INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.45' (ECDSA) to the list of known hosts. 2018/04/21 15:12:37 fuzzer started 2018/04/21 15:12:38 dialing manager at 10.128.0.26:42949 syzkaller login: [ 47.824824] can: request_module (can-proto-0) failed. [ 47.836338] can: request_module (can-proto-0) failed. 2018/04/21 15:12:44 kcov=true, comps=false 2018/04/21 15:12:47 executing program 0: 2018/04/21 15:12:47 executing program 2: 2018/04/21 15:12:47 executing program 7: 2018/04/21 15:12:47 executing program 1: 2018/04/21 15:12:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mknod$loop(&(0x7f0000000100)='../file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 2018/04/21 15:12:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x5b) 2018/04/21 15:12:47 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020300000e000000000000000000000005000600000000000a0000000000dc0000000000000000000000000000000000000000000000000002000100000000000000fbffffffff0005000500000000000a00000000000000fe80004c68ff03fff2a0ea191e000000000000000000000000ff0000000000000000"], 0x7a}, 0x1}, 0x0) 2018/04/21 15:12:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000002a00)='lo\x00', 0x10) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) [ 52.375808] IPVS: ftp: loaded support on port[0] = 21 [ 52.480650] IPVS: ftp: loaded support on port[0] = 21 [ 52.535456] IPVS: ftp: loaded support on port[0] = 21 [ 52.608468] IPVS: ftp: loaded support on port[0] = 21 [ 52.719294] IPVS: ftp: loaded support on port[0] = 21 [ 52.821433] IPVS: ftp: loaded support on port[0] = 21 [ 52.965736] IPVS: ftp: loaded support on port[0] = 21 [ 53.116873] IPVS: ftp: loaded support on port[0] = 21 [ 54.279527] ip (4651) used greatest stack depth: 54312 bytes left [ 54.495403] ip (4665) used greatest stack depth: 53928 bytes left [ 55.629172] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.635671] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.676189] device bridge_slave_0 entered promiscuous mode [ 55.733230] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.740410] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.758256] device bridge_slave_0 entered promiscuous mode [ 55.860795] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.867324] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.913444] device bridge_slave_1 entered promiscuous mode [ 55.959075] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.965599] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.007243] device bridge_slave_0 entered promiscuous mode [ 56.036806] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.043301] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.051860] device bridge_slave_1 entered promiscuous mode [ 56.079566] ip (4786) used greatest stack depth: 53656 bytes left [ 56.081639] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.092341] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.107922] device bridge_slave_0 entered promiscuous mode [ 56.143834] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.198422] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.204933] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.248222] device bridge_slave_1 entered promiscuous mode [ 56.282615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.345898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.374473] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.381008] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.405259] device bridge_slave_1 entered promiscuous mode [ 56.438209] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.444803] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.478340] device bridge_slave_0 entered promiscuous mode [ 56.504707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.512267] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.518760] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.537462] device bridge_slave_0 entered promiscuous mode [ 56.586223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.601897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.618967] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.625589] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.674219] device bridge_slave_0 entered promiscuous mode [ 56.710359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.723398] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.730128] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.768618] device bridge_slave_1 entered promiscuous mode [ 56.784672] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.791171] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.808486] device bridge_slave_0 entered promiscuous mode [ 56.824275] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.830804] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.849105] device bridge_slave_1 entered promiscuous mode [ 56.871617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.902390] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.908908] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.926178] device bridge_slave_1 entered promiscuous mode [ 56.978449] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.984976] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.021840] device bridge_slave_1 entered promiscuous mode [ 57.037119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.083959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.094173] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.126626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.235486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.243878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.307828] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.324141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.338710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.353322] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.381565] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.501961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.521588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.535708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.601416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.612938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.641606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.679923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.686929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.821903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.835397] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.843130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.902912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.911163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