INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. 2018/04/17 06:47:20 fuzzer started 2018/04/17 06:47:20 dialing manager at 10.128.0.26:43021 2018/04/17 06:47:26 kcov=true, comps=false 2018/04/17 06:47:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000001040)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/17 06:47:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) 2018/04/17 06:47:29 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x110000000010) r1 = accept(r0, &(0x7f0000317000)=ANY=[], &(0x7f0000123000)) sendmmsg(r1, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000240)='t', 0x1}], 0x1, &(0x7f0000001c40)}}], 0x1, 0x3fffffe) 2018/04/17 06:47:29 executing program 3: r0 = socket$inet(0x2, 0x3, 0x21) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="d011de1c2a0859155196f70c901ba66723a710e5cc58a72957eca3290e819e1e77287bbea63d7109eb4a33ab4575cc4867ceaa25e41d07f954e99148f754199477d259fb48400175822fe5e32af733a71e838ec24facb20497ba4a6355e74bf4cc012ed65f1fad7d6a0f90b769296a22380f33ddc0049d05752ed746b462fdfdc96ed4287f505eba547c375a2c306dd5aa3e5bd102b6990989a27d274c65ec7102cee7371e903d01", 0xa8}], 0x1, &(0x7f0000000280)=ANY=[]}, 0x0) 2018/04/17 06:47:29 executing program 5: 2018/04/17 06:47:29 executing program 4: 2018/04/17 06:47:29 executing program 6: 2018/04/17 06:47:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000fb5ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x0, 0xc01}, {0x400000000000000f}}) syzkaller login: [ 41.916595] ip (3754) used greatest stack depth: 54688 bytes left [ 42.228177] ip (3783) used greatest stack depth: 54672 bytes left [ 43.035326] ip (3865) used greatest stack depth: 54200 bytes left [ 43.447327] ip (3901) used greatest stack depth: 53960 bytes left [ 43.640755] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.647237] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.676963] device bridge_slave_0 entered promiscuous mode [ 43.739500] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.746223] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.791936] device bridge_slave_0 entered promiscuous mode [ 43.838448] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.844957] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.880274] device bridge_slave_1 entered promiscuous mode [ 43.890143] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.896620] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.932945] device bridge_slave_0 entered promiscuous mode [ 43.961419] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.967954] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.987895] device bridge_slave_0 entered promiscuous mode [ 43.995805] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.002295] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.026232] device bridge_slave_1 entered promiscuous mode [ 44.054685] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.061238] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.080992] device bridge_slave_0 entered promiscuous mode [ 44.096993] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.103450] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.113107] device bridge_slave_0 entered promiscuous mode [ 44.130868] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.137311] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.167183] device bridge_slave_0 entered promiscuous mode [ 44.177094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.188829] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.195265] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.215444] device bridge_slave_0 entered promiscuous mode [ 44.227191] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.233640] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.264857] device bridge_slave_1 entered promiscuous mode [ 44.274339] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.280803] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.295983] device bridge_slave_1 entered promiscuous mode [ 44.305067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.316096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.326022] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.332559] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.356975] device bridge_slave_1 entered promiscuous mode [ 44.363778] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.370257] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.408998] device bridge_slave_1 entered promiscuous mode [ 44.418120] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.424573] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.452671] device bridge_slave_1 entered promiscuous mode [ 44.461445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.470322] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.476754] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.498545] device bridge_slave_1 entered promiscuous mode [ 44.517791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.526973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.536880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.546918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.555215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.677863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.730688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.747654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.786169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.794857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.906724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.919774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.425070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.442404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.548630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.649601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.668832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.723804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.735865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.759458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.782956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.898458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.909810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.917163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.931480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.982698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.108818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.119923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.169597] ip (4100) used greatest stack depth: 53656 bytes left [ 46.682588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.702845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.770235] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.889432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.897085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.917109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.976535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.014206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.029516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.056355] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.082332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.091257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.102265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.114809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.150253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.181672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.195961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.203427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.222253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.257249] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.264411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.276692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.311840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.319410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.326777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.335154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.342260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.351944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.397439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.405887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.448266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.483459] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.490712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.501744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.528403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.542414] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.552195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.561653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.578608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.599855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.616756] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.626932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.635878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.646822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.675983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.697130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.708322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.716444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.725955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.743788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.757749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.778155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.803266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.813842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.822104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.848911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.871396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.892534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.911896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.921060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.932260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.941296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.951697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.959816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.871158] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.877639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.884487] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.890971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.935914] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.942994] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.949461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.956360] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.962818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.977534] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.984724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.993849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.014007] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.020506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.027358] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.033809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.074877] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.085181] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.091603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.098437] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.105120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.114154] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.123815] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.130267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.137115] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.143565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.152201] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.168516] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.174963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.181783] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.188214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.252902] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.463110] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.469584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.476405] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.482846] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.522952] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.550252] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.556738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.563621] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.570138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.641090] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.039147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.065538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.090699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.118423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.130641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.146583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.108376] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.247217] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.357893] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.394663] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.488375] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.497138] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.776901] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.809432] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.898887] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.905159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.916597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.118674] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.124954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.132970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.156768] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.165093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.179857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.199657] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.213688] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.222676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.247712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.279061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.316644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.451915] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.458202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.469068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.630344] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.637778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.645689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.793739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.800177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.813157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/17 06:47:55 executing program 6: [ 65.997199] raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it! [ 66.021254] dccp_invalid_packet: P.CsCov 8 exceeds packet length 168 2018/04/17 06:47:56 executing program 0: 2018/04/17 06:47:56 executing program 4: 2018/04/17 06:47:56 executing program 6: 2018/04/17 06:47:56 executing program 3: r0 = socket$inet(0x2, 0x3, 0x21) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="d011de1c2a0859155196f70c901ba66723a710e5cc58a72957eca3290e819e1e77287bbea63d7109eb4a33ab4575cc4867ceaa25e41d07f954e99148f754199477d259fb48400175822fe5e32af733a71e838ec24facb20497ba4a6355e74bf4cc012ed65f1fad7d6a0f90b769296a22380f33ddc0049d05752ed746b462fdfdc96ed4287f505eba547c375a2c306dd5aa3e5bd102b6990989a27d274c65ec7102cee7371e903d01", 0xa8}], 0x1, &(0x7f0000000280)=ANY=[]}, 0x0) 2018/04/17 06:47:56 executing program 2: 2018/04/17 06:47:56 executing program 5: 2018/04/17 06:47:56 executing program 7: 2018/04/17 06:47:56 executing program 1: 2018/04/17 06:47:56 executing program 7: [ 66.819799] dccp_invalid_packet: P.CsCov 8 exceeds packet length 168 2018/04/17 06:47:56 executing program 4: 2018/04/17 06:47:56 executing program 2: 2018/04/17 06:47:56 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000002a40)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a00000000000027e706bc804000000002000000000000f7ffffff0080ce3030ffffabbaa12f67b3eee6cebd432efa6446540d21971462dface94c89ed30cf300773e9ddfd4e23b7556e798a867757bb066bb2"], 0x65}, 0x1}, 0x0) 2018/04/17 06:47:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000012ff6)='./control\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000031000)='./control\x00', r1, &(0x7f000002e000)='./control\x00', 0x2) 2018/04/17 06:47:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000aff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000000)={&(0x7f0000238ff8)=@abs, 0x6e, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000002f800001773d74390240c3070020001600006abecaaaf622109982c6d880ea0b1b88a7494adfccef25bd0e790de683040066c07377dd1b8636fc4614f2a5f2f35d9014e7e52d4334f6dead914f5eb6d1b192c9ae8668d64846216bfcc62dfdfe34e5c8cb957586afe42b090ddbd180a117e029575179e7ac695cabc231bb216b89eff47f712646917e18f456414544b9e4c143f27f1d", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) dup3(r1, r2, 