INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. 2018/04/19 08:22:44 fuzzer started 2018/04/19 08:22:44 dialing manager at 10.128.0.26:42695 2018/04/19 08:22:51 kcov=true, comps=false 2018/04/19 08:22:54 executing program 0: mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(0xffffffffffffffff, &(0x7f0000b1d000)=[{&(0x7f0000006000)}], 0xd5, 0x0) 2018/04/19 08:22:54 executing program 2: memfd_create(&(0x7f0000000000)='&\x00', 0x2) 2018/04/19 08:22:54 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x1) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x0, 0x63, 0x2}, {}], 0x30) 2018/04/19 08:22:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0x6) 2018/04/19 08:22:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000402f73)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) recvmmsg(r1, &(0x7f0000008800)=[{{&(0x7f0000007080)=@ax25, 0x80, &(0x7f0000008680)=[{&(0x7f00000074c0)=""/4096, 0x1000}], 0x1, &(0x7f0000008740)=""/172, 0xac}}], 0x1, 0x0, &(0x7f0000008a40)={0x77359400}) 2018/04/19 08:22:54 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000954ff6)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000aff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000fc8)={&(0x7f0000238ff8)=@abs, 0x8, &(0x7f0000bd9000), 0x0, &(0x7f00006f3fe8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmsg(r2, &(0x7f000000e000)={0x0, 0x0, &(0x7f000008b000), 0x0, &(0x7f000000c000), 0xfc13}, 0x0) 2018/04/19 08:22:54 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001140)='/dev/sequencer\x00', 0x40a02, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr={0x5, 0xfffffffffffffff8}}], 0x30) 2018/04/19 08:22:54 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000683ff4)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0xc) syzkaller login: [ 45.072258] ip (3780) used greatest stack depth: 54672 bytes left [ 45.810270] ip (3855) used greatest stack depth: 54560 bytes left [ 45.868587] ip (3858) used greatest stack depth: 54200 bytes left [ 46.252516] ip (3891) used greatest stack depth: 53656 bytes left [ 46.425758] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.432249] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.455798] device bridge_slave_0 entered promiscuous mode [ 46.487381] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.493899] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.518661] device bridge_slave_0 entered promiscuous mode [ 46.550791] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.557297] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.602489] device bridge_slave_0 entered promiscuous mode [ 46.624633] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.631143] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.659245] device bridge_slave_0 entered promiscuous mode [ 46.686803] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.693304] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.716953] device bridge_slave_1 entered promiscuous mode [ 46.734706] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.741201] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.776530] device bridge_slave_0 entered promiscuous mode [ 46.794317] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.800852] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.813272] device bridge_slave_0 entered promiscuous mode [ 46.826982] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.833462] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.850631] device bridge_slave_1 entered promiscuous mode [ 46.860896] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.867366] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.887892] device bridge_slave_1 entered promiscuous mode [ 46.899391] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.905872] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.930651] device bridge_slave_0 entered promiscuous mode [ 46.947467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.954624] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.961140] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.971635] device bridge_slave_1 entered promiscuous mode [ 46.980942] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.987407] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.000294] device bridge_slave_1 entered promiscuous mode [ 47.013449] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.019903] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.043485] device bridge_slave_0 entered promiscuous mode [ 47.063272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.072814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.080325] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.086771] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.112017] device bridge_slave_1 entered promiscuous mode [ 47.121012] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.127521] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.152667] device bridge_slave_1 entered promiscuous mode [ 47.159666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.169746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.178201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.269736] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.276233] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.296438] device bridge_slave_1 entered promiscuous mode [ 