.956137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.970124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.977231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.012793] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.033259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.040314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.114607] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.170936] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.218567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.226203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.242163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.258463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.265949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.282239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.399605] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.424280] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.521851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.531365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.553411] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.572223] team0: Port device team_slave_0 added [ 58.591367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.601872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.631315] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.643251] team0: Port device team_slave_0 added [ 58.652825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.659904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.720238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.727688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.753144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.760181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.798430] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.823925] team0: Port device team_slave_1 added [ 58.850228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.863326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.890057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.897551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.912367] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.934857] team0: Port device team_slave_1 added [ 58.956919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.965248] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.984288] team0: Port device team_slave_0 added [ 59.012425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.034434] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.050638] team0: Port device team_slave_0 added [ 59.072450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.080576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.089885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.154060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.163143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.179507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.220788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.247926] team0: Port device team_slave_1 added [ 59.278438] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.308204] team0: Port device team_slave_1 added [ 59.327219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.340662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.358806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.409958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.430930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.449241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.477553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.504626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.549309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.587956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.596093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.604933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.633715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.642476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.666166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.679648] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.691481] team0: Port device team_slave_0 added [ 59.697513] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.712636] team0: Port device team_slave_0 added [ 59.718335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.726788] team0: Port device team_slave_0 added [ 59.759833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.768843] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.784633] team0: Port device team_slave_0 added [ 59.798424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.819831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.847142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.854553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.875996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.896906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.904664] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.911973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.921386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.947490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.956896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.984436] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.000118] team0: Port device team_slave_1 added [ 60.007607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.014985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.026285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.043873] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.052548] team0: Port device team_slave_1 added [ 60.066683] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.079746] team0: Port device team_slave_1 added [ 60.087086] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.106263] team0: Port device team_slave_1 added [ 