INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.7' (ECDSA) to the list of known hosts. 2018/04/12 13:05:43 fuzzer started 2018/04/12 13:05:43 dialing manager at 10.128.0.26:41677 2018/04/12 13:05:50 kcov=true, comps=false 2018/04/12 13:05:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x4, 0x0, 0x7f}]}) 2018/04/12 13:05:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000240)=[{0x10, 0x29, 0xb, '+'}], 0x10}}], 0x2, 0x0) 2018/04/12 13:05:53 executing program 7: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/184) 2018/04/12 13:05:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000012f70), 0x0, &(0x7f0000000000)=[{0x10, 0x29, 0x5, "27020201"}], 0x10}, 0x0) 2018/04/12 13:05:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x8, 0x35aa}, 0x0) 2018/04/12 13:05:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00') 2018/04/12 13:05:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 2018/04/12 13:05:53 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7006) syzkaller login: [ 43.524442] ip (3730) used greatest stack depth: 54688 bytes left [ 44.920378] ip (3866) used greatest stack depth: 54200 bytes left [ 46.928195] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.058354] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.098652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.274230] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.354298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.371690] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.421643] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.441910] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.630106] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.874703] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.991611] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.009845] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.065713] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.192494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.257904] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.377252] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.383543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.398921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.528366] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.597454] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.603719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.614625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.730350] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.736674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.756581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.797344] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.803690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.818546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.870243] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.876505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.890675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.996784] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.003312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.018613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.052308] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.058942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.083812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.305350] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.313137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.328627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 13:06:10 executing program 0: 2018/04/12 13:06:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 2018/04/12 13:06:10 executing program 4: 2018/04/12 13:06:10 executing program 7: 2018/04/12 13:06:10 executing program 6: 2018/04/12 13:06:10 executing program 2: 2018/04/12 13:06:10 executing program 5: 2018/04/12 13:06:10 executing program 3: 2018/04/12 13:06:10 executing program 7: 2018/04/12 13:06:10 executing program 3: 2018/04/12 13:06:10 executing program 0: 2018/04/12 13:06:10 executing program 6: 2018/04/12 13:06:11 executing program 4: 2018/04/12 13:06:11 executing program 2: 2018/04/12 13:06:11 executing program 5: 2018/04/12 13:06:11 executing program 7: 2018/04/12 13:06:11 executing program 1: 2018/04/12 13:06:11 executing program 0: 2018/04/12 13:06:11 executing program 3: 2018/04/12 13:06:11 executing program 5: 2018/04/12 13:06:11 executing program 6: 2018/04/12 13:06:11 executing program 2: 2018/04/12 13:06:11 executing program 4: 2018/04/12 13:06:11 executing program 1: 2018/04/12 13:06:11 executing program 7: 2018/04/12 13:06:11 executing program 3: 2018/04/12 13:06:11 executing program 0: 2018/04/12 13:06:11 executing program 