INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2018/04/07 03:23:45 fuzzer started 2018/04/07 03:23:46 dialing manager at 10.128.0.26:38639 2018/04/07 03:23:51 kcov=true, comps=false 2018/04/07 03:23:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b0d000)={0x1, 0x5, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000000000000000006b0af0fd0000000000000000000000009500000000000000"], &(0x7f0000c43000)='syzkaller\x00', 0x8000, 0x1000, &(0x7f0000c91000)=""/4096}, 0x48) 2018/04/07 03:23:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x27, 0x331, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 2018/04/07 03:23:54 executing program 7: mkdir(&(0x7f00000ee000)='./file0\x00', 0x0) mount(&(0x7f0000e07000)='./file0\x00', &(0x7f0000d14ffc)='./file0\x00', &(0x7f00009cf000)='ramfs\x00', 0x2000000, &(0x7f000081f000)) r0 = open(&(0x7f0000001180)='./file0/bus\x00', 0x141046, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000a5cf60)=[{&(0x7f000049efb9)='Z', 0x1}], 0x1, 0x0) 2018/04/07 03:23:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="a9", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) r1 = accept4(r0, 0x0, &(0x7f00000000c0)=0x3df, 0x0) sendmmsg(r1, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000640)="d7", 0x1}], 0x1, &(0x7f00000006c0)}}, {{&(0x7f0000000800)=@pppoe={0x18, 0x0, {0x0, @empty, 'nr0\x00'}}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)}}], 0x2, 0x0) 2018/04/07 03:23:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000180)={r1}, &(0x7f00000001c0), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f000045df58)={{0x80}, "706f7274310000004000000000000000000000d600fffffff0000000000000000000eda4000000000000000700", 0xbfffffffffffffff, 0x2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/07 03:23:54 executing program 3: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwrite64(r0, &(0x7f0000000000)='L', 0x1, 0x0) r1 = creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) dup2(r1, r0) 2018/04/07 03:23:54 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/07 03:23:54 executing program 6: r0 = socket$inet6(0xa, 0x80002, 0x88) read(r0, &(0x7f00000003c0)=""/70, 0x46) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x3f) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000c29ffc)=0x3, 0x4) sendmsg$inet_sctp(r1, &(0x7f0000557fc8)={&(0x7f0000000240)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000b03000)=[{&(0x7f00007fd000)='^', 0x1}], 0x1}, 0x0) syzkaller login: [ 43.973116] ip (3749) used greatest stack depth: 54944 bytes left [ 44.099386] ip (3759) used greatest stack depth: 54816 bytes left [ 44.349954] ip (3782) used greatest stack depth: 54312 bytes left [ 45.512377] ip (3893) used greatest stack depth: 54296 bytes left [ 45.839077] ip (3925) used greatest stack depth: 53656 bytes left [ 47.627329] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.670800] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.679857] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.707097] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.789530] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.802272] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.905778] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.053386] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.455094] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.474561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.507493] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.644340] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.686256] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.731930] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.771831] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.004620] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.212343] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.218564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.234801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.268661] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.276234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.289790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.312969] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.320776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.331557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.362770] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.369344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.386129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.414678] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.426735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.461584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.549933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.556189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.566736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.633878] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.640157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.651716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.871909] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.878184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.891559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 03:24:12 executing program 0: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4000002, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/nfsfs\x00') 2018/04/07 03:24:12 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/04/07 03:24:12 