60.123176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.130649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.142637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.187083] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.195798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.214237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.250289] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.260233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.276379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.299853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.306932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.326531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.352610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.360431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.372540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.384109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.428198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.452810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.478865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.503460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.512339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.546672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.561676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.569643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.577318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.599144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.630923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.656251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.677670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.702314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.713434] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.736093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.757928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.765957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.790623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.824239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.858377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.871869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.882496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.900334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.907730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.921445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.959955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.975887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.984345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.994395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.037188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.072262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.095591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.120774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.145416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.172511] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.195147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.221387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.246710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.261249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.285308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.314465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.344832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.363264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.500386] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.506920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.513840] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.520317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.555848] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.562818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.718018] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.725282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.732226] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.738713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.780245] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.055565] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.062121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.068982] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.075442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.116205] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.256926] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.263435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.270396] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.276856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.340390] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.574200] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.580729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.587603] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.594152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.659677] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.667702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.676743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.690502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.698961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.710538] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.717004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.723872] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.730298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.739434] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.770524] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.777093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.783911] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.790370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.835309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.846834] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.853313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.860191] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.866651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.909790] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.673373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.692002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.720570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.770502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.916709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.066917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.427386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.545351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.599504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.652304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.674565] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.806560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.822591] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.878545] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.228917] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.367917] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.443169] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.499475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.531933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.538271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