05f91bed6ffd9ba2ca0ea7f3eca738786c6cf9be08976ab48f5ce579d5053ef537ba15f9ca286ef7299567bf2b50512cba39ca22e4eafa46593dfb19b29e524a5e0b527f23c3fd666357e9b397f2e720146853c8a4e590b620fd4f0c83a6a0d626fbc2d018596b5bd8b2b9496d3a83f8760b1fb0a6ec9de29b146334717e8cab34996e8474bbde59447f2cc876096f80b10134ed5d69027a9cdd109de0d161003880d10536725ab38afdff82208b8ca05f7661bc482b841d815c35660d7f7b036d0426f3cbfcd1448782af41483936f20b09e239d53be9df805d1a4dced5167eb9b8c8c681451329adcea047a3a00461916692c523647ed2b81b39080417072cf26db77335331fd9d49b1bea2ba448e3e7822109d5a115c5da661c65193ae60923e37b8751d7f6eb2511fc9b55963fca553c0c6d065240b94c889af1781a8671ce4ec91744820d8c3905b2eafb38d909b45175801885e1a1059a9b3db85a95f2172947697e56244fd7b4b412a33b9adc061fca8c742d05f50ce0d2b4280749ce13488259d37074ba94540a5b9cdf426fdf4563163e81c9769b7a84db101c03d88cec1eb18b7ded9b957734dde7b896b0b9c1a76e63104a02a06e917a0e3b608276ad2860a17c76e5c5a07dd6917fa497adc8ff56e2ec6f2bcc09d8061f504c5d5128b4e89bcb2207df70db9d7cceff2fc266443b6d34bb651d0def84768f750279e8b8ab42a8ba7f4f265e0051333f346bc113c56b179b81421601bd60cd071ee198d84ca6abd13eb3ecbc6aaab47aaae592f97c3747c37266e8ad2358029989919b7f5dcee8b60e1d32a0a94d91cc073174ef180d1b3cd4aedb77f1e898f6df02cf3fe57db328abb0ac8d88e5f0d3015f10e74f00e90ab3acbd2e8917e130d2961b1895b5e3252e8a74a0fe0579330407de6a6644cdb7cef78f6ebdf9ef2aa07b32c587d93be72cce852d1ccdf83d1740e0b5c2971b340d98e584b883878ebcac7c91c0c7ce6c23b459b8feb49133d78e965ece4c3f5e11f929d5ef541e2ad8311c4c7412c045b4abf9d14e0f8fd1fd5f851511519e45bee4f00ebb6fddcf38b0936c7aaec7e846631d8f0f0f032fd578dba501d6c7c63bdc858c6c80cc37ac3992b4dec23d5c2304f15849f696bf1327c3d2ad87908a529bcd398b40c1323462ae597ac24b707041063050c35c632af02461a3c14cbb6f2a573aa4c154bebe75e8e8254c2df4106fcac6a295317cde6123d9148693790211cc12a7c3cbfaf7e5da983827f7d430c4a858842057ac860fa3891fe7f59c71b7256618198ceb0253d0f6afe9515af1d3a97a69f5d3f8def2f0b2dd0cbaddedc76ac3e57763ea544187493419bb6b0cc14df727f3006395db760806edcdc37804870ee006fe60471f10f0313fc1f9f365038472cf978d091e94338af5dc37e12e30d4e16b13675eea7d36a18f3e39db3619cdf573058e89f95702cf8bf8ca88b4f4989e4a7086a682a13b477d4cac8bdb595c1eeb2463e57538e896ca3168292cdcf7779a43f4113bdbab6d78aa986ac2766bb55a40f0f59aa7eac6af7db18e7e308ba6df385fdd13a8cfa44b7bcc0b9688588bd80089298088ae533de7af3627718726709d4f5d773a6f80c058d22ceece37bd5b3e76e089de57cf80ea6a3b1972cbb086b9e03d228f0057089e04baa357cfb3a9e5941c7643e903ca252509cc4b9a6202ecb3faae31d6309135668d9a55f3a8d64b65496429d74a1d236f17c9f0d60f0924f1fab0f40bbde913fc4eeda486145a39026725897734fff68ff083d3c07e61f937093be31b0cc6dc", 0x601}], 0x1) recvfrom$inet6(r0, &(0x7f00000000c0)=""/190, 0xbe, 0x0, 0x0, 0x0) writev(r0, &(0x7f00002f7000)=[{&(0x7f000069b000)="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", 0x201}], 0x1) close(r0) 2018/04/19 08:21:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet(r0, &(0x7f0000ac0fbb)="c4", 0x1, 0x0, &(0x7f00006e2000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f000056effc), 0x4) recvmsg(r0, &(0x7f0000000780)={&(0x7f0000000240)=@pppoe={0x0, 0x0, {0x0, @link_local}}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000740)}, 0x0) 2018/04/19 08:21:18 executing program 6: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000a80)={&(0x7f00000001c0)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f00082d1cb2a4a280930206620100a84309000000000000000503000149dc50ca8a9848a3c728f1c46b7b31afdc0938d54400009b84136f075afb83de448daa7f000000b8220000bf0cec6b1391d4", 0x55}], 0x1, &(0x7f0000000640)}, 0x0) 2018/04/19 08:21:18 executing program 3: mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/19 