INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.0' (ECDSA) to the list of known hosts. 2018/04/13 19:18:15 fuzzer started 2018/04/13 19:18:16 dialing manager at 10.128.0.26:33379 2018/04/13 19:18:22 kcov=true, comps=false 2018/04/13 19:18:25 executing program 0: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2000005, 0x80000000032, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x800452d2, &(0x7f0000000040)={'erspan0\x00', {0x0, 0x0, @broadcast=0xffffffff}}) 2018/04/13 19:18:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000becff0)={0x16, 0x88}) pipe(&(0x7f0000923000)) 2018/04/13 19:18:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f000055ff80)=[{&(0x7f00002f0f89)=""/204, 0xcc}], 0x1, 0x3e) 2018/04/13 19:18:25 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/13 19:18:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/13 19:18:25 executing program 5: r0 = socket(0x1f, 0x2000002000000001, 0x3) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080), 0x4) 2018/04/13 19:18:25 executing program 6: r0 = socket(0x1f, 0x80003, 0x1) bind(r0, &(0x7f0000000080)=@l2={0x1f, 0x0, {0x4}}, 0x80) 2018/04/13 19:18:25 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"6966623000faffffffffffffff00", 0x4000000000000302}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) syzkaller login: [ 42.620758] ip (3752) used greatest stack depth: 54192 bytes left [ 44.359076] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.365572] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.396067] device bridge_slave_0 entered promiscuous mode [ 44.457885] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.464387] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.494497] device bridge_slave_0 entered promiscuous mode [ 44.537823] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.544319] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.591704] device bridge_slave_1 entered promiscuous mode [ 44.645110] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.651638] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.680957] device bridge_slave_0 entered promiscuous mode [ 44.694072] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.700609] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.725662] device bridge_slave_0 entered promiscuous mode [ 44.764784] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.771306] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.783588] device bridge_slave_1 entered promiscuous mode [ 44.792365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.799549] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.806070] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.836022] device bridge_slave_0 entered promiscuous mode [ 44.860563] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.867128] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.898107] device bridge_slave_0 entered promiscuous mode [ 44.909739] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.916206] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.926928] device bridge_slave_0 entered promiscuous mode [ 44.943517] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.950075] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.962323] device bridge_slave_1 entered promiscuous mode [ 44.970511] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.976980] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.008265] device bridge_slave_0 entered promiscuous mode [ 45.016204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.025969] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.032420] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.067205] device bridge_slave_1 entered promiscuous mode [ 45.076365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.086976] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.093551] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.129366] device bridge_slave_1 entered promiscuous mode [ 45.135772] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.142266] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.160133] device bridge_slave_1 entered promiscuous mode [ 45.169991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.177251] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.183753] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.201843] device bridge_slave_1 entered promiscuous mode [ 45.220837] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.227331] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.252825] device bridge_slave_1 entered promiscuous mode [ 45.275747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.283408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.321715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.330201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.346641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.407110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.440168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.516339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.571595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.587490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.638180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.686566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.060546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.156898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.256525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.360454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.370443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.516657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.537890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.618781] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.626609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.682403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.734176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.749694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.771926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.834740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.873854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.950756] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.271834] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.324507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.462463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.547761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.684434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.691707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.705799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.736955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.751204] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.766174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.773820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.783707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.808885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.853296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.885331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.935832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.943926