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000791fd1)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x16, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000ae3000)) 2018/04/07 03:24:12 executing program 7: mkdir(&(0x7f00000ee000)='./file0\x00', 0x0) mount(&(0x7f0000e07000)='./file0\x00', &(0x7f0000d14ffc)='./file0\x00', &(0x7f00009cf000)='ramfs\x00', 0x2000000, &(0x7f000081f000)) r0 = open(&(0x7f0000001180)='./file0/bus\x00', 0x141046, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000a5cf60)=[{&(0x7f000049efb9)='Z', 0x1}], 0x1, 0x0) 2018/04/07 03:24:12 executing program 5: 2018/04/07 03:24:12 executing program 6: 2018/04/07 03:24:12 executing program 2: 2018/04/07 03:24:12 executing program 3: 2018/04/07 03:24:13 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/04/07 03:24:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_deladdr={0x2c, 0x15, 0xf03, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2}]}, 0x2c}, 0x1}, 0x0) 2018/04/07 03:24:13 executing program 2: 2018/04/07 03:24:13 executing program 6: 2018/04/07 03:24:13 executing program 1: 2018/04/07 03:24:13 executing program 0: 2018/04/07 03:24:13 executing program 7: 2018/04/07 03:24:13 executing program 4: 2018/04/07 03:24:13 executing program 2: 2018/04/07 03:24:13 executing program 5: 2018/04/07 03:24:13 executing program 6: 2018/04/07 03:24:13 executing program 0: 2018/04/07 03:24:13 executing program 1: 2018/04/07 03:24:13 executing program 7: 2018/04/07 03:24:13 executing program 4: 2018/04/07 03:24:13 executing program 3: mkdir(&(0x7f0000000080)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fallocate(r1, 0x3, 0x0, 0x8000) fcntl$addseals(r1, 0x409, 0x0) close(r0) 2018/04/07 03:24:13 executing program 2: 2018/04/07 03:24:13 executing program 0: 2018/04/07 03:24:13 executing program 5: 2018/04/07 03:24:13 executing program 6: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) getpeername(r0, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000180)=0x84) 2018/04/07 03:24:13 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000002c0)="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", 0xfc) 2018/04/07 03:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000001c0)=0xfffffffe, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0x0, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000dc0)="9a06ac42afee253140fed88b03cdc9d30224a0e6fd2e83b04e6c11d4893edcb09ba740bab1e35217bb94c21d1aea3bb70b876b050a63e1ecdab6bac700feb887551849aad39aa63be6259f6204d10aaede72bacbda0bcf0b80e92d370d3f1b08c17a73e8f9bca9f1e1d23ad5d57d2acfe7139f14a96685a9c33592e8a650b8", 0x7f, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001, 0x100}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/07 03:24:13 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 60.773395] netlink: 188 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/07 03:24:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x884}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/07 03:24:13 executing program 0: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000080)=ANY=[@ANYBLOB="ff"]) ftruncate(r0, 0x0) 2018/04/07 03:24:14 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='[*[\x00', 0x0) write(r0, &(0x7f0000000140)='v', 0x1) write(r0, &(0x7f0000000000)="f7ea42337eb805da8d24d09f3c2100580900ccd45da0739a805009d8302bd00b1918efd82ab5b66259ecf0fd65e780619ab209f6d5f35ff95473ca9f55b5862dde816ce503637a8319ad42815a19bf46fd14a6cb53202dc5a22d430648c07d5aa56cd4dd4652a28111c6e5ffe5a5a8718c0402a41c38", 0x76) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={{0x0, 0x7530}, {0x77359400}}, 0x0) 2018/04/07 03:24:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/07 03:24:14 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x40000000002275, &(0x7f0000000140)) 2018/04/07 03:24:14 executing program 4: io_setup(0xba, &(0x7f0000000000)=0x0) r1 = socket(0x2, 0x803, 0xff) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)="0fde2d037dc2eb215d610dc3c65ac45d809af44d", 0x14}]) 2018/04/07 03:24:14 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2600000080000008"]}) 2018/04/07 03:24:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000300)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") readv(r0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/208, 0xd0}, {&(0x7f00000006c0)=""/183, 0xb7}], 0x2) 2018/04/07 03:24:14 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r1) 2018/04/07 03:24:14 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff1c, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f0000001440)={&(0x7f0000000040)=@nfc={0x27}, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000062c0)}, 0x0) 2018/04/07 03:24:14 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r1) 2018/04/07 03:24:14 executing program 5: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r1) 2018/04/07 03:24:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x276, 0xce8, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x0) 2018/04/07 03:24:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000000)="590e9c7d6e16b64120b00d612770cf97946f63af3809413c17172855c3bb73ebed0c9cefeea9fdedd67bb1c99bf5", 0x2e) write(r0, &(0x7f0000eaffa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13cecb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697ae707d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write$tun(r0, &(0x7f0000000680)={@pi, @hdr, @ipx={0xffff, 0x20, 0x0, 0x0, {@current, @current}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, "0f4c"}}, 