INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2018/04/20 19:40:34 fuzzer started 2018/04/20 19:40:34 dialing manager at 10.128.0.26:40315 2018/04/20 19:40:41 kcov=true, comps=false 2018/04/20 19:40:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f84fa0)={0x2, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x7ffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_ident={0x2}]}, 0x48}, 0x1}, 0x0) 2018/04/20 19:40:43 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 2018/04/20 19:40:43 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newaddr={0x28, 0x14, 0xb, 0x0, 0x0, {0x2, 0x8, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x8, 0x1, @loopback=0x7f000001}, @IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14}}]}, 0x28}, 0x1}, 0x0) 2018/04/20 19:40:43 executing program 4: kexec_load(0x0, 0x0, &(0x7f0000003600), 0x0) 2018/04/20 19:40:43 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000240)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/20 19:40:43 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0xfffffec7, &(0x7f0000927000)=0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d137e637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "71756575653100000000000000000000000000000000090000030000000000000000e700"}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 19:40:43 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0300006e"], 0x1, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/53}, 0x3d, 0x3, 0x3000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 2018/04/20 19:40:43 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2}}}, &(0x7f00000001c0)=0x98) syzkaller login: [ 45.962650] ip (3729) used greatest stack depth: 54688 bytes left [ 46.386322] ip (3767) used greatest stack depth: 54672 bytes left [ 46.730419] ip (3800) used greatest stack depth: 54312 bytes left [ 47.677884] ip (3893) used greatest stack depth: 53656 bytes left [ 47.872010] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.878526] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.906978] device bridge_slave_0 entered promiscuous mode [ 48.078899] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.085395] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.116937] device bridge_slave_1 entered promiscuous mode [ 48.132793] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.139250] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.178460] device bridge_slave_0 entered promiscuous mode [ 48.198395] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.204871] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.212184] device bridge_slave_0 entered promiscuous mode [ 48.252456] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.258979] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.289852] device bridge_slave_0 entered promiscuous mode [ 48.312943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.324261] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.330737] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.370355] device bridge_slave_0 entered promiscuous mode [ 48.392690] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.399173] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.418949] device bridge_slave_1 entered promiscuous mode [ 48.428712] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.435195] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.464215] device bridge_slave_1 entered promiscuous mode [ 48.474191] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.480732] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.503629] device bridge_slave_0 entered promiscuous mode [ 48.527137] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.533636] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.548472] device bridge_slave_0 entered promiscuous mode [ 48.558639] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.565135] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.574938] device bridge_slave_0 entered promiscuous mode [ 48.584639] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.591126] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.612812] device bridge_slave_1 entered promiscuous mode [ 48.619620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.632841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.643332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.650710] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.657257] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.702017] device bridge_slave_1 entered promiscuous mode [ 48.720772] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.727300] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.757921] device bridge_slave_1 entered promiscuous mode [ 48.785974] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.792498] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.811730] device bridge_slave_1 entered promiscuous mode [ 48.818839] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.825300] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.838080] device bridge_slave_1 entered promiscuous mode [ 48.855972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.865750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.891594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.899963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.910250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.016968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.058795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.078959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.119567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.138419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.235346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.329865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.659961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.858713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.884148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.961602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.033138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.084281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.107188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.143899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.165252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.201469