0x0) 2018/04/17 06:47:57 executing program 5: mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x43, 0x0, &(0x7f000004b000)={0x3}) 2018/04/17 06:47:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300000d000000000000000000000005000600000000000a0000000000000000000000000000000004000000000000000000000000000001001800003fc1672f4a8da4a40000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0x68}, 0x1}, 0x0) 2018/04/17 06:47:57 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x6}, 0x1c) 2018/04/17 06:47:57 executing program 2: mkdir(&(0x7f000052aff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000033ff8)='./file0\x00', 0x0) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x1001, &(0x7f0000a06000)) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x5) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000001080)='./file0\x00', 0x2, 0x5, &(0x7f0000002400)=[{&(0x7f0000001180)="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", 0x1000, 0x200}, {&(0x7f00000010c0)="abed1880610fb80636e9ea4001dc3da03fab32", 0x13, 0xffffffff}, {&(0x7f0000002180)="e648099e76267fbd8d5d3341ba1b6d8b3d053d0c4a9b565d915a80f9c4cd2de9458d978f18a8082799baf3941c5897ee08ae4fae29ee270e682b83b95ed0c758838db2c64c4c00220c5bfa604fd42c984eba67dc2544a97f1b1c567e0bf1bb58dd7a8b8ad599ba25f300b34e4e7a3ad1522432785fbf65530fd8a910b45f84cb619613d985887853dee0a01df7195ffcdd9e01637fdab77ff05b910763115d7224fb459ca5c7c63be99f0b51bd865a819242eb4f77ce652c54aa16cdbe9ad1eb08", 0xc1, 0x8000}, {&(0x7f0000002280)="42164e0d2909c3c72c8dcf0c4ce7b3200820c84d17ae3edc35298e695694270d9016e69b8dd1b6847dcf55d23a7cec328048636d6f80f61aa083035f5e8a76c1f88ef3ff9c0f475eab9784ffb225a9f1be527b2d225b1be38f6c544d2ed15dc783200c09728de345b0b07bb175b25148a4779746fb37d2fc62be4da074d7deb0d604c9b7ce55d713825021423ac018749e27105bc3c1520f369842d294290551d38d0dbcd40b60", 0xa7, 0x9}, {&(0x7f0000002340)="1fe4d29bdb01b468c2ceb5f24d41e39fa9e2966caf1de770f47f4e722607818c2fcbdf2dd9b5303e7a38186080086b5597a420575287f02fd3a32d1d6c3de8469fe981f7e99f4421437b1f5312594167c1b518ed5d8355278f56eb01d75a273e6342377e4f2cb5e162e475a80081264137c26cbfaf7e26895deee83f6b1731a7cb3eaf2882d7548530e8657c8095f9c4e72e00", 0x93, 0x100}], 0x201000, 0x0) mknodat(r0, &(0x7f0000001140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) 2018/04/17 06:47:57 executing program 6: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x1000, 0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000100)={0x1f960, r0}) chdir(&(0x7f0000000180)='./file0\x00') r1 = socket$alg(0x26, 0x5, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000140)={0x2, 0x9, 0x9, 0x8, 0x8, 0x7}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) 2018/04/17 06:47:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000059b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000039fd0)="000000070500000000000000ff05000bfef9f30001000000000007fffffffe00022507e596c11fd4c2a6dc42ffa80001", 0x30) umount2(&(0x7f0000000240)='./file0\x00', 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) syz_open_pts(r1, 0x88800) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x81, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="1ce4e610163ebae5856c8f05ddae48a12a713339a3016c8faad459cd8447f5fa2498346bcfd5fb9f849df5628bd63bb1d151903f2cac2fd1", 0x38, 0x2}], 0x2000000, &(0x7f0000000140)={[{@errors_remount='errors=remount-ro', 0x2c}, {@show_sys_files_no={'show_sys_files=no', 0x3d, [0x3d, 0x33, 0x36, 0x7b, 0x7b, 0x38, 0x0]}, 0x2c}, {@errors_continue='errors=continue', 0x2c}, {@case_sensitive_no={'case_sensitive=no', 0x3d, [0x30, 0x78, 0x3d, 0x34, 0x34, 0x32, 0x38, 0x36, 0x7e]}, 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@case_sensitive_no={'case_sensitive=no', 0x3d, [0x3d, 0x0, 0x78, 0x34, 0x37]}, 0x2c}, {@dmask={'dmask', 0x3d, [0x31, 0x31, 0x35, 0x34, 0x34, 0x34, 0x35]}, 0x2c}]}) 2018/04/17 06:47:57 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000440)="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", &(0x7f0000000400)='\x00') r1 = open(&(0x7f0000000000)='./file0\x00', 0x840, 0x2) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000040)=0x78) 2018/04/17 06:47:57 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000a6000)={&(0x7f0000074000)=@alg, 0x80, &(0x7f0000eecfc0), 0x0, &(0x7f0000f7ffca)=""/87, 0x57}, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000080)=0xd271, 0x4) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/67, 0x43}], 0x1) 2018/04/17 06:47:57 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') sendmsg$rds(r0, &(0x7f0000001c80)={&(0x7f0000000000)={0x2, 0x4e23}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)=""/24, 0x18}, {&(0x7f00000000c0)=""/172, 0xac}, {&(0x7f0000000180)=""/234, 0xea}], 0x3, &(0x7f0000001ac0)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000002c0)=""/107, 0x6b}, &(0x7f0000000340), 0x52}}, @rdma_dest={0x18, 0x114, 0x2, {0xbf, 0x1e49}}, @mask_fadd={0x58, 0x114, 0x8, {{0x80}, &(0x7f0000000380)=0x7f, &(0x7f00000003c0)=0xffffffffffffff67, 0x7, 0xff, 0x7, 0x7, 0x60, 0x4}}, @rdma_dest={0x18, 0x114, 0x2, {0x0, 0x44a0}}, @mask_cswp={0x58, 0x114, 0x9, {{0x8dc, 0x7}, &(0x7f0000000400)=0x43e, &(0x7f0000000440)=0x7, 0x200, 0xfff, 0x7, 0x6, 0x20, 0x98f6}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000480)=""/50, 0x32}, &(0x7f00000004c0), 0x22}}, @rdma_args={0x48, 0x114, 0x1, {{0xffffffff, 0xffff}, {&(0x7f0000000500)=""/197, 0xc5}, &(0x7f0000001a40)=[{&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000780)=""/24, 0x18}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/197, 0xc5}, {&(0x7f0000000980)=""/81, 0x51}, {&(0x7f0000000a00)=""/48, 0x30}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x8, 0x11, 0x1}}], 0x188, 0x40}, 