0x2e) poll(&(0x7f0000df8fe0)=[{r0}], 0x1, 0x0) 2018/04/07 03:24:14 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d3abfd099feedd398027191a010007aea5c41901617356ba602dff05000bfef9b9", 0x21) 2018/04/07 03:24:15 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:15 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)) mount(&(0x7f0000000580)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000005c0)='logfs\x00', 0xfffff, &(0x7f00000002c0)) 2018/04/07 03:24:15 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2101, 0x0) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 2018/04/07 03:24:15 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r1) 2018/04/07 03:24:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x2c9}, 0x14) 2018/04/07 03:24:15 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2101, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x40081, 0x80000005, 0x0, 0x0, @time={0x77359400}, {}, {}, @addr}], 0x18) 2018/04/07 03:24:15 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, "04ac89", 0x28, 0x2f, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[@hopopts={0x0, 0x1, [], [@padn={0x1}, @jumbo={0xc2, 0x4}]}], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x0, 0x1}}}}}}}, &(0x7f0000000000)) 2018/04/07 03:24:15 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)={0x2, 0x10, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/04/07 03:24:15 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback={0x0, 0x1}, @dev={0xfe, 0x80}, [], "800000e77f000400"}}}}}}}, 0x0) 2018/04/07 03:24:15 executing program 0: r0 = socket(0x10, 0x80000000003, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000192ff0)=[{}, {0x1000000000006}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000040)=""/1, &(0x7f0000000180)=0x1) 2018/04/07 03:24:15 executing program 5: capset(&(0x7f0000000100)={0x4000019980330}, &(0x7f0000000000)={0x800000, 0xfffffffffff7fffb}) ioprio_set$pid(0x2, 0x0, 0x0) 2018/04/07 03:24:15 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r1) 2018/04/07 03:24:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="608049e7f7a63e15464e768767e00d33c751bfd57a78f1df65eef8d3f5d9d99f5f08716358bd9ab90537bba10b296ba6bd2deef2948dfb5878b7812a1c9c260129516a6be72646dc452c0e2b01239386f9d9407f6d4e5da4f1f6c0a17717562896005aadb103aec36325a879", 0x6c) 2018/04/07 03:24:15 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:15 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 62.530300] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 2018/04/07 03:24:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) chdir(&(0x7f0000000140)='./file0\x00') r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000001400)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[]], 0x8) sync_file_range(r1, 0x2, 0xfff, 0x7) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3f, 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000040)=""/12, 0xc, 0x2, &(0x7f00000000c0)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) fallocate(r1, 0x1, 0x40000000000, 0x1000ffff) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) 2018/04/07 03:24:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000a40)=@broute={'broute\x00', 0x20, 0x3, 0x608, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f0000000140), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'ip6tnl0\x00', 'vlan0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xb0, 0xe8, 0x138, [@time={'time\x00', 0x18}]}, [@common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffc}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x15, 0x0, 0x0, 'erspan0\x00', 'bond0\x00', '\x00', 'ip6gretap0\x00', @empty, [], @empty, [], 0x198, 0x220, 0x270, [@comment={'comment\x00', 0x100}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8001, 'syz0\x00'}}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x9aa, 'syz0\x00'}}}}, {{{0xd, 0x0, 0x0, 'sit0\x00', 'ip_vti0\x00', 'teql0\x00', 'tunl0\x00', @empty, [], @random="e41bff6e185a", [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:system_dbusd_var_run_t:s0\x00'}}}}]}]}, 0x680) 2018/04/07 03:24:15 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) shmdt(r1) 2018/04/07 03:24:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f0000000203199e000207000000068100027b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$packet(0x11, 0x2, 0x300) r2 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000004c0)={'bridge0\x00', 0x22001}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) 2018/04/07 03:24:15 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x139) getdents64(r0, &(0x7f0000000040)=""/1679, 0x68f) 2018/04/07 03:24:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000004c0)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'none\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/07 03:24:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) clone(0x20900, &(0x7f0000a93fff), &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f000031d000)) 2018/04/07 03:24:15 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:16 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) shmdt(r1) [ 63.003897] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 2018/04/07 03:24:16 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0x4) 2018/04/07 03:24:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) write(r0, &(0x7f00000001c0)='^', 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x2000000002}, 0x8) shutdown(r0, 