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.957009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.989578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.001539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.010850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.026866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.037290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.044724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.065878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.074705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.084850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.219377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.226582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.239294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.282587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.289778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.309171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.334370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.342309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.351107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.361488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.389601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.397451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.410361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.421953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.444732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.471808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.495909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.510700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.525722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.554781] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.565623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.578793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.599574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.609339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.617891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.627102] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.634380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.671232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.709159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.748979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.777623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.785974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.794326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.802443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.876008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.883308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.901079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.598312] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.604817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.611689] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.618142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.632077] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.642360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.684090] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.690569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.697429] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.703876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.776890] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.828248] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.834774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.841635] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.848129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.882107] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.891930] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.898427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.905341] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.911812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.922627] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.944940] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.951436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.958333] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.964795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.044199] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.051677] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.058141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.064972] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.071423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.108833] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.125862] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.132332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.139230] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.145658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.197512] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.430244] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.436756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.443589] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.450082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.524177] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.680633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.693722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.725761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.737732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.745866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.753709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.761487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.113962] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.189790] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.262614] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.282443] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.370094] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.556880] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.716826] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.884984] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.891278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.914112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.963115] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.969408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.979906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.004143] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.019174] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.025482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.057591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.187899] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.194369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.208288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.259488] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.265905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.282211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.496930] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.503256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.517355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.551944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.560183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.575958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.863528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.869903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.881638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 