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.225934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.275671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.288295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.351283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.430593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.485240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.905179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.140356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.149472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.168981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.234617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.254738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.312543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.340989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.362515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.374284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.386626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.421524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.429805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.482548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.492709] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.546443] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.557630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.572587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.601252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.608441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.622766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.661561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.679131] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.688829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.739796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.759740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.775775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.799646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.806958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.823354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.835794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.848567] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.859536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.873657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.900263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.922841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.945943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.967754] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.975847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.983478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.994668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.005820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.013979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.023864] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.037642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.045590] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.056126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.077313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.089973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.127755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.160831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.191830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.219598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.234604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.242468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.250506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.258450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.266639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.308237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.329174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.354858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.379263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.386534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.425786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.994876] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.001369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.008282] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.014748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.045968] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.054015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.359301] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.365786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.372655] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.379118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.428828] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.450865] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.457324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.464803] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.471254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.494666] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.502648] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.509131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.516634] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.523091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.534548] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.548636] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.555120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.561926] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.568372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.631965] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.642108] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.648586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.655425] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.661896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.672577] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.691716] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.698187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.705068] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.711516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.761099] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.769280] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.775743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.782598] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.789087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.823691] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.072183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.089668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.120300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.141723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.171753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.188298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.195493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.511300] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.556316] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.776139] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.820884] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.982196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.002727] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.040213] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.055216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.274575] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.280842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.295160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.357874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.364178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.374142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.590471] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.596909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.614178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.640375] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.659478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.693741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.822561] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.828836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.839779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.858334] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.864903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.888648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.922166] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.928893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.947568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.985943] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.996218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.019634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 19:41:10 executing program 2: getpid() sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) write$binfmt_script(r2, &(0x7f00000004c0)={'#! ', './file0', [{0x20, 'client1\x00'}, {0x20}, {0x20, 'client1\x00'}], 0xa, "93905061abc7c60cb70951d92ee68da8337ac9c865c9f0d8f2c5555c11fbc5fc99ba3ae8"}, 0x42) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) dup2(r0, r1) 2018/04/20 19:41:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fstatfs(r0, &(0x7f0000000080)) 2018/04/20 19:41:11 executing program 2: getpid() sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) write$binfmt_script(r2, &(0x7f00000004c0)={'#! ', './file0', [{0x20, 'client1\x00'}, {0x20}, {0x20, 'client1\x00'}], 0xa, "93905061abc7c60cb70951d92ee68da8337ac9c865c9f0d8f2c5555c11fbc5fc99ba3ae8"}, 0x42) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) dup2(r0, r1) 2018/04/20 19:41:11 executing program 5: r0 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a}, &(0x7f0000000480)="02", 0x1, 0xffffffffffffffff) exit(0x0) add_key$keyring(&(0x7f0000000cc0)='keyring\x00', &(0x7f0000000d00)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) 2018/04/20 19:41:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f00000001c0)=0xc) 2018/04/20 19:41:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x2, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x10001}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 19:41:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000577fc8)={&(0x7f000026cff4)={0x10}, 0xc, &(0x7f0000577000)={&(0x7f0000000000)=ANY=[@ANYBLOB="5801000010000100000000000000000000000000000000000000ffffac14ffaaff02000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}, 0x1}, 0x0) 2018/04/20 19:41:11 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000432fe8)={0xaa}) r1 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={&(0x7f000000f000/0x4000)=nil, 0x4000}) 2018/04/20 19:41:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0xfffffffffffffffc) fallocate(r1, 0x11, 0x0, 0x10000) 2018/04/20 19:41:11 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_mr_cache\x00') pread64(r0, &(0x7f0000000100)=""/202, 0xca, 0x0) 2018/04/20 19:41:12 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) fstat(0xffffffffffffffff, &(0x7f0000000280)) close(r1) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) write(r1, &(0x7f000014d000), 0x0) close(r0) 2018/04/20 19:41:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rmdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x501fc, 0x7f) 2018/04/20 19:41:12 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) pread64(r1, &(0x7f0000000280)=""/156, 0x9c, 0x0) 2018/04/20 19:41:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000004040)=0x14, 0x0) syz_open_procfs(0x0, &(0x7f0000aa7000)='coredump_filter\x00') 2018/04/20 19:41:12 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:12 executing program 6: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000240)="24000000200025eff26b000425edfc00020b4f06b7b43649d15ebe6ec6fad988d50b8db6", 0x24) 2018/04/20 19:41:12 executing program 5: r0 = socket(0x2, 0x3, 0x40000000000000ff) sendto$unix(r0, &(0x7f00000004c0)="ee087d8955854a71cb4fef74e9601927e79436d5e4218a286737134367585e5b67add9b477e765b4346960e8e1ec9d607cb9874491299c50", 0x38, 0x0, &(0x7f0000000540)=@file={0x0, './file0/file0\x00'}, 0x6e) 2018/04/20 19:41:12 executing program 2: getpid() sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) write$binfmt_script(r2, &(0x7f00000004c0)={'#! ', './file0', [{0x20, 'client1\x00'}, {0x20}, {0x20, 'client1\x00'}], 0xa, "93905061abc7c60cb70951d92ee68da8337ac9c865c9f0d8f2c5555c11fbc5fc99ba3ae8"}, 