0x1) 2018/04/07 03:24:16 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) 2018/04/07 03:24:16 executing program 4: capset(&(0x7f0000be6ff8)={0x19980330}, &(0x7f000032e000)) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8608006600", 0x5) 2018/04/07 03:24:16 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000a92000), 0x37c, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000003e00)=[{{&(0x7f0000000c00)=@can={0x1d}, 0x80, &(0x7f0000000f40), 0x0, &(0x7f0000000fc0)}}, {{&(0x7f00000012c0)=@can={0x1d}, 0x80, &(0x7f00000037c0), 0x0, &(0x7f0000003840)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0) 2018/04/07 03:24:17 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) r1 = shmat(r0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) shmdt(r1) 2018/04/07 03:24:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:17 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe6ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x51) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xd61) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) 2018/04/07 03:24:17 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:17 executing program 0: r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x9516}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) close(r0) 2018/04/07 03:24:17 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000432fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000013000)) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000012000/0x4000)=nil, 0x4000}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000002000)={&(0x7f0000011000/0x3000)=nil, 0x3000}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) 2018/04/07 03:24:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) write(r0, &(0x7f00000001c0)='^', 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x2000000002}, 0x8) shutdown(r0, 0x1) 2018/04/07 03:24:17 executing program 3: shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(0x0) 2018/04/07 03:24:17 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:17 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') fstat(r1, &(0x7f0000000280)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000, 0x54ad80af}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f00000057c0)=""/216) fstatfs(r0, &(0x7f0000000140)=""/142) ftruncate(r2, 0x100000000) umount2(&(0x7f0000000040)='./file0\x00', 0x9) write$cgroup_pid(r2, &(0x7f0000000200)={[0x32, 0x0]}, 0x2) 2018/04/07 03:24:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:18 executing program 3: r0 = shmat(0x0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r0) 2018/04/07 03:24:18 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:18 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') fstat(r1, &(0x7f0000000280)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000, 0x54ad80af}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f00000057c0)=""/216) fstatfs(r0, &(0x7f0000000140)=""/142) ftruncate(r2, 0x100000000) umount2(&(0x7f0000000040)='./file0\x00', 0x9) write$cgroup_pid(r2, &(0x7f0000000200)={[0x32, 0x0]}, 0x2) 2018/04/07 03:24:18 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000432fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000013000)) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000012000/0x4000)=nil, 0x4000}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000002000)={&(0x7f0000011000/0x3000)=nil, 0x3000}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) 2018/04/07 03:24:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe6ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x51) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xd61) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) 2018/04/07 03:24:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000140)=0x1, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xbfb, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/07 03:24:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:18 executing program 3: r0 = shmat(0x0, &(0x7f0000e7e000/0x2000)=nil, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(r0) 2018/04/07 03:24:18 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:18 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:18 executing program 2: r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000000000)='>T', 0x2) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000804000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804000000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/07 03:24:18 executing program 3: r0 = shmat(0x0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(r0) 2018/04/07 03:24:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:18 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:18 executing program 3: r0 = shmat(0x0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(r0) 2018/04/07 03:24:18 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:19 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:19 executing program 3: r0 = shmat(0x0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(r0) 2018/04/07 03:24:19 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:19 executing program 5: clone(0x0, &(0x7f0000611000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) capget(&(0x7f0000000080)={0x19980330}, &(0x7f00000000c0)) 2018/04/07 03:24:19 executing program 2: r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) write(r0, &(0x7f0000000000)='>T', 