08:21:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000fef000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000866ff8)=0x80000001) sendmmsg$unix(r1, &(0x7f00000bd000), 0x92492492492494a, 0x0) close(r0) [ 88.221758] xprt_adjust_timeout: rq_timeout = 0! [ 88.261624] ================================================================== [ 88.269055] BUG: KMSAN: uninit-value in move_addr_to_user+0x32e/0x530 [ 88.275640] CPU: 0 PID: 6960 Comm: syz-executor5 Not tainted 4.16.0+ #84 [ 88.282473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.291823] Call Trace: [ 88.294418] dump_stack+0x185/0x1d0 [ 88.298050] ? kmsan_internal_check_memory+0x155/0x1e0 [ 88.303325] kmsan_report+0x142/0x240 [ 88.307134] kmsan_internal_check_memory+0x174/0x1e0 [ 88.312241] kmsan_copy_to_user+0x69/0x160 [ 88.316485] move_addr_to_user+0x32e/0x530 [ 88.320731] ___sys_recvmsg+0x4e2/0x810 [ 88.324712] ? __fget_light+0x56/0x710 [ 88.328604] ? __fdget+0x4e/0x60 [ 88.331973] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 88.337335] ? __fget_light+0x6b9/0x710 [ 88.341318] SYSC_recvmsg+0x298/0x3c0 [ 88.345126] SyS_recvmsg+0x54/0x80 [ 88.348663] do_syscall_64+0x309/0x430 [ 88.352554] ? ___sys_recvmsg+0x810/0x810 [ 88.356706] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.361896] RIP: 0033:0x455329 [ 88.365083] RSP: 002b:00007f24b3d19c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 88.372788] RAX: ffffffffffffffda RBX: 00007f24b3d1a6d4 RCX: 0000000000455329 [ 88.380055] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000013 [ 88.387320] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 88.394584] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 88.401849] R13: 0000000000000496 R14: 00000000006f9eb0 R15: 0000000000000000 [ 88.409114] [ 88.410742] Local variable description: ----addr@___sys_recvmsg [ 88.416817] Variable was created at: [ 88.420539] ___sys_recvmsg+0xd5/0x810 [ 88.424427] SYSC_recvmsg+0x298/0x3c0 [ 88.428298] [ 88.429920] Bytes 8-15 of 16 are uninitialized [ 88.434489] ================================================================== [ 88.441840] Disabling lock debugging due to kernel taint [ 88.447283] Kernel panic - not syncing: panic_on_warn set ... [ 88.447283] [ 88.454649] CPU: 0 PID: 6960 Comm: syz-executor5 Tainted: G B 4.16.0+ #84 [ 88.462784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.472134] Call Trace: [ 88.474733] dump_stack+0x185/0x1d0 [ 88.478367] panic+0x39d/0x940 [ 88.481581] ? kmsan_internal_check_memory+0x155/0x1e0 [ 88.486853] kmsan_report+0x238/0x240 [ 88.490652] kmsan_internal_check_memory+0x174/0x1e0 [ 88.495762] kmsan_copy_to_user+0x69/0x160 [ 88.500002] move_addr_to_user+0x32e/0x530 [ 88.504244] ___sys_recvmsg+0x4e2/0x810 [ 88.508228] ? __fget_light+0x56/0x710 [ 88.512119] ? __fdget+0x4e/0x60 [ 88.515490] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 88.520861] ? __fget_light+0x6b9/0x710 [ 88.524843] SYSC_recvmsg+0x298/0x3c0 [ 88.528658] SyS_recvmsg+0x54/0x80 [ 88.532202] do_syscall_64+0x309/0x430 [ 88.536099] ? ___sys_recvmsg+0x810/0x810 [ 88.540254] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.545440] RIP: 0033:0x455329 [ 88.548629] RSP: 002b:00007f24b3d19c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 88.556339] RAX: ffffffffffffffda RBX: 00007f24b3d1a6d4 RCX: 0000000000455329 [ 88.563606] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000013 [ 88.570877] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 88.578164] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 88.585455] R13: 0000000000000496 R14: 00000000006f9eb0 R15: 0000000000000000 [ 88.593213] Dumping ftrace buffer: [ 88.596751] (ftrace buffer empty) [ 88.600434] Kernel Offset: disabled [ 88.604035] Rebooting in 86400 seconds..