0x42) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) dup2(r0, r1) [ 72.709219] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! [ 72.738221] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/20 19:41:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001aff8)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000000)=""/166, 0xa6) sendmsg$netlink(r1, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002240)={0x10}, 0x10}], 0x1, &(0x7f0000002400)}, 0x0) 2018/04/20 19:41:12 executing program 6: [ 72.797688] audit: type=1326 audit(1524253272.796:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 2018/04/20 19:41:12 executing program 0: 2018/04/20 19:41:12 executing program 1: [ 72.893312] audit: type=1326 audit(1524253272.826:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x455379 code=0x50000 [ 72.913156] audit: type=1326 audit(1524253272.830:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 2018/04/20 19:41:12 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000b00)="24000000200025eff26b000425edfc00020b00280110b5004f06b7b408000100000000b7", 0x24) 2018/04/20 19:41:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffe}) socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x1}) [ 72.932811] audit: type=1326 audit(1524253272.830:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 [ 72.952492] audit: type=1326 audit(1524253272.830:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 [ 72.972114] audit: type=1326 audit(1524253272.830:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 2018/04/20 19:41:13 executing program 6: open$dir(&(0x7f0000000000)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000001300)="d8", 0x1) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4009, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) [ 72.991765] audit: type=1326 audit(1524253272.831:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 [ 73.011390] audit: type=1326 audit(1524253272.835:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 2018/04/20 19:41:13 executing program 3: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000000080)="be", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000002c0)=ANY=[@ANYBLOB="0fd20000"]) [ 73.031099] audit: type=1326 audit(1524253272.839:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 [ 73.050815] audit: type=1326 audit(1524253272.839:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5819 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455379 code=0x50000 2018/04/20 19:41:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000040)={[{@dos1xfloppy='dos1xfloppy', 0x2c}, {@tz_utc='tz=UTC', 0x2c}, {@showexec='showexec', 0x2c}]}) 2018/04/20 19:41:13 executing program 1: 2018/04/20 19:41:13 executing program 6: 2018/04/20 19:41:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000004040)=0x14, 0x0) syz_open_procfs(0x0, &(0x7f0000aa7000)='coredump_filter\x00') 2018/04/20 19:41:13 executing program 1: 2018/04/20 19:41:13 executing program 0: 2018/04/20 19:41:13 executing program 2: 2018/04/20 19:41:13 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:13 executing program 3: 2018/04/20 19:41:13 executing program 5: 2018/04/20 19:41:14 executing program 6: 2018/04/20 19:41:14 executing program 1: 2018/04/20 19:41:14 executing program 2: 2018/04/20 19:41:14 executing program 5: 2018/04/20 19:41:14 executing program 0: 2018/04/20 19:41:14 executing program 3: 2018/04/20 19:41:14 executing program 1: 2018/04/20 19:41:14 executing program 2: 2018/04/20 19:41:14 executing program 4: 2018/04/20 19:41:14 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000480)={0x2}) 2018/04/20 19:41:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='@&prockeyring\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000f36000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000030c000)={0x0, 0x0, 0x0, "98de7a8c5ae95ec8792c92150fc33a664f13eeab65c0322901ca6bd31bde2c51f06c5f0b014f9f91eeb7647c7240f476c8d75dd000aa8faf8fb5740200a6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000044000)) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x1f, 0x0, 0x0, 0x3fd, @tick, {}, {}, @connect}], 0x30) 2018/04/20 19:41:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0505350, &(0x7f0000944fa8)={{0x0, 0xbf}}) 2018/04/20 19:41:14 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000000c0)) 2018/04/20 19:41:14 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x39b, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x6879, 0x8, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/04/20 19:41:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/04/20 19:41:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000002e00)=ANY=[@ANYRES64=r0, @ANYPTR64=&(0x7f0000001340)=ANY=[], @ANYBLOB="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"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)) 2018/04/20 19:41:14 executing program 6: 2018/04/20 19:41:14 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:14 executing program 5: 2018/04/20 19:41:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x11, @loopback=0x7f000001, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/20 19:41:14 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, &(0x7f000045c000)=0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2000000000000002) 2018/04/20 19:41:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5411, &(0x7f0000000000)) 2018/04/20 19:41:14 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0xe1) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0x0, 0x823, 0x0, 0x2}, 0x10}, 0x1}, 0x1) 2018/04/20 19:41:15 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$KDGKBLED(r0, 0xc0045103, &(0x7f0000000000)) 2018/04/20 19:41:15 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x540019b5, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/20 19:41:15 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x6c, &(0x7f0000000000), &(0x7f0000000040)=0x3) 2018/04/20 19:41:15 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x2) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f}, 0xa) listen(r0, 0x0) shutdown(r0, 0x0) close(r0) 2018/04/20 19:41:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xa, 0x8, 0x6, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00006d6000)={r0, &(0x7f0000eef000)}, 0x10) 2018/04/20 19:41:15 