.555449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.636770] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.649320] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.655682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.671851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.717150] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.723530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.738285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.134980] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.141337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.157381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.279538] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.285876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.296905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.360905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.367280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.380898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.411755] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.421341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.427724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.439886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.461790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.478572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.523175] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.548404] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.762376] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.032368] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.191662] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.217954] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.266337] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.303433] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/21 15:13:15 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}]}, 0x60}, 0x1}, 0x0) 2018/04/21 15:13:15 executing program 1: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/21 15:13:15 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000001400)=[{&(0x7f0000001640)="9160e6cc9f710fe1efc864b809de156a25b6793fcc1b1feaabfa50f0ab31307cf0eb8c9564af0bebc606668ca44d9a51cec6f48b0beb7a6039911e08575b5f283e3d8748cc10f181f04dcd1e754c3b782c095687afde4619c44adeea11ee77576852e4f1f6076e3631e24fcb53d6bda1fc7344235777287874e337701adf00c8ebc9df8304887eb8ecffffff7f000000002fb279d81ea07e138524a39ea3c5d846098ec492c22eeb60c348804f4ede2f4a5c43deec518e5e98236fcf99457e044b13d55063d0f023ff0ab0433770a3dc413ba4824c05e2bb0f4153ca6bcb", 0xde, 0xda}, {&(0x7f0000000240)="c931fd2dd8d004692c9ca543a0c733fd8bfcd30b8cc3e96ceff964b0a18862ac66544bb435db71fdea61fe73f678d0457d1db59ed444b232617b4000f948e44cc4b17ff6c4da5af02c5f04f30d7d48b47c813e89cdbf207118cf5ad64c678819c50c9dd2da1e723e688940057a8e4e14af2397a818acf4ddb5ade2603937c2f1461b0b746b56800226eaecc6eeebee2499af7ca83c21f9983e7e60c4f39c9680e79d", 0xa2, 0x1}, {&(0x7f0000001300)="f2610e90ed35b23921e038a88b3c0418b09d4fe899002c9306ef486975d5b7cfbfe8af23ce2d4fcf6f1f341e6a113586b175276158d25726b398490b8175c63693a35f82502812b1f69568144c2661df45bee184e479fed5e95d61f7b03313fbcf8003afcde60bad816e28ed7a2dcacfbdaa308021ec75c378ece4b964371d446e0b0b93b3854054ab708baee5aeca6e20e2585a6dbce6c1f2608fb4473f24bcd05aebc651eddb5479206ddd8b507e3b9b64b4a60a730a850a962a45c245099586f16f80bb966b2e728ec1001cc33d3209a7483540e795bc89854218ac2c1d6cb01f387e8550e7981f3e720071901679d57f9234e45018fe", 0xf8}], 0x8, &(0x7f0000001480)) 2018/04/21 15:13:16 executing program 2: mkdir(&(0x7f0000330000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000e1bff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, &(0x7f0000bd9fff)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x19034, &(0x7f0000000740)=ANY=[]) 2018/04/21 15:13:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000001280)="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", 0x20d, 0x0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000c40)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000004ac0)=ANY=[@ANYBLOB="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"], 0x949) 2018/04/21 15:13:16 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000001400)=[{&(0x7f0000001640)="9160e6cc9f710fe1efc864b809de156a25b6793fcc1b1feaabfa50f0ab31307cf0eb8c9564af0bebc606668ca44d9a51cec6f48b0beb7a6039911e08575b5f283e3d8748cc10f181f04dcd1e754c3b782c095687afde4619c44adeea11ee77576852e4f1f6076e3631e24fcb53d6bda1fc7344235777287874e337701adf00c8ebc9df8304887eb8ecffffff7f000000002fb279d81ea07e138524a39ea3c5d846098ec492c22eeb60c348804f4ede2f4a5c43deec518e5e98236fcf99457e044b13d55063d0f023ff0ab0433770a3dc413ba4824c05e2bb0f4153ca6bcb", 0xde, 0xda}, {&(0x7f0000000240)="c931fd2dd8d004692c9ca543a0c733fd8bfcd30b8cc3e96ceff964b0a18862ac66544bb435db71fdea61fe73f678d0457d1db59ed444b232617b4000f948e44cc4b17ff6c4da5af02c5f04f30d7d48b47c813e89cdbf207118cf5ad64c678819c50c9dd2da1e723e688940057a8e4e14af2397a818acf4ddb5ade2603937c2f1461b0b746b56800226eaecc6eeebee2499af7ca83c21f9983e7e60c4f39c9680e79d", 0xa2, 0x1}, {&(0x7f0000001300)="f2610e90ed35b23921e038a88b3c0418b09d4fe899002c9306ef486975d5b7cfbfe8af23ce2d4fcf6f1f341e6a113586b175276158d25726b398490b8175c63693a35f82502812b1f69568144c2661df45bee184e479fed5e95d61f7b03313fbcf8003afcde60bad816e28ed7a2dcacfbdaa308021ec75c378ece4b964371d446e0b0b93b3854054ab708baee5aeca6e20e2585a6dbce6c1f2608fb4473f24bcd05aebc651eddb5479206ddd8b507e3b9b64b4a60a730a850a962a45c245099586f16f80bb966b2e728ec1001cc33d3209a7483540e795bc89854218ac2c1d6cb01f387e8550e7981f3e720071901679d57f9234e45018fe", 0xf8}], 0x8, &(0x7f0000001480)) 2018/04/21 15:13:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x6, 0x1, 0x2}, &(0x7f0000000100)=0x10) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) dup2(r1, r0) 2018/04/21 15:13:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/21 15:13:17 executing program 0: r0 = socket(0x1, 0x2000000000000005, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={"62726964676530000000fbef00", &(0x7f0000000080)=ANY=[@ANYBLOB='\r']}) 2018/04/21 15:13:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x5b) 2018/04/21 15:13:17 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') readv(r0, &(0x7f0000000340)=[{&(0x7f0000000040)=""/97, 0x61}], 0x1) 2018/04/21 15:13:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000200)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in, @in=@loopback=0x7f000001}, {@in=@loopback=0x7f000001, 0x0, 0x32}, @in6=@mcast2={0xff, 0x2, [], 0x1}}, 0x0, 0xf0ffffffffffff}}, 0xf8}, 0x1}, 0x0) 2018/04/21 15:13:17 executing program 2: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000001000)={0x1}, 0x8, 