0x10) preadv(r0, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x103) 2018/04/17 06:47:57 executing program 5: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="001003fffffffff1e0ff1301d9d2ebf8b1a5776c747b2c2ee49c6d4b1325ad9d73393c76fe46363303b9de20793bf989a1d5", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="2267484b349528b5083a8f928eb19d3c8ffa6b68fe4766dfa941ef9fc3a790074fd70e7cacb1eaf59bb4ac0f3212d0fcace8110c44266484cd341233"], @ANYBLOB="ff05008006000300f6000000030000001c8c77bbeb7f36ace798f0cbfa03af12c091fba7c087133619e91535"]) r3 = dup3(r2, r2, 0x80000) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xb, 0x2, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x81}, 0x2c) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000080), &(0x7f0000000180)=0x4) 2018/04/17 06:47:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) sendmsg(r0, &(0x7f0000f12fd8)={&(0x7f0000218000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xb8}, 0x0) 2018/04/17 06:47:57 executing program 1: r0 = timerfd_create(0x7, 0x800) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x431, r0, 0x20000000000000) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000)=0x1, 0x0) 2018/04/17 06:47:57 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000010c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1ff, 0x202000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0xd1d5}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x3}, 0x8) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/245, &(0x7f00000001c0)=0xf5) 2018/04/17 06:47:57 executing program 6: pipe(&(0x7f0000f91ff8)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00005d5ff2)=[{&(0x7f00005d5fff)="be", 0x1}], 0x1, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) vmsplice(r1, &(0x7f0000f83000)=[{&(0x7f0000f82000), 0xfffffeef}], 0x1, 0x0) 2018/04/17 06:47:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000059b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000039fd0)="000000070500000000000000ff05000bfef9f30001000000000007fffffffe00022507e596c11fd4c2a6dc42ffa80001", 0x30) umount2(&(0x7f0000000240)='./file0\x00', 0xc) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) syz_open_pts(r1, 0x88800) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x81, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="1ce4e610163ebae5856c8f05ddae48a12a713339a3016c8faad459cd8447f5fa2498346bcfd5fb9f849df5628bd63bb1d151903f2cac2fd1", 0x38, 0x2}], 0x2000000, &(0x7f0000000140)={[{@errors_remount='errors=remount-ro', 0x2c}, {@show_sys_files_no={'show_sys_files=no', 0x3d, [0x3d, 0x33, 0x36, 0x7b, 0x7b, 0x38, 0x0]}, 0x2c}, {@errors_continue='errors=continue', 0x2c}, {@case_sensitive_no={'case_sensitive=no', 0x3d, [0x30, 0x78, 0x3d, 0x34, 0x34, 0x32, 0x38, 0x36, 0x7e]}, 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@case_sensitive_no={'case_sensitive=no', 0x3d, [0x3d, 0x0, 0x78, 0x34, 0x37]}, 0x2c}, {@dmask={'dmask', 0x3d, [0x31, 0x31, 0x35, 0x34, 0x34, 0x34, 0x35]}, 0x2c}]}) 2018/04/17 06:47:57 executing program 7: unshare(0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) socket$inet(0x2, 0x200000000000003, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={"626373663000fdffffffffefffff00", &(0x7f0000000140)=ANY=[@ANYBLOB="0f0000000000004da6c707962644a8bf7af0a900000000000000000000000000000000000000000000000000000000f1ffffff0000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000ec5b9f6000000008786d3ee16c89903b21dfad640d5f03eff2e8c6f3f63592d32c8ce9f1060000"]}) 2018/04/17 06:47:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 2018/04/17 06:47:57 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x800, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x6, 0x3, 0x0, 0x81, 0x3}) r1 = socket$unix(0x1, 0x4, 0x0) r2 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00001e9000)={0x4}) r3 = gettid() capset(&(0x7f0000000180)={0x399f1336, r3}, &(0x7f00000001c0)={0x0, 0x70, 0x1, 0xa7c, 0x800, 0x6}) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000140)={0x80, 0x3, 0x2b34, 0xfffffffffffffff9}) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x1, 0x0) getsockname$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 2018/04/17 06:47:58 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000c97ff8)) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101001) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x253, 0x400000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001340)=ANY=[], @ANYBLOB="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"]) r2 = semget(0x2, 0xc210036c493f66a8, 0x88) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000640)=0x3) accept$ipx(r1, &(0x7f00000005c0), &(0x7f0000000600)=0x10) semop(r2, &(0x7f0000000000)=[{0x3, 0x484}, {0x1, 0x5}, {0x5, 0x8}, {0x2, 0x3, 0x1800}, {0x0, 0x7, 0x800}, {0x3, 0x80000001, 0x1800}, {0x2, 0x9, 0x800}, {0x0, 0x8}, {0x0, 0xcbb60de, 0x1000}], 0x9) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000004c0)={0x0, 0x89}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000540)={r3, 0x80000001}, &(0x7f0000000580)=0x8) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000180)) r4 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) 2018/04/17 06:47:58 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "84eef8", 0x0, 0x0, 0x0, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}}}}}}}}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000140)=@in6={0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x80) bind$bt_rfcomm(r0, &(0x7f0000000200)={0x1f, {0xc51, 0x6, 0x5, 0x100000000, 0xffffffff, 0x6}, 0x6}, 0xa) 2018/04/17 06:47:58 executing program 4: getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000722ffc), &(0x7f0000000100)=0x4) 2018/04/17 06:47:58 executing program 6: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000140)={{0x8000, 0x52d9}, {0x3, 0x7f}, 0x4, 0x7, 