47.304215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.314268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.321780] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.336232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.376959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.427584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.474252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.561766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.585362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.665668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.104085] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.217137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.261871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.330124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.406157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.426639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.435769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.445925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.538454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.633788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.675750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.689587] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.696811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.715274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.896547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.935888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.309808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.420532] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.446476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.513501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.599778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.632972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.642527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.655521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.705175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.718528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.727358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.745806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.805347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.847873] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.855581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.867667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.897632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.914393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.943374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.952805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.969934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.000932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.010452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.020277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.034661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.070492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.083941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.093010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.102994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.137678] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.147481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.154515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.177736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.193755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.221730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.242940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.250869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.264124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.276742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.290567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.301543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.313099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.338407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.371604] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.379958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.408489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.434642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.448208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.483716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.514143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.522999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.531555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.558140] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.565584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.576008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.599522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.643735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.678493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.706987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.714204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.744267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.787903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.795173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.824390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.512405] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.518898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.525770] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.532221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.568583] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.575171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.604988] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.611480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.618346] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.624783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.633932] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.654012] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.660499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.667381] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.673828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.744437] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.751646] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.758131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.764979] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.771439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.783115] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.792448] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.798919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.805755] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.812197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.843962] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.865864] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.872347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.879230] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.885699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.935234] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.220960] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.227451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.234323] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.240785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.288210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.310741] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.317213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.324104] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.330561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.338792] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.599146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.613171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.653653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.683802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.710869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.719831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.728008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.805374] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.903919] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.990118] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.997785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.012357] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.093276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.459902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.539188] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.597949] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.604293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.616647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.669940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.679105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.693490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.790430] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.796713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.808654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.835825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.844242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.875800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.918381] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.924791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.944354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.964568] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.972855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.986868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.261281] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.267582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.278614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.383999] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.390353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.402662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/19 08:23:20 executing program 6: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={"6c6f0000000000000000000100", &(0x7f0000000100)=@ethtool_eeprom={0xc}}) 2018/04/19 08:23:20 executing program 6: 2018/04/19 08:23:20 executing program 4: 2018/04/19 08:23:21 executing program 0: mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(0xffffffffffffffff, &(0x7f0000b1d000)=[{&(0x7f0000006000)}], 0xd5, 0x0) 2018/04/19 08:23:21 executing program 7: 2018/04/19 08:23:21 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001140)='/dev/sequencer\x00', 0x40a02, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr={0x5, 0xfffffffffffffff8}}], 0x30) 2018/04/19 08:23:21 executing program 1: 2018/04/19 08:23:21 executing program 6: 2018/04/19 08:23:21 executing program 4: 2018/04/19 