executing program 0: r0 = socket(0x1e, 0x1000000000005, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f000045d000), 0x0, &(0x7f000016cf61)}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={&(0x7f0000c1d000)=@ax25, 0x10, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1, &(0x7f0000c21000)}, 0x0) clock_gettime(0x0, &(0x7f0000003980)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003900)=[{{&(0x7f0000000000)=@nfc, 0x10, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/43, 0x2b}}, {{&(0x7f0000001240)=@sco, 0x8, &(0x7f00000037c0)=[{&(0x7f00000036c0)=""/225, 0xe1}], 0x1, &(0x7f0000003880)=""/90, 0x5a}}], 0x2, 0x3, &(0x7f00000039c0)={0x0, r1+30000000}) 2018/04/20 19:41:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f00000008c0), 0x0, &(0x7f0000000980)) 2018/04/20 19:41:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000529fee)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) 2018/04/20 19:41:15 executing program 4: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000202}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getlink={0x30, 0x12, 0x804, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_NET_NS_PID={0x8, 0x13}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/04/20 19:41:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x10e, 0xb, &(0x7f0000000500)={{0x0, @multicast1=0xe0000001, 0x0, 0x0, 'sed\x00'}, {@loopback=0x7f000001}}, 0x3) 2018/04/20 19:41:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00003b4000)='/dev/input/event#\x00', 0xfffffffffffffffb, 0x0) ioctl$EVIOCGREP(r0, 0x40084503, &(0x7f00007fb000)=""/220) 2018/04/20 19:41:15 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) ftruncate(r0, 0x0) 2018/04/20 19:41:15 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:16 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x2, &(0x7f0000000140)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6c}], &(0x7f00000000c0)='syzkaller\x00', 0x7fff, 0xd7, &(0x7f00000001c0)=""/215}, 0x48) 2018/04/20 19:41:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0x1, 0x4, 0x10, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f0000001040)=""/205}, 0x18) 2018/04/20 19:41:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="f778030000000000000058bfe34748275a4d7729a1a8a97c7f"], &(0x7f0000000640)="47504c00bc3047629662c71f3f5f26c0b48bec3e7ba6eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/20 19:41:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x10, 0x8000000000004, 0x4, 0x3, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 2018/04/20 19:41:16 executing program 1: r0 = socket$inet(0x2, 0x80806, 0x0) bind(r0, &(0x7f0000000040)=@ethernet={0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/20 19:41:16 executing program 4: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000002000)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="4d407a38bb1a", @remote={0xac, 0x14, 0x14, 0xbb}, @link_local={0x1, 0x80, 0xc2}, @multicast2=0xe0000002}}}}, &(0x7f0000000040)={0x0, 0x6, [0x0, 0x31d]}) 2018/04/20 19:41:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 2018/04/20 19:41:16 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) 2018/04/20 19:41:17 executing program 6: r0 = socket(0x11, 0x803, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @random="06004ee72211"}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000922000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f000098dffc), 0x2) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x200408d4, &(0x7f000072e000)={0xa}, 0x1c) 2018/04/20 19:41:17 executing program 5: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r4 = dup2(r3, r3) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)=0x8) read(r3, &(0x7f0000000080)=""/206, 0x7a8) r5 = syz_open_pts(r4, 0x0) ioctl$TCFLSH(r5, 0x540a, 0x0) 2018/04/20 19:41:17 executing program 3: clock_adjtime(0x0, &(0x7f0000476000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000011) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) 2018/04/20 19:41:17 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r2, 0x660c, &(0x7f0000000080)={0x2b8, &(0x7f0000000040)}) 2018/04/20 19:41:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000bea000)={&(0x7f00000001c0)=@newspdinfo={0x1c, 0x24, 0x401, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8, 0x3}]}, 0x1c}, 0x1}, 0x0) 2018/04/20 19:41:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040)={[0x30]}, 0x2) 2018/04/20 19:41:17 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) 2018/04/20 19:41:17 executing program 1: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)="c2255b00", 0x4, 0x0) 2018/04/20 19:41:17 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000d51eed)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @broadcast=0xffffffff}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x7, 0x0, 0x8, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}, 0x0) 2018/04/20 19:41:17 executing program 6: r0 = socket(0x11, 0x803, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @random="06004ee72211"}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000922000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f000098dffc), 0x2) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x200408d4, &(0x7f000072e000)={0xa}, 0x1c) 2018/04/20 19:41:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="24004aa36137330b6679374db37718af3f91b00a9235908dee589c597d8f7dec52277a92830ed6390522aaa8662471dca5bc1ae79e22e989a6c1afbb60ef513138ee6f16e5f1c4ac2753aa7a9f0686bddd9caff81015270a50677cddcba54d0f919d68d550479c63e9b64156513c474e0cca868cd6832affb597", 0x0) write(r0, &(0x7f0000000140)="b28de81d3752985a46b9b900000000000000", 0x12) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x0, 0xffffffffffffffff) 2018/04/20 19:41:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000157ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000149fe0)={0x20, 0x11, 0x301, 0x0, 0x0, {}, [@typed={0x9, 0x0, @uid}]}, 0x166}, 0x1}, 0x0) 2018/04/20 19:41:17 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f0000000080)='+:usernodev]GPL[ppp0-\x00') 2018/04/20 19:41:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000d36ff4)) [ 77.757930] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.823472] device bridge_slave_1 left promiscuous mode [ 77.829201] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/20 