0x0) clone(0x0, &(0x7f00007ae000), &(0x7f0000fb0ffc), &(0x7f0000aa5ffc), &(0x7f00007ce000)) msgctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 2018/04/21 15:13:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef010001000000e95dbe5a00000000000000000100000000000000848d00008000000005000000000000007659", 0x66, 0x400}], 0x0, &(0x7f0000000040)={[{@discard='discard', 0x2c}]}) 2018/04/21 15:13:17 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000001400)=[{&(0x7f0000001640)="9160e6cc9f710fe1efc864b809de156a25b6793fcc1b1feaabfa50f0ab31307cf0eb8c9564af0bebc606668ca44d9a51cec6f48b0beb7a6039911e08575b5f283e3d8748cc10f181f04dcd1e754c3b782c095687afde4619c44adeea11ee77576852e4f1f6076e3631e24fcb53d6bda1fc7344235777287874e337701adf00c8ebc9df8304887eb8ecffffff7f000000002fb279d81ea07e138524a39ea3c5d846098ec492c22eeb60c348804f4ede2f4a5c43deec518e5e98236fcf99457e044b13d55063d0f023ff0ab0433770a3dc413ba4824c05e2bb0f4153ca6bcb", 0xde, 0xda}, {&(0x7f0000000240)="c931fd2dd8d004692c9ca543a0c733fd8bfcd30b8cc3e96ceff964b0a18862ac66544bb435db71fdea61fe73f678d0457d1db59ed444b232617b4000f948e44cc4b17ff6c4da5af02c5f04f30d7d48b47c813e89cdbf207118cf5ad64c678819c50c9dd2da1e723e688940057a8e4e14af2397a818acf4ddb5ade2603937c2f1461b0b746b56800226eaecc6eeebee2499af7ca83c21f9983e7e60c4f39c9680e79d", 0xa2, 0x1}, {&(0x7f0000001300)="f2610e90ed35b23921e038a88b3c0418b09d4fe899002c9306ef486975d5b7cfbfe8af23ce2d4fcf6f1f341e6a113586b175276158d25726b398490b8175c63693a35f82502812b1f69568144c2661df45bee184e479fed5e95d61f7b03313fbcf8003afcde60bad816e28ed7a2dcacfbdaa308021ec75c378ece4b964371d446e0b0b93b3854054ab708baee5aeca6e20e2585a6dbce6c1f2608fb4473f24bcd05aebc651eddb5479206ddd8b507e3b9b64b4a60a730a850a962a45c245099586f16f80bb966b2e728ec1001cc33d3209a7483540e795bc89854218ac2c1d6cb01f387e8550e7981f3e720071901679d57f9234e45018fe", 0xf8}], 0x8, &(0x7f0000001480)) 2018/04/21 15:13:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000001280)="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", 0x20d, 0x0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000c40)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000004ac0)=ANY=[@ANYBLOB="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"], 0x949) 2018/04/21 15:13:17 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x4], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) 2018/04/21 15:13:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, &(0x7f0000000380)=""/152, 0xc253) 2018/04/21 15:13:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f000047c000)=@newlink={0x34, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xfffffff0]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 15:13:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) dup2(0xffffffffffffffff, r0) 2018/04/21 15:13:17 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000001400)=[{&(0x7f0000001640)="9160e6cc9f710fe1efc864b809de156a25b6793fcc1b1feaabfa50f0ab31307cf0eb8c9564af0bebc606668ca44d9a51cec6f48b0beb7a6039911e08575b5f283e3d8748cc10f181f04dcd1e754c3b782c095687afde4619c44adeea11ee77576852e4f1f6076e3631e24fcb53d6bda1fc7344235777287874e337701adf00c8ebc9df8304887eb8ecffffff7f000000002fb279d81ea07e138524a39ea3c5d846098ec492c22eeb60c348804f4ede2f4a5c43deec518e5e98236fcf99457e044b13d55063d0f023ff0ab0433770a3dc413ba4824c05e2bb0f4153ca6bcb", 0xde, 0xda}, {&(0x7f0000000240)="c931fd2dd8d004692c9ca543a0c733fd8bfcd30b8cc3e96ceff964b0a18862ac66544bb435db71fdea61fe73f678d0457d1db59ed444b232617b4000f948e44cc4b17ff6c4da5af02c5f04f30d7d48b47c813e89cdbf207118cf5ad64c678819c50c9dd2da1e723e688940057a8e4e14af2397a818acf4ddb5ade2603937c2f1461b0b746b56800226eaecc6eeebee2499af7ca83c21f9983e7e60c4f39c9680e79d", 0xa2, 0x1}, {&(0x7f0000001300)="f2610e90ed35b23921e038a88b3c0418b09d4fe899002c9306ef486975d5b7cfbfe8af23ce2d4fcf6f1f341e6a113586b175276158d25726b398490b8175c63693a35f82502812b1f69568144c2661df45bee184e479fed5e95d61f7b03313fbcf8003afcde60bad816e28ed7a2dcacfbdaa308021ec75c378ece4b964371d446e0b0b93b3854054ab708baee5aeca6e20e2585a6dbce6c1f2608fb4473f24bcd05aebc651eddb5479206ddd8b507e3b9b64b4a60a730a850a962a45c245099586f16f80bb966b2e728ec1001cc33d3209a7483540e795bc89854218ac2c1d6cb01f387e8550e7981f3e720071901679d57f9234e45018fe", 0xf8}], 0x8, &(0x7f0000001480)) 2018/04/21 15:13:18 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) r1 = dup2(r0, r0) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000700)=0x80) socket$nl_route(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xa0000, 0x4) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000100)={@loopback, @dev}, &(0x7f0000000140)=0xc) r3 = geteuid() sendmsg$nl_xfrm(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x90100000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c4010000120026072abd7000ffdbdf25ff0200000000000000000005008bb3d5abb6d69ed7000001000004d302002b00e4000600e0000002000000000000000000fcec00fe8000000000000000000000060a00208084000000000020", @ANYRES32=r3, @ANYBLOB="00000000000000000000000000000000000004d432000000fe8000000000000000000000000000aa0004000000000000ff7f000000000000dc394551000000000200000000000000010000800000000001800000000000003f0000000000000007000000000000000300000000000000000000000000000000080000000000000080000000000000ead20000ff0000000100000029bd7000ff340000020003eb00000000000000000800190033000000240009003f000000000000009dbc0f0b0000000005000000000000004fd90000000000002c0017000400000026bd70002dbd700028bd700029bd700007000000030000000300000001800000547f00000c000f0008000000000000005400080050000800010548009b77744087042efdcc3c56d898ee62cf20a2d071c280ca23a8fdb66cca0638bfd063079b4e57c801f6654c0d2d96e021ee9f6e6f0a5a98dd247e4ef44e2f020c0fa73e3be99b0b31"], 0x3}, 0x1, 0x0, 0x0, 0x20048080}, 0x4000080) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x18c) 2018/04/21 15:13:18 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000001400)=[{&(0x7f0000000240)="c931fd2dd8d004692c9ca543a0c733fd8bfcd30b8cc3e96ceff964b0a18862ac66544bb435db71fdea61fe73f678d0457d1db59ed444b232617b4000f948e44cc4b17ff6c4da5af02c5f04f30d7d48b47c813e89cdbf207118cf5ad64c678819c50c9dd2da1e723e688940057a8e4e14af2397a818acf4ddb5ade2603937c2f1461b0b746b56800226eaecc6eeebee2499af7ca83c21f9983e7e60c4f39c9680e79d", 0xa2, 0x1}, {&(0x7f0000001300)="f2610e90ed35b23921e038a88b3c0418b09d4fe899002c9306ef486975d5b7cfbfe8af23ce2d4fcf6f1f341e6a113586b175276158d25726b398490b8175c63693a35f82502812b1f69568144c2661df45bee184e479fed5e95d61f7b03313fbcf8003afcde60bad816e28ed7a2dcacfbdaa308021ec75c378ece4b964371d446e0b0b93b3854054ab708baee5aeca6e20e2585a6dbce6c1f2608fb4473f24bcd05aebc651eddb5479206ddd8b507e3b9b64b4a60a730a850a962a45c245099586f16f80bb966b2e728ec1001cc33d3209a7483540e795bc89854218ac2c1d6cb01f387e8550e7981f3e720071901679d57f9234e45018fe", 0xf8}], 0x8, &(0x7f0000001480)) 