19:18:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000c06ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}}) 2018/04/13 19:18:51 executing program 6: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={'nouuid,', {[{@norecovery='norecovery', 0x2c}, {@inode32='inode32', 0x2c}]}}) 2018/04/13 19:18:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0x23c, &(0x7f0000015ff0)={&(0x7f0000013000)={0x2c, 0x20, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0xc, 0x0, @u32}, @typed={0xc, 0x14, @u32}]}, 0x2c}, 0x1}, 0x0) 2018/04/13 19:18:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000012000)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0xe, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/13 19:18:52 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000fd7000)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f000043cfff)=[{&(0x7f0000718f0a)="be", 0x1}], 0x1, &(0x7f000036cfa0)}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)='0', 0x1}], 0x1, &(0x7f00000000c0)=[@init={0x18, 0x84, 0x0, {0x0, 0x200, 0x0, 0xb7}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8202, 0x73, 0xffffffff}}], 0x60}, {&(0x7f0000000000)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x10, &(0x7f000093e000), 0x0, &(0x7f000093ef10)=[@sndrcv={0x30, 0x84, 0x1, {0x61, 0x3, 0x1, 0x7fff, 0x7, 0x5d, 0x2, 0x91}}], 0x30}], 0x2, 0x0) 2018/04/13 19:18:53 executing program 6: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000002c0)=@in={0x2, 0x0, @dev={0xa, 0x14}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)="ed", 0x1}], 0x1, &(0x7f0000001400)}, 0x0) listen(r0, 0x1572) accept4(r0, &(0x7f0000000100)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000004c0)=0x10, 0x0) 2018/04/13 19:18:53 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/13 19:18:53 executing program 1: r0 = socket$inet(0x2, 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x6, 0xe, &(0x7f0000000040), 0x52e) 2018/04/13 19:18:53 executing program 7: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x2, &(0x7f0000000000), 0x6e8000) 2018/04/13 19:18:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) accept4(r0, 0x0, &(0x7f0000000000), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2018/04/13 19:18:53 executing program 0: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000089e000/0x4000)=nil, 0x4000, 0x0) getegid() 2018/04/13 19:18:53 executing program 4: syz_mount_image$hfs(&(0x7f0000006a40)='hfs\x00', &(0x7f0000006a80)='./file0\x00', 0x0, 0x0, &(0x7f0000006f40), 0x0, &(0x7f0000007000)={[{@iocharset={'iocharset', 0x3d, 'iso8859-7'}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'macinuit'}, 0x2c}]}) 2018/04/13 19:18:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xffffffff}, 0x8) 2018/04/13 19:18:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000040)="8e2c5c212873656375726974796d696d655f7479706500", 0x40, 0x0, &(0x7f0000000080)) 2018/04/13 19:18:53 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000000000046800) io_setup(0x8000000007, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200)="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", 0x1000}]) [ 69.148876] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/13 19:18:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x2284, &(0x7f000035bfbc)={{0x3, 0x0, @rand_addr}, {}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}) 2018/04/13 19:18:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) mount(&(0x7f0000000140)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, &(0x7f0000000100)) 2018/04/13 19:18:54 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/13 19:18:54 executing program 4: socket(0x0, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 2018/04/13 19:18:54 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 19:18:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet(r0, &(0x7f0000ac0fbb)="c4", 0x1, 0x0, &(0x7f00006e2000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/13 19:18:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) accept4(r0, 0x0, &(0x7f0000000000), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2018/04/13 19:18:54 executing program 6: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000002c0)=@in={0x2, 0x0, @dev={0xa, 0x14}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)="ed", 0x1}], 0x1, &(0x7f0000001400)}, 0x0) listen(r0, 0x1572) accept4(r0, &(0x7f0000000100)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000004c0)=0x10, 0x0) 2018/04/13 19:18:54 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') creat(&(0x7f0000000180)='./control/file0\x00', 0x0) close(r0) 2018/04/13 19:18:54 executing program 3: set_mempolicy(0x8004, &(0x7f0000000000), 0x9) 2018/04/13 19:18:54 executing program 1: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$intptr(0x29, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 2018/04/13 19:18:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffff80], 0x1}}}]}, 0x70}, 0x1}, 0x0) 2018/04/13 19:18:55 executing program 0: clock_nanosleep(0xfffffffffffffffa, 0x0, &(0x7f0000000000), &(0x7f0000000040)) 2018/04/13 19:18:55 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f00000002c0)="2e2f66696c65302f662e6c6530ff00", 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fusectl\x00', 0x828, &(0x7f0000000200)) rmdir(&(0x7f0000000680)="2e2f66696c65302f662e6c6530ff00") 2018/04/13 19:18:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00007af000)=[{&(0x7f0000000000)="480000001400190020ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 70.614546] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/13 19:18:56 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/04/13 19:18:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000becff0)) syz_mount_image$hfsplus(&(0x7f0000000480)='hfsplus\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000c80)) 2018/04/13 19:18:56 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000100)='/vmnet0\x00', 0x11f, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 2018/04/13 19:18:56 executing program 4: clock_gettime(0x7, &(0x7f00000003c0)) 2018/04/13 19:18:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) sendto$inet(r0, &(0x7f00008ac000), 0x266, 0x0, 0x0, 0x1cd) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) recvmsg(r2, &(0x7f0000000180)={&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x3a, &(0x7f0000000140), 0x0, &(0x7f0000000280)=""/239, 0xef}, 0x0) 2018/04/13 19:18:56 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000001c0)=@ethtool_gfeatures={0x3a, 0x1, [{0x0, 0x0, 0x3}]}}) 2018/04/13 19:18:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x80, &(0x7f00000005c0)={'nouuid,'}) 2018/04/13 19:18:56 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:18:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4, 