0x2) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000804000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804000000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/07 03:24:19 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0)=""/185, 0xb9, 0x22, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/07 03:24:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') fstat(r1, &(0x7f0000000280)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000, 0x54ad80af}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f00000057c0)=""/216) fstatfs(r0, &(0x7f0000000140)=""/142) ftruncate(r2, 0x100000000) umount2(&(0x7f0000000040)='./file0\x00', 0x9) write$cgroup_pid(r2, &(0x7f0000000200)={[0x32, 0x0]}, 0x2) 2018/04/07 03:24:19 executing program 3: r0 = shmat(0x0, &(0x7f0000e7e000/0x2000)=nil, 0x7000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) shmdt(0x0) 2018/04/07 03:24:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e26918ae", 0x41) 2018/04/07 03:24:19 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:19 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x2, 0x380, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f0000000240), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xfffefffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', "73797a5f74756e007c0000b38e00", 'bond0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xa0, 0x138, 0x188, [@pkttype={'pkttype\x00', 0x8}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x23, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x118, 0x118, 0x168, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @m802_3={'802_3\x00', 0x8}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x3f8) 2018/04/07 03:24:19 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x3e) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="6e65742f6970365f7461626c65735f6e616d65730017") sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/07 03:24:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 2018/04/07 03:24:20 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/04/07 03:24:20 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:20 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:20 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x39, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) close(r0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xc, 0x3, &(0x7f0000003a00)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003b40)='syzkaller\x00', 0x7, 0xce, &(0x7f0000003a40)=""/251}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) 2018/04/07 03:24:20 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000e7d000), 0x8) read(r0, &(0x7f000062f000)=""/179, 0xb3) unshare(0x40600) signalfd(r0, &(0x7f0000000700), 0x8) 2018/04/07 03:24:20 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0)=""/185, 0xb9, 0x22, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/07 03:24:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') fstat(r1, &(0x7f0000000280)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000, 0x54ad80af}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f00000057c0)=""/216) fstatfs(r0, &(0x7f0000000140)=""/142) ftruncate(r2, 0x100000000) umount2(&(0x7f0000000040)='./file0\x00', 0x9) write$cgroup_pid(r2, &(0x7f0000000200)={[0x32, 0x0]}, 0x2) 2018/04/07 03:24:20 executing program 5: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x39, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) 2018/04/07 03:24:20 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 2018/04/07 03:24:20 executing program 2: r0 = eventfd(0x6) r1 = epoll_create(0x45) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/07 03:24:20 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 2018/04/07 03:24:20 executing program 5: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) ftruncate(r0, 0x0) 2018/04/07 03:24:20 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/07 03:24:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157", 0x21) 2018/04/07 03:24:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) 2018/04/07 03:24:21 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:21 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:21 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0)=""/185, 0xb9, 0x22, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/07 03:24:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r3, 0x1, 0x0, 0x1000ffff) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) fallocate(r2, 0x3, 0x0, 0x1a8) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000300)={0x0, 0x100, 0x1}) 2018/04/07 03:24:21 executing program 3: sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0x0, 0x20008045, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x1000ffff) 2018/04/07 03:24:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157", 0x21) 2018/04/07 03:24:21 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x1000ffff) 2018/04/07 03:24:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0x1c) 2018/04/07 03:24:21 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157", 0x21) 2018/04/07 03:24:21 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x202000100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r0, r1, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000525000), 0x411, 0x0, 0x0) 2018/04/07 03:24:21 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) sendfile(r3, r2, &(0x7f0000002b80), 0x7fffffff) 2018/04/07 03:24:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396", 0x31) 