2018/04/21 15:13:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x20e}, 0xfffffffffffffed4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x6f2000, 0x0, &(0x7f0000000180)) 2018/04/21 15:13:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000002200010000009e3ef200000004000000080011002f62f06e732499a96657d08765de44b8ecf6fd95"], 0x1}, 0x1}, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100), 0x4) 2018/04/21 15:13:18 executing program 7: perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) 2018/04/21 15:13:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000033c000)=ANY=[@ANYBLOB="021600000a00000000000000000000000800120000000000000002000006000006000000000000000000000021b3cc273a00000000ff0100000000fb517ed2fc1d2f1f000100000000000000000000ff"], 0x50}, 0x1}, 0x0) 2018/04/21 15:13:18 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x0) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000000000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) write$eventfd(r1, &(0x7f0000000080), 0x8) 2018/04/21 15:13:18 executing program 2: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000001000)={0x1}, 0x8, 0x0) clone(0x0, &(0x7f00007ae000), &(0x7f0000fb0ffc), &(0x7f0000aa5ffc), &(0x7f00007ce000)) msgctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 82.266631] device lo entered promiscuous mode [ 82.328932] device lo left promiscuous mode [ 82.386638] device lo entered promiscuous mode 2018/04/21 15:13:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 2018/04/21 15:13:19 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000001300)="f2610e90ed35b23921e038a88b3c0418b09d4fe899002c9306ef486975d5b7cfbfe8af23ce2d4fcf6f1f341e6a113586b175276158d25726b398490b8175c63693a35f82502812b1f69568144c2661df45bee184e479fed5e95d61f7b03313fbcf8003afcde60bad816e28ed7a2dcacfbdaa308021ec75c378ece4b964371d446e0b0b93b3854054ab708baee5aeca6e20e2585a6dbce6c1f2608fb4473f24bcd05aebc651eddb5479206ddd8b507e3b9b64b4a60a730a850a962a45c245099586f16f80bb966b2e728ec1001cc33d3209a7483540e795bc89854218ac2c1d6cb01f387e8550e7981f3e720071901679d57f9234e45018fe", 0xf8}], 0x8, &(0x7f0000001480)) 2018/04/21 15:13:19 executing program 4: r0 = socket(0x200000000018, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x2, {0xa}}}, 0x32) setsockopt(r0, 0x400000000000111, 0x1, &(0x7f00000001c0)="eaf40100", 0x4) 2018/04/21 15:13:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:19 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x0) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000000000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) write$eventfd(r1, &(0x7f0000000080), 0x8) 2018/04/21 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000080)=""/244, &(0x7f0000000180)=0xf4) 2018/04/21 15:13:19 executing program 2: r0 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='systemppp0cpuset@\x00', 0xfffffffffffffffc) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$describe(0x6, r0, &(0x7f0000000100)=""/93, 0x5d) 2018/04/21 15:13:19 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000003bff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) 2018/04/21 15:13:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef0100f7baed6e74d5f2801945289f07", 0x49, 0x400}], 0x0, &(0x7f0000000040)) 2018/04/21 15:13:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000280)={'bridge_slave_0\x00'}) 2018/04/21 15:13:19 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x8, &(0x7f0000001480)) 2018/04/21 15:13:19 executing program 4: pipe(&(0x7f00006c1ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/21 15:13:19 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='security.selinux\x00', &(0x7f00000003c0)=""/239, 0xffffffd0) 2018/04/21 15:13:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x6c) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x4) sendto$inet(r0, &(0x7f0000000000), 0x20, 0x22000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x47b) sendto$inet(r0, &(0x7f0000000d40)="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", 0x5b5, 0x1, &(0x7f0000000040)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/21 15:13:19 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/21 15:13:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) [ 83.420722] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 2018/04/21 15:13:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef0100f7baed6e74d5f2801945289f07", 0x49, 0x400}], 0x0, &(0x7f0000000040)) 2018/04/21 15:13:19 executing program 6: syz_mount_image$hfsplus(&(0x7f0000001740)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001480)) 2018/04/21 15:13:19 executing program 4: r0 = socket$kcm(0xa, 0x80000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000000100)=[{0x10, 0x1, 0x1}], 0x10}, 0x0) 2018/04/21 15:13:19 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:19 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/21 15:13:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x6c) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x4) sendto$inet(r0, &(0x7f0000000000), 0x20, 0x22000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x47b) sendto$inet(r0, &(0x7f0000000d40)="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", 0x5b5, 0x1, &(0x7f0000000040)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/21 15:13:19 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') exit(0x0) pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:19 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='security.selinux\x00', &(0x7f00000003c0)=""/239, 0xffffffd0) 2018/04/21 15:13:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef010001000000e95dbe5a00000000000000000100000000000000848d000080", 0x59, 0x400}], 0x0, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore', 0x2c}, {@discard='discard', 0x2c}]}) 2018/04/21 15:13:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f0000000280)=0x20) 2018/04/21 15:13:19 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x2, r0, 0x0) 2018/04/21 15:13:19 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000775000)) 2018/04/21 15:13:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:20 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000791fd1)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x11, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000ae3000)) 2018/04/21 15:13:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) 2018/04/21 15:13:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f0000000280)=0x20) 2018/04/21 15:13:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef010001000000e95dbe5a00000000000000000100000000000000848d000080", 0x59, 0x400}], 0x0, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore', 