0x10, 0xfff}, 0x2c) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3016a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 19:18:56 executing program 7: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) connect(r0, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x9) 2018/04/13 19:18:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1f0000000203193b000007000000068100023b050900020000000000020058", 0x1f}], 0x1) 2018/04/13 19:18:56 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000140)=@ethtool_gstrings={0x1b}}) 2018/04/13 19:18:56 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f00000016c0)=[&(0x7f0000001380)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000380)}]) 2018/04/13 19:18:56 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = creat(&(0x7f0000cd5000)='./file0/bus\x00', 0x0) pwrite64(r0, &(0x7f0000000040), 0x20000040, 0x0) write(r0, &(0x7f0000000040)="a0", 0x1) 2018/04/13 19:18:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) sendto$inet(r0, &(0x7f00008ac000), 0x266, 0x0, 0x0, 0x1cd) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) recvmsg(r2, &(0x7f0000000180)={&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x3a, &(0x7f0000000140), 0x0, &(0x7f0000000280)=""/239, 0xef}, 0x0) 2018/04/13 19:18:56 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x74, &(0x7f0000000000), &(0x7f0000000040)=0x30) 2018/04/13 19:18:56 executing program 7: mkdir(&(0x7f000043eff8)='./file0\x00', 0x0) creat(&(0x7f0000cd5000)='./file0/bus\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000100)="b2") 2018/04/13 19:18:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000480)="1b", 0x1}], 0x1) 2018/04/13 19:18:57 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000ad4000)='./control\x00', 0xa4000960) readv(r1, &(0x7f00009a4000)=[{&(0x7f0000000040)=""/32, 0x10}], 0x1) dup2(r0, r1) openat$dir(0xffffffffffffff9c, &(0x7f0000e21ff6)='./control\x00', 0x0, 0x0) 2018/04/13 19:18:57 executing program 1: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89fa, &(0x7f0000000040)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b}}) 2018/04/13 19:18:57 executing program 7: mkdir(&(0x7f000043eff8)='./file0\x00', 0x0) creat(&(0x7f0000cd5000)='./file0/bus\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000100)="b2") 2018/04/13 19:18:57 executing program 4: unshare(0x60000000) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x9}, 0x8) 2018/04/13 19:18:57 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3}, 0x10) sendto$inet(r1, &(0x7f0000143f1e)="96", 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) recvfrom$inet(r0, &(0x7f0000000040)=""/63, 0x3f, 0x21, &(0x7f00000000c0)={0x2, 0x0, @broadcast=0xffffffff}, 0x6e8000) 2018/04/13 19:18:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = creat(&(0x7f0000cd5000)='./file0/bus\x00', 0x0) pwrite64(r0, &(0x7f0000000040), 0x20000040, 0x0) write(r0, &(0x7f0000000040)="a0", 0x1) 2018/04/13 19:18:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) 2018/04/13 19:18:57 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:18:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) io_setup(0x2, &(0x7f0000409000)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f00002a8000)={0x0, 0x0, 0x4000000, 0x0, 0x0, r0}]) 2018/04/13 19:18:57 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10000000012) ptrace(0x1a, r1) 2018/04/13 19:18:57 executing program 7: r0 = socket$inet(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x29, 0x4e, &(0x7f0000000000)={0x0, 'ip6_vti0\x00'}, 0x3) 2018/04/13 19:18:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4309(authenc(michael_mic-generic,chacha20-generic)))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) 2018/04/13 19:18:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000080)={0xdd, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) 2018/04/13 19:18:57 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000340)=0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d137e637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "71756575653100000000000000000000000000000000090000030000000000000000e700"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 19:18:57 executing program 6: r0 = socket(0x20000000000018, 0x0, 0x1) io_setup(0x40, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000880)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080)='n', 0x1}]) 2018/04/13 19:18:58 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x0, 0x0) dup2(r0, r1) 2018/04/13 19:18:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004fc0)=[{{&(0x7f0000002e00)=@alg, 0x80, &(0x7f0000003f80), 0x0, &(0x7f0000003fc0)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x27, 0x331, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:18:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000000001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x4) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 19:18:58 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7, 0x205, &(0x7f0000000340)=""/167}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r0, r1, 0x4}, 0x10) 2018/04/13 19:18:58 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000040)=@ethtool_coalesce={0x3}}) 2018/04/13 19:18:58 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000180)) 2018/04/13 19:18:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 2018/04/13 19:18:58 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:18:58 executing program 6: r0 = socket(0x11, 0x4000000000080003, 0x0) getpeername(r0, &(0x7f0000000000)=@nl=@proc, &(0x7f0000000040)=0xfffffffffffffc2f) 2018/04/13 19:18:58 executing program 2: syz_emit_ethernet(0x1d, &(0x7f0000000080)={@random="0352ba8e8227", @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "5d0010"}}}}}}, &(0x7f00000e7fec)) 2018/04/13 19:18:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000100)=0x84) 2018/04/13 19:18:58 executing program 7: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)={0x1, 0x1}) 2018/04/13 19:18:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000001100)=[{&(0x7f0000001140)="87", 0x1}], 0x1) shutdown(r0, 0x1) shutdown(r0, 0x1) 2018/04/13 19:18:58 executing program 1: getpid() sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x5}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x40000000000001, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000400)=@assoc_value, 0x8) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) unlink(&(0x7f0000f86000)='./control/file0\x00') close(r0) 2018/04/13 19:18:59 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00009abfee)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00008a7f45)) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/203) 2018/04/13 19:18:59 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)={[0x37]}, 0x2) 2018/04/13 19:18:59 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f00001bbfd2)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@arp={0x806, @ether_ipv4={0x1, 0x81c, 0x6, 0x4, 0x0, @link_local={0x1, 0x80, 0xc2}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}, &(0x7f0000000440)) 2018/04/13 19:18:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00002d3f70)=[{&(0x7f0000fe5ff0)='p', 