08:23:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000402f73)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) recvmmsg(r1, &(0x7f0000008800)=[{{&(0x7f0000007080)=@ax25, 0x80, &(0x7f0000008680)=[{&(0x7f00000074c0)=""/4096, 0x1000}], 0x1, &(0x7f0000008740)=""/172, 0xac}}], 0x1, 0x0, &(0x7f0000008a40)={0x77359400}) 2018/04/19 08:23:21 executing program 2: 2018/04/19 08:23:22 executing program 2: 2018/04/19 08:23:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') pread64(r0, &(0x7f0000000200)=""/8, 0x27c, 0x0) 2018/04/19 08:23:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000006ec0)='cgroup.subtree_control\x00', 0x2, 0x0) 2018/04/19 08:23:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "80aef971d512b35f95d59a009cd940f5360e95bddf87621ba91981f730d51892a7b8a18a35d4a1db9b0948b48f4073bc13d755e3480a5265754e9f75d31883aa", "bb23b559d1e39c7265d4a0b51f074ac30620c08d88a9f4238c8c8e3e331a135b76dac26787a4fbcbac7182688397af6c922fa7f710965baf1e16a5b6b4e52b2e", "cc1c8fc4660fc840eee9ebb39981a121717d4def6af653ede00cacd935a0ad8f"}) 2018/04/19 08:23:22 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x0) fcntl$addseals(r0, 0x409, 0x0) 2018/04/19 08:23:22 executing program 6: r0 = mq_open(&(0x7f0000d39ffd)='-$\x00', 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f00000002c0)=[{r0, 0x37a426eea49135af}], 0x1, &(0x7f0000000340)={0x0, r1+30000000}, &(0x7f0000000380), 0x8) 2018/04/19 08:23:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') pread64(r0, &(0x7f0000000200)=""/8, 0x5a, 0xa2) 2018/04/19 08:23:22 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0x8) 2018/04/19 08:23:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/fib_triestat\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8) 2018/04/19 08:23:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:23 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) 2018/04/19 08:23:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000003540)) shutdown(r0, 0x1) 2018/04/19 08:23:23 executing program 0: getpeername$netrom(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) pipe2(&(0x7f0000000000), 0x0) 2018/04/19 08:23:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) close(r0) 2018/04/19 08:23:23 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @multicast1=0xe0000001}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000140)=""/8, 0xfffffffa, 0x0) 2018/04/19 08:23:23 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x9, 0x10b) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/19 08:23:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:23 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff44, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000500)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) 2018/04/19 08:23:23 executing program 3: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) lseek(r0, 0x0, 0x4) 2018/04/19 08:23:23 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="f6a464b677a577e201c793986d291e75", 0x10}], 0x1, &(0x7f0000000240)=ANY=[]}}], 0x1, 0x0) 2018/04/19 08:23:23 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x2}, 0x3c7) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x730000, 0x223, 0xb, &(0x7f0000000080)) 2018/04/19 08:23:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000003540)) shutdown(r0, 0x1) 2018/04/19 08:23:23 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x31}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x198, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x400002, 0x13, &(0x7f00000002c0)) 2018/04/19 08:23:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:23 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xf, 0xfffffffe, 0xfffffffc, &(0x7f0000000180)) 2018/04/19 08:23:23 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x2}, 0x3c7) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x89e0, 0xfffffffe, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000a3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x223, 0xb, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x730000, 0x223, 0xb, &(0x7f0000000080)) 2018/04/19 08:23:23 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000a3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x41a, &(0x7f0000000200)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x223, 0xb, &(0x7f0000000080)) 2018/04/19 08:23:24 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x2}, 0x3c7) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x89e0, 0xfffffffe, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000a3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x223, 0xb, &(0x7f0000000480)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x4c}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x400007, 0x10, &(0x7f0000000000)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000a3}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x41a, &(0x7f0000000200)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x223, 0xb, &(0x7f0000000080)) 2018/04/19 08:23:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)) 2018/04/19 08:23:24 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) 2018/04/19 08:23:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) sendmsg$netlink(r0, &(0x7f0000000600)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000480), 0x0, &(0x7f0000000640)=[@cred={0x18, 0x1, 0x2, 0x0, 0x0, r1}], 0x18}, 0x0) 2018/04/19 08:23:24 executing program 6: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x200) 2018/04/19 08:23:24 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x0) 