4: 2018/04/12 13:06:11 executing program 5: 2018/04/12 13:06:11 executing program 6: 2018/04/12 13:06:11 executing program 2: 2018/04/12 13:06:11 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0), 0x352, 0x0) 2018/04/12 13:06:11 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0300000000000000bb110a3ca96209c5fd887acb2fe29f0533a84a5b8ee2f9acb5b749cbd3c5e6c7fe5c95bf564001c0dd44dd598c3c76f527b28d4ce322274c58163238a2a37a91dedded8ff3f388ad90ebe70f63c3306b2201d9712d09c668622974331376e1b1387e29f26fba6f38da34052dbddfc65f08b315188cb4167479b6c8dab8c049820f3de528be473b9d4ad0fa2f9654b9c2abfc916ede62c548c7c732489610ed5df16048465edd78264bb75efa0500000000000000a2a220ec326bef0db41ccfc72b527fd9910e3456b50e6f1cfc242160c1b29b128fc5aa914349a6ef9a9e55e5fe71d9b7bf9946ee7fe955b06643085d98fcf33f945d363d00403bb805c6dc7e5f30ee18b60491b2fbe4967070ea4c69adbcb22fb16cae700acd7c6c45a4166e57c47a22d4e9c77d789067a7ef1c712ce12e71a92571619170895a722c9fb6412ccfeafd3c63f500000000000000000000000075d2047e1b9d5e6c69a0d64a3993ac15b09cacbe263fadc9"], 0x1, 0x800) msgrcv(r0, &(0x7f0000000100)={0x0, ""/221}, 0xe5, 0x0, 0x0) 2018/04/12 13:06:11 executing program 2: msgrcv(0x0, &(0x7f0000000100)={0x0, ""/221}, 0xe5, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000000), 0x8, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/4) 2018/04/12 13:06:11 executing program 3: r0 = socket$inet6(0xa, 0x80005, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x4, 0xb1}, 0x98) 2018/04/12 13:06:11 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00000001c0)='\\', 0x1, 0x4004000, &(0x7f00000011c0)={0x2}, 0x10) 2018/04/12 13:06:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540)=[{0x10, 0x84, 0x9}], 0x10}, 0x0) 2018/04/12 13:06:11 executing program 1: 2018/04/12 13:06:11 executing program 6: 2018/04/12 13:06:11 executing program 6: 2018/04/12 13:06:11 executing program 1: 2018/04/12 13:06:11 executing program 2: 2018/04/12 13:06:11 executing program 3: 2018/04/12 13:06:12 executing program 4: 2018/04/12 13:06:12 executing program 7: 2018/04/12 13:06:12 executing program 0: 2018/04/12 13:06:12 executing program 5: 2018/04/12 13:06:12 executing program 6: 2018/04/12 13:06:12 executing program 1: 2018/04/12 13:06:12 executing program 2: 2018/04/12 13:06:12 executing program 3: 2018/04/12 13:06:12 executing program 4: 2018/04/12 13:06:12 executing program 7: 2018/04/12 13:06:12 executing program 5: 2018/04/12 13:06:12 executing program 6: 2018/04/12 13:06:12 executing program 0: 2018/04/12 13:06:12 executing program 3: 2018/04/12 13:06:12 executing program 5: 2018/04/12 13:06:12 executing program 2: 2018/04/12 13:06:12 executing program 0: 2018/04/12 13:06:12 executing program 4: 2018/04/12 13:06:12 executing program 1: 2018/04/12 13:06:12 executing program 7: 2018/04/12 13:06:12 executing program 6: 2018/04/12 13:06:12 executing program 3: 2018/04/12 13:06:12 executing program 2: 2018/04/12 13:06:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000000)={0x14, 0x18, 0x1, 0x0, 0x0, {0x200000001}}, 0x14}, 0x1}, 0x0) 2018/04/12 13:06:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x19b, &(0x7f0000000140)=[{0xffffffffffffffcc}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$3(0x3) 2018/04/12 13:06:12 executing program 7: r0 = socket(0x1f, 0x80003, 0x1) sendmsg$kcm(r0, &(0x7f0000005bc0)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x80, &(0x7f0000002640), 0x0, &(0x7f0000002700)}, 0x1) 2018/04/12 13:06:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/12 13:06:12 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00005a8000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)) 2018/04/12 13:06:12 executing program 1: 2018/04/12 13:06:12 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r4 = dup2(r3, r3) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)=0x8) read(r3, &(0x7f0000000080)=""/206, 0x7a8) r5 = syz_open_pts(r4, 0x0) ioctl$TCFLSH(r5, 0x540b, 0x0) 2018/04/12 13:06:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x75, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) 2018/04/12 13:06:12 executing program 7: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 60.873244] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 13:06:12 executing program 5: personality(0x400000) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) 2018/04/12 13:06:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000026000)={0x10}, 0xc, &(0x7f0000016ff0)={&(0x7f000091df30)={0x14, 0x37, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 2018/04/12 13:06:13 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000000) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f000029a000/0x3000)=nil) unshare(0xc000000) 2018/04/12 13:06:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, 