0x3}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000013000)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000100)=0x8) set_tid_address(&(0x7f0000000000)) 2018/04/17 06:47:58 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000180), 0x2) fcntl$setpipe(r0, 0x407, 0x6) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x13, 0x100000001, 0x4, 0x1, 0x871, 0x1, 0x0, 0x0, 0x4d34, 0x638f06e9, 0x8}, 0xb) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000000)=""/192, &(0x7f00000000c0)=0xc0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/17 06:47:58 executing program 1: r0 = open(&(0x7f0000fedff8)='./file0\x00', 0x141042, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='dummy0\x00') utime(&(0x7f0000ff1000)='./file0\x00', &(0x7f000067bff0)={0x8000000000000000, 0xffff}) fstat(r0, &(0x7f0000000fbc)) sigaltstack(&(0x7f0000000000/0x2000)=nil, &(0x7f0000000140)) sigaltstack(&(0x7f0000000000/0x1000)=nil, &(0x7f00005d6000)) 2018/04/17 06:47:58 executing program 3: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$selinux_validatetrans(r0, &(0x7f0000000500)={'system_u:object_r:utempter_exec_t:s0', 0x20, 'system_u:object_r:cpu_online_t:s0', 0x20, 0x0, 0x0, 0x20, '/sbin/dhclient\x00'}, 0xffe2) read(0xffffffffffffffff, &(0x7f000022e000)=""/74, 0x283) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'ip6gretap0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 2018/04/17 06:47:58 executing program 0: r0 = memfd_create(&(0x7f0000000100), 0x2) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000760000)={0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x3, 0x200, 0x0, 0x0, 0x6}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x6}, 0x1) ftruncate(r0, 0xd38b) lseek(r0, 0x20, 0xffffffffffffffff) 2018/04/17 06:47:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="006979f9f0dd5b1a6338725482ae3b26d98d288a5cd6c9f27f3da54c15d5b3c177d55d78ac88b11eb9a741d6a26c92ea3545381a7ef296a052cc7218a6bbd08dc1fe11e3"], &(0x7f0000000b00)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000b40)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000000140)="73797a6b616c6c657200d50a97e6a24233dd24c7d63c67c8d347adeef21c4d2c89ee6a895b265b7535b43027cc104969fa9dc7a6925006bd7ced6c7daf", 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x23) 2018/04/17 06:47:58 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f00000001c0)='I', 0x1}], 0x1, 0x0) fcntl$setstatus(r2, 0x4, 0x44802) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/17 06:47:59 executing program 0: r0 = socket(0xa, 0x802, 0x1f4) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000), 0x3) 2018/04/17 06:47:59 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e21, 0x1f, @mcast2={0xff, 0x2, [], 0x1}}, 0x18) r1 = accept4$inet6(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000140)=0x1c, 0x80000) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) epoll_create1(0x80000) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[0x7ff]}) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14c90e00000000042cbd7000fbdbdf25ffff0000"], 0x14}, 0x1}, 0x20008000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) 2018/04/17 06:47:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x278, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000000), {[{{@arp={@loopback=0x7f000001, @multicast2=0xe0000002, 0xffffffff, 0x0, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0x0, 0x0, 0x0, 0xff, 0x0, 0xff]}, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, {[0xff, 0xcf2655761b7935d7, 0xff, 0x0, 0xff, 0xff]}, 0x100000000, 0x7fff, 0x0, 0x80000000, 0x5, 0x40, 'bpq0\x00', 'ifb0\x00', {}, {}, 0x0, 0x11}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @rand_addr=0xfffffffffffffc01, @dev={0xac, 0x14, 0x14, 0xc}, 0x8, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x6, 0xffffffffffffff08}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @empty, @multicast2=0xe0000002, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) r1 = socket$netlink(0x10, 0x3, 0x3) writev(r1, &(0x7f0000000040)=[{&(0x7f0000c80000)="390000001100090468fe00008100000006ee00400300000045000106000000000000000004000200003f0002000007e200e10c00f41ee40009", 0x39}], 0x1) 2018/04/17 06:47:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000005440)=[{{&(0x7f00000042c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x80, &(0x7f0000005400), 0x1ea}}], 0x1, 0x20000001) shmget$private(0x0, 0x3000, 0x8, &(0x7f0000ffb000/0x3000)=nil) pipe2(&(0x7f0000000000), 0x4) 2018/04/17 06:47:59 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006600)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000006700)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000006740)={r1, 0x1, 0x6, @random="acc85abe61a1"}, 0x10) madvise(&(0x7f0000a62000/0x1000)=nil, 0x1000, 0x10200000008) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000060c0)=[{{&(0x7f00000000c0)=@can, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/64, 0x40}, {&(0x7f0000000180)=""/119, 0x77}], 0x2, &(0x7f0000000240)=""/91, 0x5b, 0x5}, 0x3f}, {{&(0x7f00000002c0)=@can, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)=""/17, 0x11}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x4}}, {{&(0x7f00000003c0)=@ipx, 0x80, &(0x7f0000001700)=[{&(0x7f0000000440)=""/60, 0x3c}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/61, 0x3d}, {&(0x7f0000001580)=""/239, 0xef}, {&(0x7f0000001680)=""/103, 0x67}], 0x6, &(0x7f0000001780)=""/172, 0xac, 0xffffffffffffffc1}, 0x6}, {{&(0x7f0000001840)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f00000018c0)=""/38, 0x26}], 0x1, 0x0, 0x0, 0x1}, 0x7f}, {{&(0x7f0000001940)=@sco, 0x80, &(0x7f0000001a40)=[{&(0x7f00000019c0)=""/59, 0x3b}, {&(0x7f0000001a00)=""/41, 0x29}], 0x2, &(0x7f0000001a80)=""/241, 0xf1, 0xc8}}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001b80)=""/179, 