0x1}], 0x1) writev(r0, &(0x7f0000818ff0)=[{&(0x7f000016bde8)="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", 0x1e2}], 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) sendto$inet(r0, &(0x7f0000000040)="2b97046ac712c1a9d342eb863d97e1e7b3dc4654c5fc3df6a9bee7f246408e543fd664c4df9bdeba1c5a7aaf803ccaf9cadffc0e1769", 0x36, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) 2018/04/13 19:18:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000001100)=[{&(0x7f0000001140)="87", 0x1}], 0x1) shutdown(r0, 0x1) shutdown(r0, 0x1) 2018/04/13 19:18:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f000003efdc)={0x0, 0x4f}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000d31000)="d6fbbfef51d450fe7b7f00045b76fef095f03ae19b1592519c0e25452d51853c37d79bf3b2df3affeb5f456d5650b5335fbc8f29f6fa2d7900c0a001c1513137bf876fa04248c3cd071f68310e0256ef41e1fb88030000006281832a77aa368ca259329a283415f49d9e520ac91997bdd716494393211044182eea6d15c557b6dfc51ed071de6951b1dd14ce57782f14f2d9c22f110f273e0d", 0x99) 2018/04/13 19:18:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f00000001c0)) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 2018/04/13 19:18:59 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:19:00 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0xc, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x108) 2018/04/13 19:19:00 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000b72ffb)='nv\x00', 0x3) sendto$inet(r0, &(0x7f0000a92000), 0x0, 0x800000020000000, &(0x7f0000303000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000c69fc0)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f0000890fd0)=[{&(0x7f0000120000)='{', 0x1}], 0x1) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup2(r0, r1) sendmsg$nl_generic(r2, &(0x7f0000f5cfc8)={&(0x7f0000711000)={0x10}, 0xc, &(0x7f00007ff000)={&(0x7f000015a000)={0x218, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x204, 0x0, [@generic="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"]}]}, 0x218}, 0x1}, 0x0) 2018/04/13 19:19:00 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000005d40)=[{{0x0, 0x0, &(0x7f0000003780)=[{&(0x7f0000003680)='d', 0x1}], 0x1, &(0x7f00000037c0)}}, {{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000003980)='W', 0x1}], 0x1, &(0x7f0000003a80)}}], 0x2, 0x0) 2018/04/13 19:19:00 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00009abfee)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00008a7f45)) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/203) 2018/04/13 19:19:00 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req3, 0x1c) mprotect(&(0x7f0000a82000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 2018/04/13 19:19:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/icmp\x00') close(r0) 2018/04/13 19:19:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f000003efdc)={0x0, 0x4f}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000d31000)="d6fbbfef51d450fe7b7f00045b76fef095f03ae19b1592519c0e25452d51853c37d79bf3b2df3affeb5f456d5650b5335fbc8f29f6fa2d7900c0a001c1513137bf876fa04248c3cd071f68310e0256ef41e1fb88030000006281832a77aa368ca259329a283415f49d9e520ac91997bdd716494393211044182eea6d15c557b6dfc51ed071de6951b1dd14ce57782f14f2d9c22f110f273e0d", 0x99) 2018/04/13 19:19:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:00 executing program 2: r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0x9, &(0x7f0000000000), 0x0) 2018/04/13 19:19:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:00 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00006f5000)={&(0x7f0000d1e000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000adefe0)={0x18, 0x18, 0x321, 0x0, 0x0, {0x40000001}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 19:19:00 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req3, 0x1c) mprotect(&(0x7f0000a82000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 2018/04/13 19:19:00 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f}, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f}, 0xa) 2018/04/13 19:19:00 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10}, 0xc) 2018/04/13 19:19:00 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x100) 2018/04/13 19:19:00 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f00000000c0)=0x7, 0xff17) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@hci, 0xc, &(0x7f0000000480)}, 0x0) 2018/04/13 19:19:00 executing program 6: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@remote={0xfe, 0x80, [], 0xbb}}, 0x6) 2018/04/13 19:19:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040), 0x271) 2018/04/13 19:19:00 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/13 19:19:00 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) close(r0) 2018/04/13 19:19:01 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) keyctl$invalidate(0x15, 0x0) 2018/04/13 19:19:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 2018/04/13 19:19:01 executing program 6: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="63707526223200fbfffffffffffff6240ebfdf0368528b445ea8c4bb56a2881cf2b76ae175ef25cfcaed426b975d3765b983d239f659cb13") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="63707526223200fbfffffffffffff6240ebfdf0368528b445ea8c4bb56a2881cf2b76ae175ef25cfcaed426b975d3765b983d239f659cb13") 2018/04/13 19:19:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) recvmmsg(r1, &(0x7f000000ab00)=[{{&(0x7f000000a680)=@in, 0x80, &(0x7f000000a9c0), 0x0, &(0x7f000000aa00)=""/225, 0xe1}}], 0x1, 0x0, &(0x7f000000acc0)={0x0, 0x989680}) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/04/13 19:19:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') r1 = epoll_create(0x1f) exit(0x0) poll(&(0x7f0000000080)=[{r0}], 0x2bd, 0x9b) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000b58ff4)) mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) 2018/04/13 19:19:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:02 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f00000002c0)='\a', 0x1}], 0x1) 2018/04/13 19:19:02 executing program 6: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="d95fede92f6d", @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast=0xc, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/13 19:19:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xb, 0x43, 0x4, 0x100000002, 0x1}, 0x2c) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x20}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180)='\'', &(0x7f0000eee000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000100)={r0, &(0x7f0000000380), &(0x7f0000000040)=""/84}, 0x18) 2018/04/13 19:19:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 19:19:02 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x100) 2018/04/13 19:19:02 executing program 7: clone(0x200, &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000500), 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 2018/04/13 19:19:02 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000006ffc)={{&(0x7f0000003000/0x1000)=nil, 0x1000}}) 2018/04/13 19:19:02 executing program 0: move_pages(0x0, 0x6, &(0x7f0000000040)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f0000000080), &(0x7f00000000c0), 0x0) kexec_load(0x0, 