0x0, 0x2, 0x0, "135bd411f000bdcea594bf4d688337b90771fe6f6148b91b2f60b627740dfa14d655a58cd23414230bd58b2769ce895f530afcc74065696b9db2b8c89d135802b3eb5c58e44230bde614728db81cdd9f"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0xbb}}, 0x1c) 2018/04/12 13:06:13 executing program 6: mknod(&(0x7f0000000000)='./file0\x00', 0xc000, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x2, 0x0) 2018/04/12 13:06:13 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000ff4ea0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6, @in=@multicast2=0xe0000002}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x6c}, @in6=@loopback={0x0, 0x1}, {}, {}, {}, 0x0, 0x0, 0x2, 0x3}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/12 13:06:13 executing program 2: seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/12 13:06:13 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065b000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha3-384)\x00'}, 0x58) close(r0) 2018/04/12 13:06:13 executing program 5: r0 = socket$inet(0x11, 0xa, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3}, {0x6}]}, 0x10) 2018/04/12 13:06:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x8000000000002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) chown(&(0x7f0000000340)='./file0\x00', r1, r2) 2018/04/12 13:06:13 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x400000000114, 0x6, &(0x7f0000001000), 0x6d) 2018/04/12 13:06:13 executing program 6: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/12 13:06:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000080)="1f0000002f000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) 2018/04/12 13:06:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x3, 0x0, 0x2, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 62.104434] audit: type=1326 audit(1523538374.103:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x50000 [ 62.221115] audit: type=1326 audit(1523538374.131:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x50000 [ 62.240800] audit: type=1326 audit(1523538374.137:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45809a code=0x50000 [ 62.260431] audit: type=1326 audit(1523538374.137:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x50000 [ 62.280066] audit: type=1326 audit(1523538374.137:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45809a code=0x50000 [ 62.299753] audit: type=1326 audit(1523538374.137:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x50000 [ 62.319369] audit: type=1326 audit(1523538374.137:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45809a code=0x50000 [ 62.338981] audit: type=1326 audit(1523538374.138:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x50000 [ 62.358694] audit: type=1326 audit(1523538374.141:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45809a code=0x50000 [ 62.378394] audit: type=1326 audit(1523538374.141:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5313 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x50000 2018/04/12 13:06:15 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) 2018/04/12 13:06:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x6c}, {0x6}]}, 0x10) 2018/04/12 13:06:15 executing program 1: socketpair$unix(0x1, 0x40008000000005, 0x0, &(0x7f00005b8ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netrom(r0, &(0x7f0000140fc8)={&(0x7f0000286ff0)=@ax25={0x3, {"091a149b4ef005"}}, 0x10, &(0x7f0000b71fc0)}, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) 2018/04/12 13:06:15 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000140)}}, {{&(0x7f0000000680)=@hci={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000080)=[{0x10, 0x10d, 0x20000007}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:15 executing program 6: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4f}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x7, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@ldst={0x3, 0x0, 0xb, 0x1}], {0x95}}, &(0x7f00005fc000)='GPL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x25) 2018/04/12 13:06:15 executing program 5: socket$inet_icmp(0x2, 0x2, 0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x800000000001, 0x4032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000838fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) readv(r0, &(0x7f0000debfd8)=[{&(0x7f000014e671)=""/138, 0x8a}], 0x1) futex(&(0x7f0000012ffc), 0x0, 0x0, &(0x7f0000000000), &(0x7f00003cfffc), 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000f8d000)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/04/12 13:06:15 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'vlan0\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'syzkaller0\x00', 0x600}) 2018/04/12 