0xb3}, {&(0x7f0000001c40)=""/186, 0xba}, {&(0x7f0000001d00)=""/237, 0xed}, {&(0x7f0000001e00)=""/39, 0x27}, {&(0x7f0000001e40)=""/24, 0x18}], 0x5, &(0x7f0000001f00), 0x0, 0x1}, 0x80}, {{&(0x7f0000001f40)=@nl=@unspec, 0x80, &(0x7f0000003340)=[{&(0x7f0000001fc0)=""/109, 0x6d}, {&(0x7f0000002040)=""/233, 0xe9}, {&(0x7f0000002140)=""/200, 0xc8}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/135, 0x87}, {&(0x7f0000003300)=""/49, 0x31}], 0x6, &(0x7f00000033c0)=""/4096, 0x1000, 0x4}, 0x2}, {{&(0x7f00000043c0)=@pppol2tpv3in6, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004440)=""/158, 0x9e}, {&(0x7f0000004500)=""/195, 0xc3}, {&(0x7f0000004600)=""/14, 0xe}, {&(0x7f0000004640)=""/2, 0x2}, {&(0x7f0000004680)=""/22, 0x16}], 0x5, 0x0, 0x0, 0xffff}, 0xec}, {{&(0x7f0000004740)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005fc0)=[{&(0x7f00000047c0)=""/133, 0x85}, {&(0x7f0000004880)=""/250, 0xfa}, {&(0x7f0000004980)=""/4096, 0x1000}, {&(0x7f0000005980)=""/173, 0xad}, {&(0x7f0000005a40)=""/154, 0x9a}, {&(0x7f0000005b00)=""/218, 0xda}, {&(0x7f0000005c00)=""/233, 0xe9}, {&(0x7f0000005d00)=""/235, 0xeb}, {&(0x7f0000005e00)=""/175, 0xaf}, {&(0x7f0000005ec0)=""/255, 0xff}], 0xa, &(0x7f0000006080)=""/16, 0x10, 0x4}, 0xfffffffffffff6cc}], 0x9, 0x40, &(0x7f0000006300)) 2018/04/17 06:47:59 executing program 7: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000e30fff)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') ioctl$KDADDIO(r1, 0x4b34, 0x6) readv(r0, &(0x7f0000000140), 0x0) 2018/04/17 06:47:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x3}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) pwritev(r0, &(0x7f0000000040), 0x0, 0xffffffffffffffff) 2018/04/17 06:47:59 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xffc5) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x800) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x2, 0x7, 0x1, 0x0, 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e21, @rand_addr=0x7}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in={0x2, 0x0, @rand_addr=0x8}, @in6={0xa, 0x4e24}], 0x5c) fallocate(r1, 0x3, 0x0, 0xffff) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000400)=0x5, &(0x7f0000000440)=0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0x0, 0x6}, 0xffffffffffffff15) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000540)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bcsf0\x00') fchdir(r3) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000c000200aaaaaaaaaabb0000140003006c6f00000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0xfffffffffffffc1e}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) 2018/04/17 06:47:59 executing program 6: r0 = socket(0x1e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x87, &(0x7f0000a94000), 0x0) 2018/04/17 06:47:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) bind$alg(r0, &(0x7f0000001540)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-camellia-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000052000)="21130000000000000000000000000000", 0x10) recvfrom$ax25(r1, &(0x7f0000000180)=""/207, 0xcf, 0x40, &(0x7f0000000000)={0x3, {"f378b099cbe7de"}, 0x7f}, 0x10) dup(r0) socket$alg(0x26, 0x5, 0x0) 2018/04/17 06:47:59 executing program 5: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4, 0x6) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) poll(&(0x7f00000001c0)=[{r1}], 0x0, 0x0) uname(&(0x7f0000000100)=""/21) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7ff, 0x8}, {0x7, 0xfffffffffffffffe}, {0x7, 0x3}, {0x7, 0xe0f}, {0x1000, 0x9}, {0x3, 0x7}, {0x75, 0xaa9}, {0x7ff, 0x423}]}) 2018/04/17 06:47:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xa, 0x4000000000080, 0x2, 0x1}, 0x14) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000140)={0x8, 0x0}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000180)={0xb9a0, r2, 0x2, 0x2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x40, 0x0, 0x10000}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000000c0)={0xffffffffffff7d76, r5, 0x10001, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000080)={0x40, r5, 0x10003, 0x1f}) 2018/04/17 06:47:59 executing program 3: unshare(0x2040600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000040), 0x10) r1 = gettid() r2 = geteuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={r1, r2, r3}, 0xc) 2018/04/17 06:47:59 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) sendto$inet6(r0, &(0x7f0000bc2000)="81", 0x1, 0x0, &(0x7f0000606fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) listen(r0, 0x7) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000100)=""/131, &(0x7f00000001c0)=0x83) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000004d80), &(0x7f0000004dc0)=0x10) 2018/04/17 06:47:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="ad56b6c5820faeb995298992ead4c70500000000b6e1a4c58dc47bddf5e7f060a6518bf1fad64cdda9d6d13fe17ce2dc14fcfa64a591338c0253f0cd50bb12445cd3898d03cdaeb3744e36000000", 0x4e) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000400)="5e1860416963a72c1718673e35425ae9eca8779df268aa55a0e94ae9a1f4ed99af4f1abd", 0x24) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/149, 0x95}, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x400000) r2 = socket$nl_route(0x10, 0x3, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r4) sendmsg$nl_route(r2, &(0x7f0000808fc8)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000e69fb8)=ANY=[@ANYBLOB="200000001800210c00000000000000008000090000000000001d000004000900"], 0x20}, 0x1}, 0x0) 2018/04/17 06:47:59 executing program 4: r0 = memfd_create(&(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000000)=0xe8) ftruncate(r0, 0x1000) bind$packet(r0, &(0x7f0000000180)={0x11, 0x8, r1, 0x1, 0xa2, 0x6, @random="a7095cef7869"}, 0x14) 2018/04/17 