0x2, &(0x7f0000000040), 0x0) 2018/04/13 19:19:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000008000)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x821, 0x0, 0x0, {0x4}, [@nested={0x10, 0x0, [@typed={0xc, 0x1, @uid}]}]}, 0x24}, 0x1}, 0x0) 2018/04/13 19:19:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_submit(0x0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 19:19:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0x39, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa}, [@replay_esn_val={0x1c, 0x17}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}, 0x1}, 0x0) 2018/04/13 19:19:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0x40, 0x3f) 2018/04/13 19:19:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:03 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000180), &(0x7f0000000200), 0xfffffffffffffff8, &(0x7f0000ffd000/0x1000)=nil, 0x4) 2018/04/13 19:19:03 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2003e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) tee(r1, r0, 0x1, 0x0) 2018/04/13 19:19:03 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x20000000004, 0x4, 0xb, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000040), &(0x7f0000000180)=""/181}, 0x18) 2018/04/13 19:19:03 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x100) 2018/04/13 19:19:03 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @loopback=0x7f000001, 0x0, 0x0, 'lblcr\x00$\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/13 19:19:03 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$addseals(r0, 0x409, 0x800003) 2018/04/13 19:19:03 executing program 3: r0 = socket(0x11, 0x4000000000080003, 0x0) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "a0051f05d8edd160ba253a14391a32de78b97cff25cc93f6d7bafcb7c812159dee29722828a4ed2775de8e4c89078a4ea87878c0a79f006cf69d9f3dc00ecf"}, 0x60) 2018/04/13 19:19:03 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) ftruncate(r0, 0x0) 2018/04/13 19:19:03 executing program 0: futex(&(0x7f0000000000), 0x3, 0xfffffffffffffff9, &(0x7f0000000040), &(0x7f0000000080), 0x0) 2018/04/13 19:19:03 executing program 7: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f000003e000)='\'', 0x0) 2018/04/13 19:19:03 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f11d55)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x18) connect$inet6(r0, &(0x7f0000f02000)={0xa}, 0x1c) 2018/04/13 19:19:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:03 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/13 19:19:03 executing program 7: clock_nanosleep(0x0, 0x0, &(0x7f0000b85000)={0x77359400}, &(0x7f0000001540)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x16) 2018/04/13 19:19:03 executing program 3: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x40) 2018/04/13 19:19:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:04 executing program 4: r0 = socket(0x1e, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000454ff0)={0x0, 0x2710}, 0x10) recvfrom$inet6(r0, &(0x7f0000c6e000)=""/55, 0x37, 0x0, &(0x7f000024a000)={0xa}, 0x1c) 2018/04/13 19:19:04 executing program 6: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) accept4(r0, 0x0, &(0x7f0000000000), 0x0) 2018/04/13 19:19:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 2018/04/13 19:19:04 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) 2018/04/13 19:19:04 executing program 2: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x3e) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000004c0)="6b73c47ace60a7241549c019165f82fe0d756ad6283faade8cc030f9dc1f272ff7a07f52fda8089fbaa08a4a78b0aeee7f26199eb80de2a833e51182fb25561326da4b1847d111e5e43932186f505f6b9018679952e9", 0x56}, {&(0x7f0000000640)="3fa3d49b1260a5c630ed2d00f8c87b8a6000b123527f09125564215134d38f16156c55567ace61b05f298f12ea4a713cc839a4044a0c1634fcb9f83d0753e4efff9d75a2aeed27c6d0a78d72336309cdf3281fa82386", 0x56}], 0x2) 2018/04/13 19:19:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) sendmsg$alg(0xffffffffffffffff, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r1, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:04 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 2018/04/13 19:19:04 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:19:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f000059fff4)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000070000)={0x14, 0x1c, 0x109, 0x0, 0x0, {0x40000001}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:19:04 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 2018/04/13 19:19:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000004c0)={'veth0\x00', 0x1}) 2018/04/13 19:19:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x10, 0x8000000000004, 0x4, 0x44fa}, 0x2c) 2018/04/13 19:19:04 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x7fff}, 0x2c) 2018/04/13 19:19:04 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='gfs2meta\x00', 0x0, &(0x7f0000000080)) 2018/04/13 19:19:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:05 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x54a3, &(0x7f00000001c0)=""/188) 2018/04/13 19:19:05 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x803, 0x85) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0xffffffff, 0x0, 0x200, 0xe8, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@dev={0xac, 0x14, 0x14}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'gre0\x00', 'erspan0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @loopback=0x7f000001, 0x0, 0x0, 'bridge0\x00', 'gretap0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x370) 2018/04/13 19:19:05 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3}, 0x10) sendto$inet(r1, &(0x7f0000143f1e)="96", 0x1, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00008f9ffc)) 2018/04/13 19:19:05 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/4096, 0xfea7}], 0x1) 2018/04/13 19:19:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) tkill(r0, 0x1000000000013) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000c44000)={0x77359400}, &(0x7f0000048000), 0x0) 2018/04/13 19:19:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000100)={0x0, 0x8001, 0x1}) 2018/04/13 19:19:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) write(r0, &(0x7f0000b64000)="b8", 0x1) close(r0) 2018/04/13 19:19:05 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) fcntl$setflags(r1, 0x2, 0x0) 2018/04/13 19:19:05 executing program 6: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f00007f6fe0)) 2018/04/13 19:19:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000580)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x14, 0x0, 0x0, 0x0, 0x0, {0x5}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:19:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:19:05 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x1, 0x0) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0x14, 0x27, 0x331, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:19:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)='F', 0x1}], 0x1, &(0x7f0000000400)}, 0x8801) 2018/04/13 19:19:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002700000025000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/13 