13:06:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x40045436, &(0x7f0000000040)) 2018/04/12 13:06:15 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000002f80)="af92b02946cc7574aa8e5ab7acd3d6614713177f7e6614cd", 0x18}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/04/12 13:06:15 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) 2018/04/12 13:06:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000c6c000)={0x3, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/04/12 13:06:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000401fea)='net/ip_tables_matches\x00') r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000301ff8), 0xffffffff) 2018/04/12 13:06:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x8b0f, &(0x7f0000000140)={"6970365f767469300000000000f700", @ifru_mtu}) 2018/04/12 13:06:15 executing program 7: socket$netlink(0x10, 0x3, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, "e91f7189591e9233614b00"}, 0x6e) r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0x10c1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/12 13:06:15 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000140)}}, {{&(0x7f0000000680)=@hci={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000080)=[{0x10, 0x10d, 0x20000007}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:15 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$user(&(0x7f0000c24ffb)='user\x00', &(0x7f00003ebffb)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000d6c000)="0000000000000001e3a255ec4a8d9d652d0536c67b9695cfb4c29da627ab9e5e0587e50ec159997396abc344a7d9f563a3e3af2d90a5dfcade859e4717cdf8f03fdf022186424d68996f51a7b3f20108f152bfd57ac5a50be84a106249d0216d5c98c41df97cd7d5032e9c632e4715a226907aabbfc5b3f2e96bf3039474801053b87fbf8674e100", 0x88, r1) r2 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='u', 0x1, r1) r3 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="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", 0x101, r1) r4 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r2, r3, r4}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) 2018/04/12 13:06:15 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x8, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10, 0x10d, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:15 executing program 3: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='./file0\x00', &(0x7f0000001180)='overlay\x00', 0x0, 0x0) 2018/04/12 13:06:15 executing program 4: timer_create(0xfffffffffffffffd, &(0x7f0000c00000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) 2018/04/12 13:06:15 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x5101, &(0x7f0000000000)) 2018/04/12 13:06:16 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000140)}}, {{&(0x7f0000000680)=@hci={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000080)=[{0x10, 0x10d, 0x20000007}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 0: r0 = socket(0x1f, 0x1, 0x0) shutdown(r0, 0x0) clock_gettime(0x0, &(0x7f0000006480)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x30, &(0x7f0000005e80), 0x0, &(0x7f0000005ec0)}}, {{&(0x7f0000005f00)=@hci, 0x80, &(0x7f0000006180), 0x10000000000001c2, &(0x7f00000000c0)=""/56, 0x38}}], 0x2, 0x0, &(0x7f00000064c0)={0x0, r1+10000000}) recvfrom$unix(r0, &(0x7f0000000100)=""/10, 0xa, 0x0, 0x0, 0x0) 2018/04/12 13:06:16 executing program 4: mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x0, 0x10000032, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000016c0)=[{&(0x7f00000015c0)}], 0x0) 2018/04/12 13:06:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x8, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10, 0x10d, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x8, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10, 0x10d, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000174000/0x1000)=nil, 0x1000, 0xe) 2018/04/12 13:06:16 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f000087bd32)={0x14, 0x18, 0xffffffffffffffff, 0x0, 0x0, {0x19}}, 0x14}, 0x1}, 0x0) 2018/04/12 13:06:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000640)="2400000010001f001cfffd946fa2830020200a000900020002e7fcffffffa3a20404ff7e", 0x24}], 0x1}, 0x0) [ 64.300211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/12 13:06:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2270, &(0x7f0000007000)) 2018/04/12 13:06:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fchmod(r0, 0x0) 2018/04/12 13:06:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x100000000000117f}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x0, 0x48, 0x0, 0x90ffffff}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/12 13:06:16 executing program 