2018/04/19 08:23:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/19 08:23:24 executing program 0: socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/19 08:23:24 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001dfc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000007c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3000000018000105000000000000001426dd21a540d0000a0000000000000000000000140005000000000000000001a5a588a352559bb82bd271fbf816067e76b27a8002fc6fa1645dbd0000000000000000"], 0x1}, 0x1}, 0x0) 2018/04/19 08:23:24 executing program 3: mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xf01c, 0x0) 2018/04/19 08:23:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:24 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/19 08:23:24 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x8000000006) ioctl$TCSETSW(r1, 0x5402, &(0x7f00000eb000)={0x0, 0xffff}) writev(r1, &(0x7f00000002c0)=[{&(0x7f00000017c0)="88bc560c24ff7e7dfdd6503d1b24c764f6717eaa43dee862070d9d420861370e527e321cece42ea90e3504fab73baa5ecdea337e42353dd9ef03a119e8f71dbe36a5205f33c791c38d8e44772c1cd93e555cd9e9aeb703e9b50128abc18dce4081d30ccda1eb08bf2fcb011e535fdccc29d393242f2d33ce88d7fea2375f44fee10198c3b225cbcc025cfcb82b1f76fa658918cb78402b772a2af9abcb79b24d78f6a89d57612e7b6eae5f6599042802afb4abd466596f52fee3a60fe473b3bb22d6e876f4fcddf185ddea646f2d82", 0xcf}], 0x1) 2018/04/19 08:23:24 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 2018/04/19 08:23:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000180), 0x4) 2018/04/19 08:23:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/19 08:23:24 executing program 7: getpriority(0x6, 0x0) 2018/04/19 08:23:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000600)={&(0x7f0000000000)=@kern={0x10}, 0xc, &(0x7f0000000240)=[{&(0x7f0000000640)={0x10, 0x1c}, 0x10}], 0x1, &(0x7f00000005c0)=[@cred={0x18, 0x1, 0x2, r1}], 0x18}, 0x0) 2018/04/19 08:23:24 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns/ipc\x00') 2018/04/19 08:23:24 executing program 4: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0) 2018/04/19 08:23:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') 2018/04/19 08:23:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:24 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/19 08:23:24 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) 2018/04/19 08:23:24 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) sync() 2018/04/19 08:23:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x0, 0x0, "c8ce58c4c9ef800d0f2d1b49a3d11c9cdee10d3f7eb9f6c1df9a483d90a271afbd3a35930152411bee916f998641535f43b54d16975c8bf78f0946efb1b009559345280928020bdce8d4e8a0d3da110e"}, 0xd8) 2018/04/19 08:23:24 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000c6bff8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x0, &(0x7f000002f000)) r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/111, 0x6f}, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x81008, &(0x7f0000001880)) rmdir(&(0x7f0000d19000)='./file0\x00') 2018/04/19 08:23:24 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:24 executing program 1: r0 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 2018/04/19 08:23:24 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/19 08:23:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @multicast1=0xe0000001}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000140)=""/8, 0xfffffffa, 0x4000a2) 2018/04/19 08:23:25 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) 2018/04/19 08:23:25 executing program 6: getpeername$netrom(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) 2018/04/19 08:23:25 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) 2018/04/19 08:23:25 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100), 0x1000, &(0x7f0000000140)={[{@fmask={'fmask', 0x3d}, 0x2c}]}) 2018/04/19 08:23:25 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/19 08:23:25 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:26 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:26 executing program 6: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f00000005c0)=""/4096, 0x1000) 2018/04/19 08:23:26 executing program 7: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)) 2018/04/19 08:23:26 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:26 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) 2018/04/19 08:23:26 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000c6bff8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x0, &(0x7f000002f000)) r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/111, 0x6f}, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x81008, &(0x7f0000001880)) rmdir(&(0x7f0000d19000)='./file0\x00') 2018/04/19 08:23:26 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000400)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0xb5, &(0x7f0000000000)}, 0x0) 2018/04/19 08:23:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @multicast1=0xe0000001}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000140)=""/8, 0xfffffffa, 0x4000a2) 2018/04/19 08:23:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:26 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/19 08:23:26 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x4, 0x6f2000, &(0x7f0000000000)) 2018/04/19 08:23:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000010000009522e600000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/04/19 