19:19:05 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) [ 80.923989] netlink: 180 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 19:19:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) write(r0, &(0x7f0000b64000)="b8", 0x1) close(r0) 2018/04/13 19:19:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) write(r0, &(0x7f0000b64000)="b8", 0x1) close(r0) 2018/04/13 19:19:06 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) 2018/04/13 19:19:06 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/13 19:19:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) write(r0, &(0x7f000054bfba)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0xffffffffffffff01, 0x0, 0x0, 0xb6c2}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5412, &(0x7f00000000c0)) 2018/04/13 19:19:06 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) listen(r0, 0x82d) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:19:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f0000c03f90)=[{&(0x7f0000c4afa1)="18", 0x1}], 0x1) [ 81.718841] netlink: 180 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 19:19:06 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) 2018/04/13 19:19:06 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x200000000) pread64(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 2018/04/13 19:19:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) write(r0, &(0x7f0000b64000)="b8", 0x1) close(r0) 2018/04/13 19:19:06 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="966df86c88ff6c873cf94adacc7f155829a48fffe2bbd6adf31d5aee36841213f02243bd1fc9c9eae86e23ad42f5e356da3124df5515799dcffba1f49f9ab05c4b1a8fee4c1df02a40c99d418458a260a4955b80e37b2962ae46f0cfcbf2bfda2b73f42cdf"], 0x65) 2018/04/13 19:19:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') write$tun(r0, &(0x7f0000000200)=ANY=[], 0x0) [ 81.858311] netlink: 180 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 19:19:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:07 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) 2018/04/13 19:19:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) write(r0, &(0x7f0000b64000)="b8", 0x1) close(r0) [ 82.172808] netlink: 180 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 19:19:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="966df86c88ff6c873cf94adacc7f155829a48fffe2bbd6adf31d5aee36841213f02243bd1fc9c9eae86e23ad42f5e356da3124df5515799dcffba1f49f9ab05c4b1a8fee4c1df02a40c99d418458a260a4955b80e37b2962ae46f0cfcbf2bfda2b73f42cdf"], 0x65) 2018/04/13 19:19:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='nfsd\x00', 0x1000021, 0x0) fchown(r0, 0x0, 0x0) 2018/04/13 19:19:07 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r1, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:07 executing program 7: write(0xffffffffffffffff, &(0x7f0000294f74)="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", 0xfc) 2018/04/13 19:19:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) close(r0) 2018/04/13 19:19:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0xffc99a3b, &(0x7f0000000680)={0x77359400}) 2018/04/13 19:19:07 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x200000000) pread64(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 2018/04/13 19:19:07 executing program 5: r0 = socket$inet(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000003000)={&(0x7f0000001ff0)=@in={0x2, 0x0, @remote={0xa, 0x14, 0xffffffffffffffff, 0xbb}}, 0x80, &(0x7f0000005ff0)=[{&(0x7f0000003fb9)=';', 0x1}], 0x1, &(0x7f0000003e08)}, 0x0) accept4$inet(r0, 0x0, &(0x7f00000005c0), 0x0) listen(r0, 0x0) listen(r0, 0x100) 2018/04/13 19:19:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000000c0)='/\x00', 0x0, 0x0, &(0x7f0000000300), 0x828020, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, [0x36]}, 0x2c}]}) 2018/04/13 19:19:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x4, "2684927c"}, &(0x7f0000000180)=0x28) 2018/04/13 19:19:08 executing program 4: timer_create(0x4, &(0x7f0000000380)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f00000003c0)) 2018/04/13 19:19:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:19:08 executing program 7: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) 2018/04/13 19:19:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x27, 0x331, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000540)={&(0x7f0000000180)=@rc, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000480)=""/190, 0xbe}, 0x0) 2018/04/13 19:19:08 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f000010aff7)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00006d5000)=""/1, 0x1}], 0x1, 0x800) 2018/04/13 19:19:08 executing program 7: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) 2018/04/13 19:19:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000010ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x9) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8) 2018/04/13 19:19:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000050ef88)=[{{0x0, 0x0, &(0x7f0000e8afc0)=[{&(0x7f0000654000)='c', 0x1}], 0x1, &(0x7f0000607000)}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x9, 0x7fff}, 0xfe53) close(r0) [ 83.385192] ================================================================== [ 83.392635] BUG: KMSAN: uninit-value in sha256_generic_block_fn+0xb05f/0xb460 [ 83.399911] CPU: 1 PID: 6616 Comm: syz-executor4 Not tainted 4.16.0+ #83 [ 83.406749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.416101] Call Trace: [ 83.418704] dump_stack+0x185/0x1d0 [ 83.422351] ? sha256_generic_block_fn+0xb05f/0xb460 [ 83.427460] kmsan_report+0x142/0x240 [ 83.431266] __msan_warning_32+0x6c/0xb0 [ 83.435333] sha256_generic_block_fn+0xb05f/0xb460 [ 83.440273] ? kmsan_internal_chain_origin+0x12b/0x210 [ 83.445551] ? kmsan_memcpy_origins+0x11d/0x170 [ 83.450223] ? __msan_memcpy+0x19f/0x1f0 [ 83.454290] ? crypto_sha256_finup+0x1d2/0x7e0 [ 83.458876] ? shash_ahash_finup+0x468/0xa30 [ 83.463290] ? shash_ahash_digest+0x5c6/0x600 [ 83.467788] ? shash_async_digest+0x11c/0x1b0 [ 83.472289] ? crypto_ahash_op+0x89a/0xc10 [ 83.476543] ? crypto_ahash_digest+0xe4/0x160 [ 83.481042] ? hash_sendpage+0xb40/0xe10 [ 83.485109] ? sock_sendpage+0x1de/0x2c0 [ 83.489175] ? pipe_to_sendpage+0x31b/0x430 [ 83.493511] ? __splice_from_pipe+0x49a/0xf30 [ 83.498023] ? generic_splice_sendpage+0x1c6/0x2a0 [ 83.502964] ? direct_splice_actor+0x19b/0x200 [ 83.507554] ? splice_direct_to_actor+0x764/0x1040 [ 83.512487] ? do_splice_direct+0x335/0x540 [ 83.516815] ? do_sendfile+0x1067/0x1e40 [ 83.520881] ? SYSC_sendfile64+0x1b3/0x300 [ 83.525124] ? SyS_sendfile64+0x64/0x90 [ 83.529101] ? do_syscall_64+0x309/0x430 [ 83.533170] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 83.538548] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 83.544026] ? __save_stack_trace+0x893/0xa80 [ 83.548534] ? kmsan_memcpy_origins+0x11d/0x170 [ 83.553217] crypto_sha256_finup+0x35e/0x7e0 [ 83.557636] ? sha256_generic_block_fn+0xb460/0xb460 [ 83.562732] shash_ahash_finup+0x468/0xa30 [ 83.566953] shash_ahash_digest+0x5c6/0x600 [ 83.571270] shash_async_digest+0x11c/0x1b0 [ 83.575712] crypto_ahash_op+0x89a/0xc10 [ 83.579768] ? __kmalloc+0x23c/0x350 [ 83.583475] ? shash_async_finup+0x1b0/0x1b0 [ 83.587889] ? shash_async_finup+0x1b0/0x1b0 [ 83.592293] crypto_ahash_digest+0xe4/0x160 [ 83.596605] hash_sendpage+0xb40/0xe10 [ 83.600483] ? hash_recvmsg+0xd50/0xd50 [ 83.604455] sock_sendpage+0x1de/0x2c0 [ 83.608329] pipe_to_sendpage+0x31b/0x430 [ 83.612462] ? sock_fasync+0x2b0/0x2b0 [ 83.616348] ? propagate_umount+0x3a30/0x3a30 [ 83.620854] __splice_from_pipe+0x49a/0xf30 [ 83.625180] ? generic_splice_sendpage+0x2a0/0x2a0 [ 83.630116] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 83.635484] generic_splice_sendpage+0x1c6/0x2a0 [ 83.640251] ? iter_file_splice_write+0x1710/0x1710 [ 83.645272] ? iter_file_splice_write+0x1710/0x1710 [ 83.650292] direct_splice_actor+0x19b/0x200 [ 83.654710] splice_direct_to_actor+0x764/0x1040 [ 83.659473] ? do_splice_direct+0x540/0x540 [ 83.663806] ? security_file_permission+0x28f/0x4b0 [ 83.668838] ? rw_verify_area+0x35e/0x580 [ 83.672994] do_splice_direct+0x335/0x540 [ 83.677139] do_sendfile+0x1067/0x1e40 [ 83.681040] SYSC_sendfile64+0x1b3/0x300 [ 83.685093] SyS_sendfile64+0x64/0x90 [ 83.688877] do_syscall_64+0x309/0x430 [ 83.692758] ? SYSC_sendfile+0x320/0x320 [ 83.696819] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 83.701996] RIP: 0033:0x455319 [ 83.705175] RSP: 002b:00007f973f942c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 83.712958] RAX: ffffffffffffffda RBX: 00007f973f9436d4 RCX: 0000000000455319 [ 83.720222] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 83.727490] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 83.734758] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 83.742027] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 83.749288] [ 83.750893] Uninit was stored to memory at: [ 83.755207] kmsan_internal_chain_origin+0x12b/0x210 [ 83.760304] kmsan_memcpy_origins+0x11d/0x170 [ 83.764785] __msan_memcpy+0x19f/0x1f0 [ 83.768664] crypto_sha256_finup+0x1d2/0x7e0 [ 83.773069] shash_ahash_finup+0x468/0xa30 [ 83.777287] shash_ahash_digest+0x5c6/0x600 [ 83.781586] shash_async_digest+0x11c/0x1b0 [ 83.785889] crypto_ahash_op+0x89a/0xc10 [ 83.789941] crypto_ahash_digest+0xe4/0x160 [ 83.794255] hash_sendpage+0xb40/0xe10 [ 83.798132] sock_sendpage+0x1de/0x2c0 [ 83.802003] pipe_to_sendpage+0x31b/0x430 [ 83.806138] __splice_from_pipe+0x49a/0xf30 [ 83.810440] generic_splice_sendpage+0x1c6/0x2a0 [ 83.815197] direct_splice_actor+0x19b/0x200 [ 83.819585] splice_direct_to_actor+0x764/0x1040 [ 83.824324] do_splice_direct+0x335/0x540 [ 83.828453] do_sendfile+0x1067/0x1e40 [ 83.832329] SYSC_sendfile64+0x1b3/0x300 [ 83.836380] SyS_sendfile64+0x64/0x90 [ 83.840160] do_syscall_64+0x309/0x430 [ 83.844041] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 83.849212] Uninit was created at: [ 83.852745] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 83.857740] kmsan_alloc_page+0x82/0xe0 [ 83.861698] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 83.866434] alloc_pages_vma+0xcc8/0x1800 [ 83.870561] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 83.875555] shmem_getpage_gfp+0x35db/0x5770 [ 83.879943] shmem_fallocate+0xde2/0x1610 [ 83.884081] vfs_fallocate+0x9dc/0xde0 [ 83.887947] SYSC_fallocate+0x119/0x1d0 [ 83.891902] SyS_fallocate+0x64/0x90 [ 83.895606] do_syscall_64+0x309/0x430 [ 83.899474] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 83.904725] ================================================================== [ 83.912063] Disabling lock debugging due to kernel taint [ 83.917501] Kernel panic - not syncing: panic_on_warn set ... [ 83.917501] [ 83.924844] CPU: 1 PID: 6616 Comm: syz-executor4 Tainted: G B 4.16.0+ #83 [ 83.932962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.942296] Call Trace: [ 83.944876] dump_stack+0x185/0x1d0 [ 83.948500] panic+0x39d/0x940 [ 83.951706] ? sha256_generic_block_fn+0xb05f/0xb460 [ 83.957077] kmsan_report+0x238/0x240 [ 83.960875] __msan_warning_32+0x6c/0xb0 [ 83.964932] sha256_generic_block_fn+0xb05f/0xb460 [ 83.969843] ? kmsan_internal_chain_origin+0x12b/0x210 [ 83.975107] ? kmsan_memcpy_origins+0x11d/0x170 [ 83.979753] ? __msan_memcpy+0x19f/0x1f0 [ 83.983796] ? crypto_sha256_finup+0x1d2/0x7e0 [ 83.988358] ? shash_ahash_finup+0x468/0xa30 [ 83.992744] ? shash_ahash_digest+0x5c6/0x600 [ 83.997220] ? shash_async_digest+0x11c/0x1b0 [ 84.001695] ? crypto_ahash_op+0x89a/0xc10 [ 84.005911] ? crypto_ahash_digest+0xe4/0x160 [ 84.010387] ? hash_sendpage+0xb40/0xe10 [ 84.014434] ? sock_sendpage+0x1de/0x2c0 [ 84.018477] ? pipe_to_sendpage+0x31b/0x430 [ 84.022783] ? __splice_from_pipe+0x49a/0xf30 [ 84.027259] ? generic_splice_sendpage+0x1c6/0x2a0 [ 84.032175] ? direct_splice_actor+0x19b/0x200 [ 84.036755] ? splice_direct_to_actor+0x764/0x1040 [ 84.041686] ? do_splice_direct+0x335/0x540 [ 84.045988] ? do_sendfile+0x1067/0x1e40 [ 84.050047] ? SYSC_sendfile64+0x1b3/0x300 [ 84.054267] ? SyS_sendfile64+0x64/0x90 [ 84.058222] ? do_syscall_64+0x309/0x430 [ 84.062265] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 84.067615] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 84.073059] ? __save_stack_trace+0x893/0xa80 [ 84.077547] ? kmsan_memcpy_origins+0x11d/0x170 [ 84.082202] crypto_sha256_finup+0x35e/0x7e0 [ 84.086606] ? sha256_generic_block_fn+0xb460/0xb460 [ 84.091689] shash_ahash_finup+0x468/0xa30 [ 84.095907] shash_ahash_digest+0x5c6/0x600 [ 84.100224] shash_async_digest+0x11c/0x1b0 [ 84.104548] crypto_ahash_op+0x89a/0xc10 [ 84.108608] ? __kmalloc+0x23c/0x350 [ 84.112302] ? shash_async_finup+0x1b0/0x1b0 [ 84.116687] ? shash_async_finup+0x1b0/0x1b0 [ 84.121077] crypto_ahash_digest+0xe4/0x160 [ 84.125381] hash_sendpage+0xb40/0xe10 [ 84.129255] ? hash_recvmsg+0xd50/0xd50 [ 84.133215] sock_sendpage+0x1de/0x2c0 [ 84.137098] pipe_to_sendpage+0x31b/0x430 [ 84.141234] ? sock_fasync+0x2b0/0x2b0 [ 84.145113] ? propagate_umount+0x3a30/0x3a30 [ 84.149594] __splice_from_pipe+0x49a/0xf30 [ 84.153903] ? generic_splice_sendpage+0x2a0/0x2a0 [ 84.158824] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 84.164176] generic_splice_sendpage+0x1c6/0x2a0 [ 84.169192] ? iter_file_splice_write+0x1710/0x1710 [ 84.174193] ? iter_file_splice_write+0x1710/0x1710 [ 84.179195] direct_splice_actor+0x19b/0x200 [ 84.183593] splice_direct_to_actor+0x764/0x1040 [ 84.188334] ? do_splice_direct+0x540/0x540 [ 84.192640] ? security_file_permission+0x28f/0x4b0 [ 84.197644] ? rw_verify_area+0x35e/0x580 [ 84.201778] do_splice_direct+0x335/0x540 [ 84.205915] do_sendfile+0x1067/0x1e40 [ 84.209798] SYSC_sendfile64+0x1b3/0x300 [ 84.213848] SyS_sendfile64+0x64/0x90 [ 84.217632] do_syscall_64+0x309/0x430 [ 84.221511] ? SYSC_sendfile+0x320/0x320 [ 84.225560] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 84.230731] RIP: 0033:0x455319 [ 84.233903] RSP: 002b:00007f973f942c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 84.241594] RAX: ffffffffffffffda RBX: 00007f973f9436d4 RCX: 0000000000455319 [ 84.248844] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 84.256095] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 84.263348] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 84.270600] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 84.278301] Dumping ftrace buffer: [ 84.281819] (ftrace buffer empty) [ 84.285505] Kernel Offset: disabled [ 84.289109] Rebooting in 86400 seconds..