6: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r1, &(0x7f0000458000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000def000)={0x0, 0x0, 0x0, 0x0, @time={0x77359400}}}}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @quote={{}, 0x0, &(0x7f00008e3000)={0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @quote={{}, 0x0, &(0x7f00004f8000)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0xff9a) recvmmsg(r0, &(0x7f0000002a00)=[{{&(0x7f0000002640)=@vsock, 0x10, &(0x7f00000028c0)=[{&(0x7f00000027c0)=""/196, 0xc4}], 0x1, &(0x7f0000002940)=""/154, 0x9a}}], 0x1, 0x0, &(0x7f0000002ac0)) [ 64.414526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/12 13:06:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x8, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10, 0x10d, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000140)}}, {{&(0x7f0000000680)=@hci={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000080)=[{0x10, 0x10d, 0x20000007}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x81}, 0x8) 2018/04/12 13:06:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000180)=""/17, 0x11}, {&(0x7f00000001c0)=""/174, 0xae}], 0x2) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/12 13:06:16 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000002000)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x38, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x29, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}, [], "a82f7ae1cd16d2e2"}}}}}}}, &(0x7f0000000000)) 2018/04/12 13:06:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f0000830000)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/12 13:06:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff690}, 0x20) write$eventfd(r1, &(0x7f0000605ff8), 0xfd73) 2018/04/12 13:06:16 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f00000003c0)=@ethtool_sset_info={0xa}}) 2018/04/12 13:06:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x8, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10, 0x10d, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000140)}}, {{&(0x7f0000000680)=@hci={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000080)=[{0x10, 0x10d, 0x20000007}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:16 executing program 6: set_mempolicy(0x2, &(0x7f0000000000)=0x81, 0x8001) unshare(0x20000400) clone(0x30020100, &(0x7f00002c9000), &(0x7f0000d70ffc), &(0x7f00001cc000), &(0x7f0000154000)) 2018/04/12 13:06:16 executing program 7: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffffffffff80, 0x1}, 0x10) close(r1) 2018/04/12 13:06:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r0, 0x1) sendto$inet(r0, &(0x7f0000001ac0)='|', 0x1, 0x0, &(0x7f0000001b80)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/12 13:06:16 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000fcdfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x72) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='bcsf0\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x40082406, &(0x7f0000003780)={'bcsf0\x00'}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 2018/04/12 13:06:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x8, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10, 0x10d, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:17 executing program 5: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={"252574ffab00", 0x19, 0x2, 0x358, [0x20000400, 0x0, 0x0, 0x200006f8, 0x20000728], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'ifb0\x00', 'nr0\x00', 'dummy0\x00', 'sit0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xc0, 0xf8}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x13}}}}}, {{{0x13, 0x0, 0x0, 'bond0\x00', 'nr0\x00', 'vlan0\x00', 'ipddp0\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x70, 0x1a0, 0x1d0}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x0, 'system_u:object_r:restorecond_var_run_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x3d0) 2018/04/12 13:06:17 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) connect$inet(0xffffffffffffffff, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000140)}}, {{&(0x7f0000000680)=@hci={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000080)=[{0x10, 0x10d, 0x20000007}], 0x10}}], 0x2, 0x0) 2018/04/12 13:06:17 executing program 7: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffffffffff80, 0x1}, 0x10) close(r1) 2018/04/12 13:06:17 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) [ 65.626332] ================================================================== [ 65.633731] BUG: KMSAN: uninit-value in csum_partial_copy_to_user+0x450/0x500 [ 65.640986] CPU: 1 PID: 5472 Comm: syz-executor0 Not tainted 4.16.0+ #83 [ 65.647797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.657126] Call