08:23:26 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:26 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) 2018/04/19 08:23:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8080000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000001880)=@can={0x1d}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002a40)="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", 0x2e3}], 0x1, &(0x7f0000003bc0)}}], 0x1, 0x0) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0x393, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/19 08:23:26 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:43 executing program 7: r0 = memfd_create(&(0x7f00000000c0)='ip6tnl0\x00', 0x0) fcntl$getflags(r0, 0x40a) 2018/04/19 08:23:43 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) 2018/04/19 08:23:43 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x99) r1 = socket$inet6_sctp(0xa, 0x4400000000000001, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) close(r0) sendmsg(r1, &(0x7f0000ff1000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)='q', 0x1}], 0x1}, 0x2000c000) close(r1) 2018/04/19 08:23:43 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8080000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000001880)=@can={0x1d}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002a40)="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", 0x2e3}], 0x1, &(0x7f0000003bc0)}}], 0x1, 0x0) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0x393, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/19 08:23:43 executing program 4: getrandom(&(0x7f0000000040)=""/31, 0x1f, 0x3) 2018/04/19 08:23:43 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000c6bff8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x0, &(0x7f000002f000)) r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/111, 0x6f}, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x81008, &(0x7f0000001880)) rmdir(&(0x7f0000d19000)='./file0\x00') 2018/04/19 08:23:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:43 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$kcm(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:43 executing program 4: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x402000) 2018/04/19 08:23:43 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) sendmsg$netlink(r0, &(0x7f0000000600)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000480), 0x0, &(0x7f00000005c0)=[@cred={0x18, 0x1, 0x2, 0x0, r1}], 0x18}, 0x0) 2018/04/19 08:23:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8080000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000001880)=@can={0x1d}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002a40)="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", 0x2e3}], 0x1, &(0x7f0000003bc0)}}], 0x1, 0x0) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0x393, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/19 08:23:43 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) 2018/04/19 08:23:43 executing program 4: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xffffffffffffffff) 2018/04/19 08:23:43 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:44 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:44 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) 2018/04/19 08:23:44 executing program 7: getrandom(&(0x7f0000000040)=""/31, 0x1f, 0x0) 2018/04/19 08:23:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x1, 0x0) 2018/04/19 08:23:44 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000c6bff8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x0, &(0x7f000002f000)) r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/111, 0x6f}, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x81008, &(0x7f0000001880)) rmdir(&(0x7f0000d19000)='./file0\x00') 2018/04/19 08:23:44 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000100)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) 2018/04/19 08:23:44 executing program 4: r0 = epoll_create1(0x0) fstat(r0, &(0x7f0000000180)) 2018/04/19 08:23:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000040000001ffffcb0d25cd1163b5630700000001"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 2018/04/19 08:23:44 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)) 2018/04/19 08:23:44 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000bcafe0)=[{&(0x7f0000689f40)=""/192, 0xc0}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x801) write(r1, &(0x7f0000000080)="1989", 0x2) 2018/04/19 08:23:44 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="5b5331d25a71c6a64f00d90720f785f88f9e63f90f76c48feee314083a181eefab2af8a65643ebc8c2b907fdebdd7b6aabd04ebe5b3133ae10d25c8992f969f3462f985649a0d1aeb7d535535fe9ce30e21dc14811cdff61456d7141cc19a8c86d8c80ccc6639cbb396c5307933f3d1c5a346d2d3a47311974a4970abaccab9b06afbdf003eb24b16c82af83155e9b5533db3eeb4e9c0722105fdc7585c77f5238ae3d12f08c8ab6dcf0edb2490a54ac46932250eb853d86d10cff49f40797062fee0affd74773c634", 0xc9}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) shutdown(r0, 0x1) clock_gettime(0x0, &(0x7f0000004d00)={0x0, 0x0}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x40, 0x0, "bb7d979a5ee032056dff2fc639ba6368d0d71d898a4e124cf21cd30cb70965e6517b9cd90bda9821886e8cd3637def26f925ad25edc2a48d5320748f0957c324fe23baa6085747576770b4aaa4b7bab6"}, 0xd8) recvmmsg(r0, &(0x7f0000004b00)=[{{&(0x7f0000002500)=@sco, 0x80, &(0x7f0000004340)=[{&(0x7f00000041c0)=""/215, 0xd7}], 0x1, &(0x7f0000000180)=""/186, 