0x2c}, {@discard='discard', 0x2c}]}) 2018/04/21 15:13:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:20 executing program 5: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x2, 0x3, 0x10) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000240)) 2018/04/21 15:13:20 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') exit(0x0) pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:20 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd6076605100303afffe8000000000000000000000006b2b793e60ad8e16fefdfa609fa1acb10000ffff0200e3d7000000000000000000000188007e04997924b292e0961e00000000ff010000000000000504000004000001ff020000000000000000000000000001"], 0x0) 2018/04/21 15:13:20 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x67}, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0xfffffffffffff0f7, 0xe66a, 0xfffffffffffffffb, 0x15, r0, 0x4}, 0x2c) socketpair$inet(0x2, 0x4, 0xff, &(0x7f0000000200)) socketpair$inet(0x3, 0x0, 0x32c56931, &(0x7f0000000040)) 2018/04/21 15:13:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f0000000280)=0x20) 2018/04/21 15:13:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000100), 0x3f) 2018/04/21 15:13:20 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6c6f0000ffffff9f0000ddff00"}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'dummy0\x00', 0x6}) 2018/04/21 15:13:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:21 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) [ 85.110153] device lo left promiscuous mode 2018/04/21 15:13:21 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x20000000000002, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x81, 0x0, 0xffffffffffffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000b92000)={0x77359400}, &(0x7f0000264000)) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/04/21 15:13:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f0000000280)=0x20) 2018/04/21 15:13:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000faef70)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) 2018/04/21 15:13:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') 2018/04/21 15:13:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:22 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6c6f0000ffffff9f0000ddff00"}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'dummy0\x00', 0x6}) 2018/04/21 15:13:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6c6f0000ffffff9f0000ddff00"}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'dummy0\x00', 0x6}) 2018/04/21 15:13:22 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') exit(0x0) pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000004"], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@routing, 0x8) 2018/04/21 15:13:22 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:22 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) 2018/04/21 15:13:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000200)) 2018/04/21 15:13:22 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6c6f0000ffffff9f0000ddff00"}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'dummy0\x00', 0x6}) 2018/04/21 15:13:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40600) clone(0x24044000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 2018/04/21 15:13:23 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:23 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:23 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2}, @random="063d3b650453", [], {@ipv6={0x86dd, {0x0, 0x6, "459c6a", 0x14, 0x0, 0x0, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [], 0xbb}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/21 15:13:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) 2018/04/21 15:13:23 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) 2018/04/21 15:13:23 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') exit(0x0) pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:23 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10e, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:23 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)) [ 87.306213] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 1 transid 5 /dev/loop7 2018/04/21 15:13:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) 2018/04/21 15:13:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:23 executing program 4: syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) 2018/04/21 15:13:23 executing program 0: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:23 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000000000000000000000000000000000000000000000800200000000007000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000008002000000000000800000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000c08de4", 0x10e, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:24 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000280)="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", 0x118) sendto$inet6(r0, &(0x7f0000000040)="88", 0x1, 0x7fff, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback={0x1100000000000000, 0x1}}, 0x1c) 2018/04/21 15:13:24 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:24 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:24 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10e, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000200)=@ipx, 0x80, &(0x7f00000006c0)}}], 0x1, 0x0, &(0x7f0000000b00)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd4e8a048f8af1b89e866cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4a3b5", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 15:13:24 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10e, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:24 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) 2018/04/21 15:13:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:24 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000280)="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", 0x118) sendto$inet6(r0, &(0x7f0000000040)="88", 0x1, 0x7fff, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback={0x1100000000000000, 0x1}}, 0x1c) 2018/04/21 15:13:24 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:24 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:25 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') pread64(r0, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000200)=@ipx, 0x80, &(0x7f00000006c0)}}], 0x1, 0x0, &(0x7f0000000b00)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd4e8a048f8af1b89e866cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4a3b5", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 15:13:25 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)) 2018/04/21 