19:41:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000100)=""/134) 2018/04/20 19:41:18 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) readahead(r0, 0x0, 0x0) 2018/04/20 19:41:18 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000954ff6)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000aff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000fc8)={&(0x7f0000238ff8)=@abs, 0x8, &(0x7f0000bd9000), 0x0, &(0x7f00006f3fe8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmsg(r2, &(0x7f000000e000)={0x0, 0x0, &(0x7f000008b000), 0x0, &(0x7f000000c000), 0xfc13}, 0x0) 2018/04/20 19:41:18 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x400000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000000)={'ip6gre0\x00'}) 2018/04/20 19:41:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000157ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000149fe0)={0x20, 0x11, 0x301, 0x0, 0x0, {}, [@typed={0x9, 0x0, @uid}]}, 0x166}, 0x1}, 0x0) 2018/04/20 19:41:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000d36ff4)) 2018/04/20 19:41:18 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) 2018/04/20 19:41:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x17, r0, 0x0) 2018/04/20 19:41:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x340, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200009c0], 0x0, &(0x7f0000000100), &(0x7f00000009c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bpq0\x00', 'syzkaller1\x00', 'irlan0\x00', "628f6955676530000000000000008000", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x19, 0x0, 0x0, 'tunl0\x00', 'lo\x00', 'tunl0\x00', 'ip6gre0\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x120, 0x1c8, 0x1f8, [@devgroup={'devgroup\x00', 0x18}, @stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}, [], 0x0, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}}}}}]}, [@common=@redirect={'redirect\x00', 0x8}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "416cdd0a7577b1d3e21966f72a49e73ddfb06a6167ba179ef25d8c45ae642814f7bc36502ca5da9ff396bfefcf30cd67cdfe3e25da14a6a6cf25c3ecc59cf7f0"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x3b8) 2018/04/20 19:41:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg(r1, &(0x7f0000007300)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000003a80)='x', 0x1}], 0x1, &(0x7f0000004a80)}}], 0x1, 0x8000) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x40) 2018/04/20 19:41:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 2018/04/20 19:41:18 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x1cd, &(0x7f0000da3000)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)) 2018/04/20 19:41:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1100002, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x19a}], 0x8000, &(0x7f0000001700)={'nouuid,'}) 2018/04/20 19:41:18 executing program 0: r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'ra(\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000080)=0x54) 2018/04/20 19:41:18 executing program 6: r0 = socket(0x1f, 0x2000000000000005, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f}, 0xa) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0xfffffffffffffe2e) 2018/04/20 19:41:18 executing program 4: syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x0, &(0x7f0000001800)) mount(&(0x7f0000003900)='./file0/file0\x00', &(0x7f0000003940)='./file0\x00', &(0x7f0000003980)='fusectl\x00', 0x0, &(0x7f00000039c0)) 2018/04/20 19:41:19 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) 2018/04/20 19:41:19 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) read$eventfd(r0, &(0x7f0000000280), 0xffcb) 2018/04/20 19:41:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00008b2000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000586ff8)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0x0) 2018/04/20 19:41:19 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x80000000}) 2018/04/20 19:41:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt6_stats\x00') r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f000083c000)=0x2, 0x5) 2018/04/20 19:41:19 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 2018/04/20 19:41:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000180)={0x18, 0x2e, 0x6fd, 0x0, 0x0, {0x2002}, [@nested={0x4}]}, 0x18}, 0x1}, 0x0) 2018/04/20 19:41:19 executing program 6: mmap(&(0x7f0000001000/0xffe000)=nil, 0xffe000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/20 19:41:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000440)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) read(r1, &(0x7f0000000480)=""/195, 0xffffffffffffffb4) 2018/04/20 19:41:19 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x1cd, &(0x7f0000da3000)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)) 2018/04/20 19:41:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000019c0)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b13373648a2d037a565b62d510ef2907ca2d03888e1cc2c8a7db5b8b73", 0x20) 2018/04/20 19:41:20 executing program 3: r0 = userfaultfd(0x0) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x3) dup2(r1, r0) fdatasync(r0) 2018/04/20 19:41:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/20 19:41:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e30fa8)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000839000), 0x0) fallocate(r2, 0x0, 0x0, 0x4) sendfile(r1, r2, &(0x7f0000e64ff8), 0x1) 2018/04/20 19:41:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) ioctl$sock_SIOCINQ(r0, 0x8941, &(0x7f0000000080)) 2018/04/20 19:41:20 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00002e8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000)="a2", 0x1) 2018/04/20 19:41:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x49, &(0x7f00000000c0)="1efc4568", 0x4) 2018/04/20 19:41:20 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) close(r0) 2018/04/20 19:41:20 executing program 6: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x60, 0x4) 2018/04/20 19:41:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', r0, &(0x7f0000012ff8)='./file0\x00') rmdir(&(0x7f0000000240)='./file0\x00') creat(&(0x7f0000020ff2)='./file0/file0\x00', 0x0) renameat(r0, &(0x7f0000020ff2)='./file1\x00', r0, &(0x7f0000002000)='./file0\x00') 2018/04/20 19:41:20 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) r1 = dup(r0) io_submit(0x0, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004747410c0eaa820b8000007aa7c40a00afc74f8c3488"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/20 19:41:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)="17", 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/20 19:41:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.memory_migrate\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) 2018/04/20 19:41:20 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x533, 0x600000}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/20 19:41:20 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x1cd, &(0x7f0000da3000)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)) 2018/04/20 19:41:20 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x533, 0x600000}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/20 19:41:20 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) getpeername(r0, &(0x7f0000a48000)=@sco, &(0x7f0000ef2ffc)=0x8) 2018/04/20 19:41:20 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) write$evdev(r0, &(0x7f00000000c0)=[{}, {{0x0, 0x2710}}, {}], 0xffd4) write$evdev(r0, &(0x7f0000000140)=[{{0x77359400}}, {{0x77359400}}], 0x30) 2018/04/20 19:41:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000434000)={{0x55c}}) 2018/04/20 19:41:20 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00006fc000)={0x2}, 0x10) io_setup(0xff, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:20 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) 2018/04/20 19:41:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x323, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000d00ffb)='user\x00', &(0x7f0000434ffb)={0x73, 0x79, 0x7a}, &(0x7f00000aff4b), 0x0, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) mremap(&(0x7f000053c000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00000cd000/0x2000)=nil) [ 80.961864] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/20 19:41:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)={0x0, 0xffffffff, 0x41, 0x1}) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2018/04/20 19:41:21 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 19:41:21 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000500)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) 2018/04/20 19:41:21 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000c21f67)="200000000104f500000000000000060020200af80900010001e8006007080000", 0x20}], 0x1}, 0x0) dup3(r1, r0, 0x0) 2018/04/20 19:41:21 executing program 3: r0 = socket$inet(0x2, 0x8000000000003, 0x32) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="6d616e45b0650000000000003d22bb000000e2ccf405bd9e5d690de64c09196200001900000000000000000100000000001f0000000600000068050000f8010000e8000000d0040000d0c54dd5d0d899652cda2c38"], 0x1) 2018/04/20 19:41:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x323, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000d00ffb)='user\x00', &(0x7f0000434ffb)={0x73, 0x79, 0x7a}, &(0x7f00000aff4b), 0x0, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) mremap(&(0x7f000053c000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00000cd000/0x2000)=nil) 2018/04/20 19:41:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000780)='reiserfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)={[{@usrjquota_file='usrjquota=syz', 0x2c}, {@commit={'commit', 0x3d, [0x33, 0x0]}, 0x2c}]}) 2018/04/20 19:41:21 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x4058534c, &(0x7f00000002c0)={0x0, 0x7a120}) 2018/04/20 19:41:22 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x1cd, &(0x7f0000da3000)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)) 2018/04/20 19:41:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000062ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) sendmmsg$alg(r1, &(0x7f00002f4000)=[{0x0, 0x0, &(0x7f00009cbfa0)}], 0x1, 0x0) fallocate(r2, 0x0, 0x0, 0x9) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8) 2018/04/20 19:41:22 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b000007110000f30501000b000100020423ca0000cf", 0x1f) 2018/04/20 19:41:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x2, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/20 19:41:22 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000ab3ffc)=0x8000000008, 0x4) 2018/04/20 19:41:22 executing program 2: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x20004) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f0000000080)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) dup3(r0, r1, 0x0) 2018/04/20 19:41:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000043c0)=[{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000a80)="cc4dcfb3d686f34fe1beb819ac8ae678ac", 0x11}], 0x1, &(0x7f0000000b80)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000140)=""/94, 0x5e}}, {{&(0x7f0000002f40)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xe2}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/04/20 19:41:22 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) io_setup(0xff, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="01", 0x1}]) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) [ 82.119485] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 82.176157] ================================================================== [ 82.183580] BUG: KMSAN: uninit-value in crc_t10dif_generic+0x155/0x1b0 [ 82.186393] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 82.190251] CPU: 1 PID: 6358 Comm: syz-executor6 Not tainted 4.16.0+ #84 [ 82.190258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.190261] Call Trace: [ 82.190285] dump_stack+0x185/0x1d0 [ 82.190304] ? crc_t10dif_generic+0x155/0x1b0 2018/04/20 19:41:22 executing program 2: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x20004) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f0000000080)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) dup3(r0, r1, 0x0) [ 82.190317] kmsan_report+0x142/0x240 [ 82.190348] __msan_warning_32+0x6c/0xb0 [ 82.233419] crc_t10dif_generic+0x155/0x1b0 [ 82.237750] chksum_finup+0xc6/0x150 [ 82.241467] ? chksum_final+0xe0/0xe0 [ 82.245269] shash_ahash_finup+0x468/0xa30 [ 82.249513] shash_ahash_digest+0x5c6/0x600 [ 82.253843] shash_async_digest+0x11c/0x1b0 [ 82.258172] crypto_ahash_op+0x89a/0xc10 [ 82.262245] ? __local_bh_enable_ip+0x3b/0x140 [ 