Trace: [ 65.659701] dump_stack+0x185/0x1d0 [ 65.663321] ? csum_partial_copy_to_user+0x450/0x500 [ 65.668409] kmsan_report+0x142/0x240 [ 65.672195] __msan_warning_32+0x6c/0xb0 [ 65.676245] csum_partial_copy_to_user+0x450/0x500 [ 65.681180] csum_and_copy_to_iter+0x3dc/0x2140 [ 65.685829] ? kmsan_set_origin_inline+0x6b/0x120 [ 65.690661] ? __msan_poison_alloca+0x15c/0x1d0 [ 65.695342] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 65.700437] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 65.705795] udpv6_recvmsg+0xc65/0x29e0 [ 65.709760] ? udp6_lib_lookup_skb+0x240/0x240 [ 65.714322] inet_recvmsg+0x4c2/0x5f0 [ 65.718099] ? inet_sendpage+0x8c0/0x8c0 [ 65.722154] sock_read_iter+0x405/0x480 [ 65.726119] ? kernel_sock_ip_overhead+0x350/0x350 [ 65.731027] do_iter_readv_writev+0x7bb/0x970 [ 65.735507] ? kernel_sock_ip_overhead+0x350/0x350 [ 65.740418] do_iter_read+0x303/0xd70 [ 65.744213] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 65.749651] do_readv+0x295/0x5f0 [ 65.753084] ? syscall_return_slowpath+0xe9/0x700 [ 65.757906] SYSC_readv+0x9b/0xb0 [ 65.761348] SyS_readv+0x56/0x80 [ 65.764705] do_syscall_64+0x309/0x430 [ 65.768588] ? vfs_readv+0x260/0x260 [ 65.772294] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 65.777465] RIP: 0033:0x455279 [ 65.780645] RSP: 002b:00007f89128e6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 65.788332] RAX: ffffffffffffffda RBX: 00007f89128e76d4 RCX: 0000000000455279 [ 65.795580] RDX: 0000000000000002 RSI: 0000000020000280 RDI: 0000000000000013 [ 65.802832] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 65.810082] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 65.817329] R13: 000000000000048c R14: 00000000006f9dc0 R15: 0000000000000000 [ 65.824576] [ 65.826191] Uninit was created at: [ 65.829729] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 65.834725] kmsan_alloc_page+0x82/0xe0 [ 65.838683] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 65.843415] alloc_pages_current+0x6b5/0x970 [ 65.847803] skb_page_frag_refill+0x3ba/0x5e0 [ 65.852620] sk_page_frag_refill+0xa4/0x340 [ 65.856916] __ip6_append_data+0x1a20/0x4bb0 [ 65.861303] ip6_append_data+0x40e/0x6b0 [ 65.865339] udpv6_sendmsg+0xfd5/0x45b0 [ 65.869299] inet_sendmsg+0x48d/0x740 [ 65.873101] ___sys_sendmsg+0xec0/0x1310 [ 65.877154] SYSC_sendmsg+0x2a3/0x3d0 [ 65.880934] SyS_sendmsg+0x54/0x80 [ 65.884453] do_syscall_64+0x309/0x430 [ 65.888318] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 65.893477] ================================================================== [ 65.900807] Disabling lock debugging due to kernel taint [ 65.906233] Kernel panic - not syncing: panic_on_warn set ... [ 65.906233] [ 65.913574] CPU: 1 PID: 5472 Comm: syz-executor0 Tainted: G B 4.16.0+ #83 [ 65.921687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.931018] Call Trace: [ 65.933596] dump_stack+0x185/0x1d0 [ 65.937204] panic+0x39d/0x940 [ 65.940405] ? csum_partial_copy_to_user+0x450/0x500 [ 65.945497] kmsan_report+0x238/0x240 [ 65.949275] __msan_warning_32+0x6c/0xb0 [ 65.953315] csum_partial_copy_to_user+0x450/0x500 [ 65.958229] csum_and_copy_to_iter+0x3dc/0x2140 [ 65.962888] ? kmsan_set_origin_inline+0x6b/0x120 [ 65.967718] ? __msan_poison_alloca+0x15c/0x1d0 [ 65.972370] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 65.977471] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 65.982826] udpv6_recvmsg+0xc65/0x29e0 [ 65.986792] ? udp6_lib_lookup_skb+0x240/0x240 [ 65.991350] inet_recvmsg+0x4c2/0x5f0 [ 65.995131] ? inet_sendpage+0x8c0/0x8c0 [ 65.999176] sock_read_iter+0x405/0x480 [ 66.003151] ? kernel_sock_ip_overhead+0x350/0x350 [ 66.008075] do_iter_readv_writev+0x7bb/0x970 [ 66.012561] ? kernel_sock_ip_overhead+0x350/0x350 [ 66.017473] do_iter_read+0x303/0xd70 [ 66.021260] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 66.026697] do_readv+0x295/0x5f0 [ 66.030133] ? syscall_return_slowpath+0xe9/0x700 [ 66.034971] SYSC_readv+0x9b/0xb0 [ 66.038402] SyS_readv+0x56/0x80 [ 66.041744] do_syscall_64+0x309/0x430 [ 66.045611] ? vfs_readv+0x260/0x260 [ 66.049314] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.054485] RIP: 0033:0x455279 [ 66.057648] RSP: 002b:00007f89128e6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 66.065335] RAX: ffffffffffffffda RBX: 00007f89128e76d4 RCX: 0000000000455279 [ 66.072581] RDX: 0000000000000002 RSI: 0000000020000280 RDI: 0000000000000013 [ 66.079834] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 66.087094] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 66.094357] R13: 000000000000048c R14: 00000000006f9dc0 R15: 0000000000000000 [ 66.102085] Dumping ftrace buffer: [ 66.105604] (ftrace buffer empty) [ 66.109283] Kernel Offset: disabled [ 66.112884] Rebooting in 86400 seconds..