15:13:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) pread64(0xffffffffffffffff, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:25 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)) 2018/04/21 15:13:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)) 2018/04/21 15:13:26 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/21 15:13:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) 2018/04/21 15:13:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0xffffffffffffffee) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) 2018/04/21 15:13:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f0000000100)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x48) 2018/04/21 15:13:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r1, &(0x7f00000003c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r2}}, 0x48) 2018/04/21 15:13:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000200)=@ipx, 0x80, &(0x7f00000006c0)}}], 0x1, 0x0, &(0x7f0000000b00)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd4e8a048f8af1b89e866cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4a3b5", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/21 15:13:26 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) pread64(0xffffffffffffffff, &(0x7f0000008080)=""/1, 0x1, 0x0) 2018/04/21 15:13:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000200)=@ipx, 0x80, &(0x7f00000006c0)}}], 0x1, 0x0, &(0x7f0000000b00)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd4e8a048f8af1b89e866cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4a3b5", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) [ 90.297968] ================================================================== [ 90.305411] BUG: KMSAN: uninit-value in btrfs_scan_one_device+0x4b6/0x920 [ 90.312346] CPU: 1 PID: 7159 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 90.319223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.328600] Call Trace: [ 90.331205] dump_stack+0x185/0x1d0 [ 90.334850] ? btrfs_scan_one_device+0x4b6/0x920 [ 90.339605] kmsan_report+0x142/0x240 [ 90.343406] __msan_warning_32+0x6c/0xb0 [ 90.347529] btrfs_scan_one_device+0x4b6/0x920 [ 90.352122] btrfs_mount_root+0x332/0x21b0 [ 90.356370] ? kmsan_set_origin+0x9e/0x160 [ 90.360625] ? btrfs_control_open+0x80/0x80 [ 90.364956] mount_fs+0x296/0x780 [ 90.368431] vfs_kern_mount+0x222/0x990 [ 90.372415] btrfs_mount+0x7fe/0x2db0 [ 90.376239] ? kmsan_set_origin+0x9e/0x160 [ 90.380481] ? btrfs_resize_thread_pool+0x5b0/0x5b0 [ 90.385504] mount_fs+0x296/0x780 [ 90.388969] vfs_kern_mount+0x222/0x990 [ 90.392952] do_mount+0xca5/0x4ed0 [ 90.396499] ? msan_get_shadow_origin_ptr+0x8/0x230 [ 90.401530] SYSC_mount+0x32e/0x3d0 [ 90.405176] SyS_mount+0x77/0xa0 [ 90.408539] do_syscall_64+0x309/0x430 [ 90.412428] ? put_mnt_ns+0x2f0/0x2f0 [ 90.416238] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 90.421420] RIP: 0033:0x457dba [ 90.424602] RSP: 002b:00007f644143bba8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 90.432305] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000457dba [ 90.439574] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f644143bbf0 [ 90.446841] RBP: 0000000000000001 R08: 0000000020000040 R09: 0000000020000000 [ 90.454103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 90.461367] R13: 0000000000000001 R14: 00000000006fcb50 R15: 0000000000000000 [ 90.468640] [ 90.470263] Uninit was stored to memory at: [ 90.474598] kmsan_internal_chain_origin+0x12b/0x210 [ 90.479703] kmsan_memcpy_origins+0x11d/0x170 [ 90.484199] __msan_memcpy+0x109/0x160 [ 90.488085] _copy_to_iter+0x852/0x28f0 [ 90.492059] copy_page_to_iter+0x383/0x1b70 [ 90.496485] shmem_file_read_iter+0x99f/0x1180 [ 90.501064] do_iter_readv_writev+0x84d/0xa00 [ 90.505561] do_iter_read+0x303/0xd70 [ 90.509360] vfs_iter_read+0x118/0x180 [ 90.513247] loop_queue_work+0x270e/0x3ef0 [ 90.517487] kthread_worker_fn+0x58f/0x900 [ 90.521717] loop_kthread_worker_fn+0x90/0xb0 [ 90.526205] kthread+0x539/0x720 [ 90.529571] ret_from_fork+0x35/0x40 [ 90.533271] Uninit was created at: [ 90.536815] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 90.541830] kmsan_alloc_page+0x82/0xe0 [ 90.545806] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 90.550558] alloc_pages_vma+0xcc8/0x1800 [ 90.554703] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 90.559721] shmem_getpage_gfp+0x35db/0x5770 [ 90.564130] shmem_file_read_iter+0x508/0x1180 [ 90.568707] do_iter_readv_writev+0x84d/0xa00 [ 90.573378] do_iter_read+0x303/0xd70 [ 90.577176] vfs_iter_read+0x118/0x180 [ 90.581058] loop_queue_work+0x270e/0x3ef0 [ 90.585290] kthread_worker_fn+0x58f/0x900 [ 90.589520] loop_kthread_worker_fn+0x90/0xb0 [ 90.594014] kthread+0x539/0x720 [ 90.597378] ret_from_fork+0x35/0x40 [ 90.601078] ================================================================== [ 90.608427] Disabling lock debugging due to kernel taint [ 90.613867] Kernel panic - not syncing: panic_on_warn set ... [ 90.613867] [ 90.621235] CPU: 1 PID: 7159 Comm: syz-executor7 Tainted: G B 4.16.0+ #85 [ 90.629372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.638726] Call Trace: [ 90.641333] dump_stack+0x185/0x1d0 [ 90.644971] panic+0x39d/0x940 [ 90.648182] ? btrfs_scan_one_device+0x4b6/0x920 [ 90.652936] kmsan_report+0x238/0x240 [ 90.656737] __msan_warning_32+0x6c/0xb0 [ 90.660798] btrfs_scan_one_device+0x4b6/0x920 [ 90.665386] btrfs_mount_root+0x332/0x21b0 [ 90.669626] ? kmsan_set_origin+0x9e/0x160 [ 90.673862] ? btrfs_control_open+0x80/0x80 [ 90.678213] mount_fs+0x296/0x780 [ 90.681681] vfs_kern_mount+0x222/0x990 [ 90.685658] btrfs_mount+0x7fe/0x2db0 [ 90.689475] ? kmsan_set_origin+0x9e/0x160 [ 90.693711] ? btrfs_resize_thread_pool+0x5b0/0x5b0 [ 90.698733] mount_fs+0x296/0x780 [ 90.702195] vfs_kern_mount+0x222/0x990 [ 90.706175] do_mount+0xca5/0x4ed0 [ 90.709713] ? msan_get_shadow_origin_ptr+0x8/0x230 [ 90.714735] SYSC_mount+0x32e/0x3d0 [ 90.718367] SyS_mount+0x77/0xa0 [ 90.721734] do_syscall_64+0x309/0x430 [ 90.725649] ? put_mnt_ns+0x2f0/0x2f0 [ 90.729454] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 90.734645] RIP: 0033:0x457dba [ 90.737826] RSP: 002b:00007f644143bba8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 90.745532] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000457dba [ 90.752801] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f644143bbf0 [ 90.760074] RBP: 0000000000000001 R08: 0000000020000040 R09: 0000000020000000 [ 90.767342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 90.774611] R13: 0000000000000001 R14: 00000000006fcb50 R15: 0000000000000000 [ 90.782382] Dumping ftrace buffer: [ 90.785917] (ftrace buffer empty) [ 90.789602] Kernel Offset: disabled [ 90.793203] Rebooting in 86400 seconds..