82.266833] ? shash_async_finup+0x1b0/0x1b0 [ 82.271249] ? shash_async_finup+0x1b0/0x1b0 [ 82.275667] crypto_ahash_digest+0xe4/0x160 [ 82.279999] hash_sendpage+0xb40/0xe10 [ 82.283896] ? hash_recvmsg+0xd50/0xd50 [ 82.287879] sock_sendpage+0x1de/0x2c0 [ 82.291782] pipe_to_sendpage+0x31b/0x430 [ 82.295942] ? sock_fasync+0x2b0/0x2b0 [ 82.299844] ? propagate_umount+0x3a30/0x3a30 [ 82.304345] __splice_from_pipe+0x49a/0xf30 [ 82.308671] ? generic_splice_sendpage+0x2a0/0x2a0 [ 82.313604] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 82.318980] generic_splice_sendpage+0x1c6/0x2a0 2018/04/20 19:41:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000337ff2)='timers\x00') preadv(r0, &(0x7f00005e2ff0)=[{&(0x7f000036b000)=""/100, 0x64}], 0x1, 0x1000000000000) 2018/04/20 19:41:22 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000100)='/vmnet0\x00', 0x11f, 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='trusted.syz\x00', &(0x7f0000000440)='/dev/sequencer\x00', 0x1fd, 0x0) [ 82.323744] ? iter_file_splice_write+0x1710/0x1710 [ 82.328769] ? iter_file_splice_write+0x1710/0x1710 [ 82.333800] direct_splice_actor+0x19b/0x200 [ 82.338230] splice_direct_to_actor+0x764/0x1040 [ 82.342997] ? do_splice_direct+0x540/0x540 [ 82.347969] ? security_file_permission+0x28f/0x4b0 [ 82.352992] ? rw_verify_area+0x35e/0x580 [ 82.357145] do_splice_direct+0x335/0x540 [ 82.361297] do_sendfile+0x1067/0x1e40 [ 82.365206] SYSC_sendfile64+0x1b3/0x300 [ 82.369278] SyS_sendfile64+0x64/0x90 [ 82.373084] do_syscall_64+0x309/0x430 [ 82.376981] ? SYSC_sendfile+0x320/0x320 [ 82.381050] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 82.386234] RIP: 0033:0x455379 [ 82.389421] RSP: 002b:00007f4cd66cac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 82.397128] RAX: ffffffffffffffda RBX: 00007f4cd66cb6d4 RCX: 0000000000455379 [ 82.404397] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 82.411666] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 82.418932] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff 2018/04/20 19:41:22 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x271a, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000000)=0x224) 2018/04/20 19:41:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001500192340834b80040d8c5602062200010400000000000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) [ 82.426206] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 82.433478] [ 82.435094] Uninit was created at: [ 82.438637] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 82.443650] kmsan_alloc_page+0x82/0xe0 [ 82.447626] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 82.452381] alloc_pages_vma+0xcc8/0x1800 [ 82.456536] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 82.461554] shmem_getpage_gfp+0x35db/0x5770 [ 82.465962] shmem_fallocate+0xde2/0x1610 [ 82.470112] vfs_fallocate+0x9dc/0xde0 [ 82.474005] SYSC_fallocate+0x119/0x1d0 [ 82.477977] SyS_fallocate+0x64/0x90 [ 82.481693] do_syscall_64+0x309/0x430 [ 82.485586] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 82.490766] ================================================================== [ 82.498117] Disabling lock debugging due to kernel taint [ 82.503649] Kernel panic - not syncing: panic_on_warn set ... [ 82.503649] [ 82.511017] CPU: 1 PID: 6358 Comm: syz-executor6 Tainted: G B 4.16.0+ #84 2018/04/20 19:41:22 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 82.518728] netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. [ 82.519667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.519671] Call Trace: [ 82.519693] dump_stack+0x185/0x1d0 [ 82.519708] panic+0x39d/0x940 [ 82.519744] ? crc_t10dif_generic+0x155/0x1b0 [ 82.519755] kmsan_report+0x238/0x240 [ 82.519769] __msan_warning_32+0x6c/0xb0 [ 82.519782] crc_t10dif_generic+0x155/0x1b0 [ 82.519808] chksum_finup+0xc6/0x150 [ 82.555700] netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. [ 82.559283] ? chksum_final+0xe0/0xe0 [ 82.559297] shash_ahash_finup+0x468/0xa30 [ 82.559316] shash_ahash_digest+0x5c6/0x600 [ 82.559333] shash_async_digest+0x11c/0x1b0 [ 82.559351] crypto_ahash_op+0x89a/0xc10 [ 82.559366] ? __local_bh_enable_ip+0x3b/0x140 [ 82.559378] ? shash_async_finup+0x1b0/0x1b0 [ 82.559400] ? shash_async_finup+0x1b0/0x1b0 [ 82.609870] crypto_ahash_digest+0xe4/0x160 [ 82.614203] hash_sendpage+0xb40/0xe10 [ 82.618096] ? hash_recvmsg+0xd50/0xd50 [ 82.622068] sock_sendpage+0x1de/0x2c0 2018/04/20 19:41:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001500192340834b80040d8c5602062200010400000000000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) 2018/04/20 19:41:22 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="cefaad1b99e75542a5fa08e7", 0xc}], 0x0, 0x0) [ 82.625961] pipe_to_sendpage+0x31b/0x430 [ 82.630111] ? sock_fasync+0x2b0/0x2b0 [ 82.634006] ? propagate_umount+0x3a30/0x3a30 [ 82.638499] __splice_from_pipe+0x49a/0xf30 [ 82.642823] ? generic_splice_sendpage+0x2a0/0x2a0 [ 82.647758] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 82.653220] generic_splice_sendpage+0x1c6/0x2a0 [ 82.657982] ? iter_file_splice_write+0x1710/0x1710 [ 82.663004] ? iter_file_splice_write+0x1710/0x1710 [ 82.668020] direct_splice_actor+0x19b/0x200 [ 82.672435] splice_direct_to_actor+0x764/0x1040 [ 82.677190] ? do_splice_direct+0x540/0x540 [ 82.681784] ? security_file_permission+0x28f/0x4b0 [ 82.686805] ? rw_verify_area+0x35e/0x580 [ 82.690214] netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. [ 82.690960] do_splice_direct+0x335/0x540 [ 82.690981] do_sendfile+0x1067/0x1e40 [ 82.691007] SYSC_sendfile64+0x1b3/0x300 [ 82.691026] SyS_sendfile64+0x64/0x90 [ 82.691039] do_syscall_64+0x309/0x430 [ 82.691056] ? SYSC_sendfile+0x320/0x320 [ 82.691073] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 82.691095] RIP: 0033:0x455379 [ 82.731649] RSP: 002b:00007f4cd66cac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 82.739360] RAX: ffffffffffffffda RBX: 00007f4cd66cb6d4 RCX: 0000000000455379 [ 82.746634] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 82.753913] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 82.761186] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 82.768468] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 82.776170] Dumping ftrace buffer: [ 82.779700] (ftrace buffer empty) [ 82.783383] Kernel Offset: disabled [ 82.786983] Rebooting in 86400 seconds..