2018/04/07 03:24:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:22 executing program 4: futex(&(0x7f000000cffc), 0x400000005, 0x0, &(0x7f0000000000), &(0x7f00000001c0), 0x1ffffff) 2018/04/07 03:24:22 executing program 6: r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) 2018/04/07 03:24:22 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396", 0x31) 2018/04/07 03:24:22 executing program 2: syz_emit_ethernet(0x32, &(0x7f000018f000)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x3580, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) [ 69.119372] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/07 03:24:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) flistxattr(r0, &(0x7f0000000000)=""/213, 0xd5) 2018/04/07 03:24:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}}, &(0x7f000064b000)=0xa0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f0000000000)=0x7d522c86) 2018/04/07 03:24:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = inotify_init() fcntl$notify(r1, 0x0, 0x282) socket$inet_tcp(0x2, 0x1, 0x0) 2018/04/07 03:24:22 executing program 6: r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:22 executing program 5: setns(0xffffffffffffffff, 0x0) clone(0x3ef6a30f5168d923, &(0x7f00002c9000), &(0x7f0000d70ffc), &(0x7f00001cc000), &(0x7f0000000280)) 2018/04/07 03:24:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396", 0x31) 2018/04/07 03:24:22 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000800)={0x18, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x100b}, [@nested={0x4, 0x5}]}, 0x18}, 0x1}, 0x0) 2018/04/07 03:24:22 executing program 4: mlock(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r1, &(0x7f0000000040), 0xf152d246, 0x20000001, &(0x7f0000faafe4)={0xa, 0x2}, 0x1c) timer_create(0x0, &(0x7f000030c000)={0x0, 0x12}, &(0x7f0000264ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = gettid() tkill(r3, 0x16) close(r0) 2018/04/07 03:24:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b", 0x39) 2018/04/07 03:24:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) [ 69.668979] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/07 03:24:22 executing program 6: r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b", 0x39) 2018/04/07 03:24:22 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:24 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000687000)=0x9, 0x135) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000903ff8)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x3, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/07 03:24:24 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, &(0x7f0000aea000), 0x1d5, &(0x7f0000603000)=""/81, 0x51}, 0x40002102) 2018/04/07 03:24:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b", 0x39) 2018/04/07 03:24:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:24 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:24 executing program 4: mlock(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r1, &(0x7f0000000040), 0xf152d246, 0x20000001, &(0x7f0000faafe4)={0xa, 0x2}, 0x1c) timer_create(0x0, &(0x7f000030c000)={0x0, 0x12}, &(0x7f0000264ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = gettid() tkill(r3, 0x16) close(r0) 2018/04/07 03:24:24 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = inotify_init() fcntl$notify(r1, 0x0, 0x282) socket$inet_tcp(0x2, 0x1, 0x0) [ 71.289498] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/07 03:24:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9", 0x3d) 2018/04/07 03:24:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:24 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) 2018/04/07 03:24:25 executing program 3: unshare(0x60000000) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'mangle\x00'}, &(0x7f0000000700)=0x54) 2018/04/07 03:24:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9", 0x3d) 2018/04/07 03:24:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:25 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:25 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000d19fee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = inotify_init() fcntl$notify(r1, 0x0, 0x282) socket$inet_tcp(0x2, 0x1, 0x0) 2018/04/07 03:24:25 executing program 4: mlock(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r1, &(0x7f0000000040), 0xf152d246, 0x20000001, &(0x7f0000faafe4)={0xa, 0x2}, 0x1c) timer_create(0x0, &(0x7f000030c000)={0x0, 0x12}, &(0x7f0000264ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = gettid() tkill(r3, 0x16) close(r0) [ 73.065617] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/07 03:24:26 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9", 0x3d) 2018/04/07 03:24:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 2018/04/07 03:24:26 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000001480)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) r1 = gettid() unshare(0x28060400) exit(0x0) r2 = syz_open_procfs(r1, &(0x7f000000b000)='ns\x00') fstat(r2, &(0x7f000065bfbc)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) 2018/04/07 03:24:26 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e269", 0x3f) 2018/04/07 03:24:26 executing program 0: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e269", 0x3f) 2018/04/07 03:24:26 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/07 03:24:26 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000200)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x88000, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/07 