0xba}}, {{&(0x7f0000004600)=@nfc_llcp, 0x80, &(0x7f0000004a40), 0x0, &(0x7f0000004ac0)}}], 0x2, 0x0, &(0x7f0000000140)={0x0, r1+30000000}) 2018/04/19 08:23:44 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@ipv4={[], [0xff, 0xff]}}, 0xffc9) 2018/04/19 08:23:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x1}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/19 08:23:44 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000140)=ANY=[@ANYBLOB="02"], 0x1}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8}, 0x1}, 0x0) [ 93.031659] ================================================================== [ 93.039050] BUG: KMSAN: uninit-value in tcp_parse_options+0xd74/0x1a30 [ 93.045691] CPU: 0 PID: 7 Comm: ksoftirqd/0 Not tainted 4.16.0+ #84 [ 93.052064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.061389] Call Trace: [ 93.063955] dump_stack+0x185/0x1d0 [ 93.067560] ? tcp_parse_options+0xd74/0x1a30 [ 93.072028] kmsan_report+0x142/0x240 [ 93.075813] __msan_warning_32+0x6c/0xb0 [ 93.079850] tcp_parse_options+0xd74/0x1a30 [ 93.084152] tcp_validate_incoming+0x4f1/0x2790 [ 93.088801] tcp_rcv_state_process+0xb19/0x6490 [ 93.093445] ? __bpf_prog_run32+0x127/0x170 [ 93.097742] ? security_sock_rcv_skb+0x4c/0x1f0 [ 93.102388] tcp_v4_do_rcv+0xb26/0xd90 [ 93.106250] tcp_v4_rcv+0x5b25/0x6750 [ 93.110031] ? tcp_filter+0x270/0x270 [ 93.113804] ip_local_deliver_finish+0x6ed/0xd40 [ 93.118535] ip_local_deliver+0x43c/0x4e0 [ 93.122659] ? ip_local_deliver+0x4e0/0x4e0 [ 93.126953] ? ip_call_ra_chain+0x7b0/0x7b0 [ 93.131248] ip_rcv_finish+0x1253/0x16d0 [ 93.135283] ip_rcv+0x119d/0x16f0 [ 93.138708] ? ip_rcv+0x16f0/0x16f0 [ 93.142313] __netif_receive_skb_core+0x47cf/0x4a80 [ 93.147302] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 93.152645] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 93.158419] ? ip_local_deliver_finish+0xd40/0xd40 [ 93.163331] ? acpi_cppc_processor_probe+0x1d03/0x20b0 [ 93.168589] process_backlog+0x62d/0xe20 [ 93.172627] ? rps_trigger_softirq+0x2f0/0x2f0 [ 93.177180] net_rx_action+0x7c1/0x1a70 [ 93.181131] ? net_tx_action+0xab0/0xab0 [ 93.185166] __do_softirq+0x56d/0x93d [ 93.188944] ? ksoftirqd_should_run+0x30/0x30 [ 93.193411] run_ksoftirqd+0x1f/0x40 [ 93.197098] smpboot_thread_fn+0x488/0x970 [ 93.201308] ? cpu_report_death+0x1e0/0x1e0 [ 93.206038] kthread+0x539/0x720 [ 93.209377] ? cpu_report_death+0x1e0/0x1e0 [ 93.213674] ? kthread_blkcg+0xf0/0xf0 [ 93.217544] ret_from_fork+0x35/0x40 [ 93.221230] [ 93.222828] Uninit was created at: [ 93.226344] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 93.231419] kmsan_kmalloc+0x94/0x100 [ 93.235196] kmsan_slab_alloc+0x11/0x20 [ 93.239143] __kmalloc_node_track_caller+0xaed/0x11c0 [ 93.244303] __alloc_skb+0x2cf/0x9f0 [ 93.247991] tcp_send_ack+0x18c/0x910 [ 93.251766] tcp_fin+0x298/0x8f0 [ 93.255107] tcp_data_queue+0x2cb9/0xa200 [ 93.259504] tcp_rcv_state_process+0x5c61/0x6490 [ 93.264234] tcp_v4_do_rcv+0xb26/0xd90 [ 93.268094] tcp_v4_rcv+0x5b25/0x6750 [ 93.271868] ip_local_deliver_finish+0x6ed/0xd40 [ 93.276597] ip_local_deliver+0x43c/0x4e0 [ 93.280715] ip_rcv_finish+0x1253/0x16d0 [ 93.284745] ip_rcv+0x119d/0x16f0 [ 93.288174] __netif_receive_skb_core+0x47cf/0x4a80 [ 93.293163] process_backlog+0x62d/0xe20 [ 93.297199] net_rx_action+0x7c1/0x1a70 [ 93.301146] __do_softirq+0x56d/0x93d [ 93.304914] ================================================================== [ 93.312243] Disabling lock debugging due to kernel taint [ 93.317661] Kernel panic - not syncing: panic_on_warn set ... [ 93.317661] [ 93.324999] CPU: 0 PID: 7 Comm: ksoftirqd/0 Tainted: G B 4.16.0+ #84 [ 93.332674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.341999] Call Trace: [ 93.344562] dump_stack+0x185/0x1d0 [ 93.348164] panic+0x39d/0x940 [ 93.351340] ? tcp_parse_options+0xd74/0x1a30 [ 93.355826] kmsan_report+0x238/0x240 [ 93.359610] __msan_warning_32+0x6c/0xb0 [ 93.363660] tcp_parse_options+0xd74/0x1a30 [ 93.367968] tcp_validate_incoming+0x4f1/0x2790 [ 93.372618] tcp_rcv_state_process+0xb19/0x6490 [ 93.377271] ? __bpf_prog_run32+0x127/0x170 [ 93.381568] ? security_sock_rcv_skb+0x4c/0x1f0 [ 93.386223] tcp_v4_do_rcv+0xb26/0xd90 [ 93.390100] tcp_v4_rcv+0x5b25/0x6750 [ 93.393887] ? tcp_filter+0x270/0x270 [ 93.397666] ip_local_deliver_finish+0x6ed/0xd40 [ 93.402403] ip_local_deliver+0x43c/0x4e0 [ 93.406537] ? ip_local_deliver+0x4e0/0x4e0 [ 93.410841] ? ip_call_ra_chain+0x7b0/0x7b0 [ 93.415139] ip_rcv_finish+0x1253/0x16d0 [ 93.419180] ip_rcv+0x119d/0x16f0 [ 93.422608] ? ip_rcv+0x16f0/0x16f0 [ 93.426224] __netif_receive_skb_core+0x47cf/0x4a80 [ 93.431214] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 93.436555] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 93.442325] ? ip_local_deliver_finish+0xd40/0xd40 [ 93.447230] ? acpi_cppc_processor_probe+0x1d03/0x20b0 [ 93.452480] process_backlog+0x62d/0xe20 [ 93.456519] ? rps_trigger_softirq+0x2f0/0x2f0 [ 93.461078] net_rx_action+0x7c1/0x1a70 [ 93.465029] ? net_tx_action+0xab0/0xab0 [ 93.469065] __do_softirq+0x56d/0x93d [ 93.472843] ? ksoftirqd_should_run+0x30/0x30 [ 93.477310] run_ksoftirqd+0x1f/0x40 [ 93.480997] smpboot_thread_fn+0x488/0x970 [ 93.485206] ? cpu_report_death+0x1e0/0x1e0 [ 93.489502] kthread+0x539/0x720 [ 93.492841] ? cpu_report_death+0x1e0/0x1e0 [ 93.497137] ? kthread_blkcg+0xf0/0xf0 [ 93.500995] ret_from_fork+0x35/0x40 [ 93.505070] Dumping ftrace buffer: [ 93.508586] (ftrace buffer empty) [ 93.512271] Kernel Offset: disabled [ 93.515880] Rebooting in 86400 seconds..