03:24:26 executing program 0: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/07 03:24:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd160-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d6a479cd7f5e7b7a2952d272276f489b0e2590febc9969313288020a5af2c80157ed69c1ee82bb6e3fe5387bb5b4604396aaae7266f4a8c29b4ef554d9e269", 0x3f) 2018/04/07 03:24:27 executing program 6: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000ebbff6)='./control\x00', 0x8) rmdir(&(0x7f0000f98ff6)='./control\x00') epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) [ 74.119478] ================================================================== [ 74.126897] BUG: KMSAN: uninit-value in ghash_setkey+0x209/0x270 [ 74.133047] CPU: 1 PID: 5858 Comm: syz-executor3 Not tainted 4.16.0+ #81 [ 74.139878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.149222] Call Trace: [ 74.151808] dump_stack+0x185/0x1d0 [ 74.155431] ? ghash_setkey+0x209/0x270 [ 74.159404] kmsan_report+0x142/0x240 [ 74.163201] __msan_warning_32+0x6c/0xb0 [ 74.167257] ghash_setkey+0x209/0x270 [ 74.171052] ? ghash_final+0x1d0/0x1d0 [ 74.174932] crypto_shash_setkey+0x317/0x490 [ 74.179340] cryptd_hash_setkey+0x1a5/0x330 [ 74.183665] ? cryptd_hash_import+0x2a0/0x2a0 [ 74.188164] crypto_ahash_setkey+0x31a/0x470 [ 74.192574] ghash_async_setkey+0x1a5/0x330 [ 74.196893] ? ghash_async_import+0x3a0/0x3a0 [ 74.201380] crypto_ahash_setkey+0x31a/0x470 [ 74.205782] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 74.210974] crypto_gcm_setkey+0xa3c/0xc10 [ 74.215204] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 74.219602] crypto_aead_setkey+0x373/0x4c0 [ 74.224437] aead_setkey+0xa0/0xc0 [ 74.227967] alg_setsockopt+0x6c5/0x740 [ 74.231935] ? aead_release+0x90/0x90 [ 74.235725] ? alg_accept+0xd0/0xd0 [ 74.239351] SYSC_setsockopt+0x4b8/0x570 [ 74.243410] SyS_setsockopt+0x76/0xa0 [ 74.247205] do_syscall_64+0x309/0x430 [ 74.251090] ? SYSC_recv+0xe0/0xe0 [ 74.254622] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.259801] RIP: 0033:0x455259 [ 74.262977] RSP: 002b:00007fbd0c365c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.270676] RAX: ffffffffffffffda RBX: 00007fbd0c3666d4 RCX: 0000000000455259 [ 74.277936] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 74.285193] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.292451] R10: 0000000020ff8000 R11: 0000000000000246 R12: 00000000ffffffff [ 74.299708] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 74.306972] [ 74.308583] Uninit was stored to memory at: [ 74.312899] kmsan_internal_chain_origin+0x12b/0x210 [ 74.317988] __msan_chain_origin+0x69/0xc0 [ 74.322213] __crypto_xor+0x23c/0x16b0 [ 74.326091] crypto_ctr_crypt_inplace+0x29a/0x3a0 [ 74.330926] crypto_ctr_crypt+0x54c/0x7d0 [ 74.335065] skcipher_encrypt_blkcipher+0x222/0x320 [ 74.340071] crypto_gcm_setkey+0x6a3/0xc10 [ 74.344295] crypto_aead_setkey+0x373/0x4c0 [ 74.348605] aead_setkey+0xa0/0xc0 [ 74.352137] alg_setsockopt+0x6c5/0x740 [ 74.356102] SYSC_setsockopt+0x4b8/0x570 [ 74.360153] SyS_setsockopt+0x76/0xa0 [ 74.363940] do_syscall_64+0x309/0x430 [ 74.367816] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.372989] Local variable description: ----vla@crypto_ctr_crypt_inplace [ 74.379810] Variable was created at: [ 74.383513] crypto_ctr_crypt_inplace+0x19a/0x3a0 [ 74.388341] crypto_ctr_crypt+0x54c/0x7d0 [ 74.392476] ================================================================== [ 74.399820] Disabling lock debugging due to kernel taint [ 74.405257] Kernel panic - not syncing: panic_on_warn set ... [ 74.405257] [ 74.412615] CPU: 1 PID: 5858 Comm: syz-executor3 Tainted: G B 4.16.0+ #81 [ 74.420743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.430083] Call Trace: [ 74.432669] dump_stack+0x185/0x1d0 [ 74.436294] panic+0x39d/0x940 [ 74.439502] ? ghash_setkey+0x209/0x270 [ 74.443468] kmsan_report+0x238/0x240 [ 74.447259] __msan_warning_32+0x6c/0xb0 [ 74.451312] ghash_setkey+0x209/0x270 [ 74.455104] ? ghash_final+0x1d0/0x1d0 [ 74.458984] crypto_shash_setkey+0x317/0x490 [ 74.463390] cryptd_hash_setkey+0x1a5/0x330 [ 74.467706] ? cryptd_hash_import+0x2a0/0x2a0 [ 74.472195] crypto_ahash_setkey+0x31a/0x470 [ 74.476600] ghash_async_setkey+0x1a5/0x330 [ 74.480916] ? ghash_async_import+0x3a0/0x3a0 [ 74.485408] crypto_ahash_setkey+0x31a/0x470 [ 74.489809] ? skcipher_encrypt_blkcipher+0x222/0x320 [ 74.494993] crypto_gcm_setkey+0xa3c/0xc10 [ 74.499223] ? crypto_gcm_exit_tfm+0xd0/0xd0 [ 74.503621] crypto_aead_setkey+0x373/0x4c0 [ 74.507939] aead_setkey+0xa0/0xc0 [ 74.511469] alg_setsockopt+0x6c5/0x740 [ 74.515435] ? aead_release+0x90/0x90 [ 74.519228] ? alg_accept+0xd0/0xd0 [ 74.522850] SYSC_setsockopt+0x4b8/0x570 [ 74.526910] SyS_setsockopt+0x76/0xa0 [ 74.530728] do_syscall_64+0x309/0x430 [ 74.534612] ? SYSC_recv+0xe0/0xe0 [ 74.538147] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.543322] RIP: 0033:0x455259 [ 74.546499] RSP: 002b:00007fbd0c365c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.554201] RAX: ffffffffffffffda RBX: 00007fbd0c3666d4 RCX: 0000000000455259 [ 74.561458] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 74.568715] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.575975] R10: 0000000020ff8000 R11: 0000000000000246 R12: 00000000ffffffff [ 74.583235] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 74.590961] Dumping ftrace buffer: [ 74.594485] (ftrace buffer empty) [ 74.598205] Kernel Offset: disabled [ 74.601807] Rebooting in 86400 seconds..