06:48:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f00001e3000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)={0x5, 0x0, [{0x4000, 0x7b, &(0x7f0000000000)=""/123}, {0x0, 0x25, &(0x7f0000000140)=""/37}, {0x0, 0xda, &(0x7f0000000180)=""/218}, {0x0, 0xd6, &(0x7f0000000280)=""/214}, {0xf000, 0x7e, &(0x7f0000000380)=""/126}]}) socket$key(0xf, 0x3, 0x2) 2018/04/17 06:48:00 executing program 7: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000100), 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x7, 0x4e22, 0x7, 0x2, 0x20, 0x80, 0x3c, 0x0, r1}, {0x6, 0x0, 0x8001, 0x7, 0x20, 0xffffffffffffffff, 0x8, 0x40}, {0x400, 0xffffffff7fffffff, 0x8c, 0xff}, 0xffffffffffffff01, 0x6e6bb7, 0x1, 0x1, 0x3, 0x3}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x4d2, 0xff}, 0x2, @in6, 0x0, 0x4, 0x1, 0xc93, 0x1, 0x20a, 0x6}}, 0xe8) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000dac000)={0x77359400}, &(0x7f0000048000), 0x0) 2018/04/17 06:48:00 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80, 0x800) ioctl$sock_ipx_SIOCIPXNCPCONN(r1, 0x89e3, &(0x7f00000000c0)=0xeca) setsockopt$llc_int(r1, 0x10c, 0xa, &(0x7f0000000100), 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000a000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ab9d224c3d1028beb16709693e614bfee0d5382ef9f5a7b5c198304eb4344bdce47db89b1028dc7793223ebfc033c0c21e63db30936ae2eec56725f0fc23f867f494bc224a8f0a9e8cd79bcbf639db36f6232e59d54120ffb60a4b08f6ac5ea2bbcbf9d22b82efd17598928cd6f657edd7be28917da6015f50efa03f25099148b60589131b3afdb1e585045ef09e289619f43c1c75b6f6fccafef7bb11d904c8fa4bea9389f31535ab39dd09a8557c5ffbba77e53ce2649601f7d26fa5f1d8f2d8df2cdb5f1c2e24d660728f7"], 0x290) 2018/04/17 06:48:00 executing program 3: clock_nanosleep(0x0, 0x0, &(0x7f00006ba000)={0x0, 0x1c9c380}, &(0x7f0000daaff8)) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)="5ed6bcb1c1451ec35f4b1ac7af4ab5571b7d8a69c0193e71c32b5bb295d845497ca9e8a019d3cee3a33ef7b38d3ed0427d92a6de9ebbce39669a6f1e7531c61d1799700565ec0621864aa5f84c33c7fba205a438b5d1f055cb607c7ec8fb53929ffd64960c20a497f9b6acfedd79474ea7d5f2e6daaf3ce9e8bdf35604a155ee284fc320a8a286e8d6d2cf70848350e8861969d05a37f51f6ef50014400ee1543e7e68e9a71189cc72b702896522a0c58ce6a96187385bd2c0706b7eef", 0xbd, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="426614ffd4a529fc83865964f4678b41a5550c5a5c319101ede58c0dac3e4edecfe456b26b2cca13819a76dbd1fabd6df7dab18afb0b27ddc70c3eba1e571556db39019fe689978170ae05be47c37ee12fae159c5b3ea06f4f1da2e94be1adc149d982240b93300e134b86350299155d53b88cd9762fc8a8c70f701c446690c5b55f260be4efce57ad2f40fef0409bd93d3f93119bbac9ce94200e3a5f4329ed32527b3ee9fe5a5b57b4ac71dbd03f0e8cadeab6d30f", 0xb6, 0xfffffffffffffffa) keyctl$unlink(0x9, r0, r1) io_setup(0x10001, &(0x7f0000000340)=0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000380), 0x4, &(0x7f00006c6000/0x3000)=nil, 0x2) io_destroy(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000536000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000000)=0x7, 0xb13, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000d19000)={0x2}, 0xfe88, 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x11004209}, 0xc) 2018/04/17 06:48:00 executing program 5: r0 = socket(0x2, 0x80804, 0x40000000000000ff) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e21, 0x9, @empty, 0x100000000}, {0xa, 0x4e21, 0x8001, @empty, 0x6}, 0x5, [0x100, 0x8, 0x5, 0x5, 0x2, 0x100, 0x0, 0x2]}, 0x5c) r1 = dup2(r0, r0) r2 = getpid() ioprio_get$pid(0x2, r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x401, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e22, @multicast2=0xe0000002}], 0x4c) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x8, 0x10000, 0x9}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000001c0)=""/105) sendmsg$netrom(r0, &(0x7f0000000a80)={&(0x7f0000000240)=@ax25={0x3, {"3a476ffcb18197"}, 0x1}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000280)="a922db745766bb88fa420c61a0afe7b6061b9c08f38e1f2094b7dc66b6e4602be0f20bbe29aab892575087cc57b04ef6d6e875854d186247ed5d66262a", 0x3d}, {&(0x7f00000002c0)="8a46c318f717e1099860f9c5a3aaf501cf3728fc622a5b24d50f5a24eafd09b9d21bf7c894c9116ab816a08022cc6fafddb9dbc0d635b9cc", 0x38}, {&(0x7f0000000300)="5ecf8d0c4ddb13086701f97e694312591621dc25cd24427a7fb10c2fd38880e2b7d8c526bb15e93df1b681f01a2ecb63ccbe1b22d747a2c50b2b3b8fced09ea86aa1f633c9ed1418e7dcd7f9a3678ab55a1c8878d616bd92c443aa1203884f7fa5a50e1c8debe0a7771563bcc5713ab8ebba16ce645927cb35e5049b0ce69583317a4f40138129a46874a671a065db7b40bb942a73b39a85c1c15e3cbc3c7c", 0x9f}, {&(0x7f00000003c0)="922bb2cb7825ff48a261d8be335f9ab14a25729a8bf14aaeb41ec4a7ef295a274c7943da9ecf6262731d3082a3563085f2c118555ebf9bd0d7232cec139d5b150eeb0ca417e8d582889083c43c", 0x4d}], 0x4, &(0x7f0000000480)=[{0x100, 0x18f, 0x8, "82cd4dbeb99a20055be74facb751c4ba9d2c50086797ee815f90857edfab6b50129c1398bb6a602f695effdd2e4d4c41f92c744f9577b346391a42e842cb3ee4263d72a14968f4311b3edd686890d9fcb83074e337695516f6629ba43015e06cbc2707345f7cd7bb6912cee989818599caf87d8d4cdd25dae56aa6d0bd501c2f4fc6dcdcd941c39f35fedbf91c014f8b5f26d591ff9f6e9a040c5af8a00b069b474e4066bc32b6e964f2b6530fece5e313c70c22dafc1e1ff20a0a5d6e346725bae7ec413c35e250323cf6ff3cdc591c2ea8b22e4693f41df856d7b3d79daae21ae1033b7353c83bc93b9207e17644"}, {0x108, 0x10c, 0xffff, "5a1e04728b7c1ea3e5d075a56b13e611c5c655635394993b60a50e416778b5a9de26942dd611d2ff743d65cebe191a971acb42f8a382311c357391800e0a256b2e36062aaf779c1d0184aab962b14ff3ec5ee00a5f07f590f68841c98bc1a1cb1c974329660eb5840b134206f76263d275a40b310e5ed6ff3a604b8158fd888d5549683b8eb56d53785f4425a34b96fa54e3c174d10c497e9140a9975de5777ca1a104483cde592fc57efba095a163f22173e07ce2003eafd9f6c1d8bb2fbf7bb048175396f8e79b178bc7800a3bacddeab2d5849723ea2b22a52df64cb0b58c63c13421e0f428153e3560c1e234307a7f7b1b4c"}, {0xe8, 0x11f, 0x1, "80ebc664aa5c71932a79131a5a67a6d3643a52038082bfcadead71030f750a81183b8965bbcd5bbbab5353794088084a07947655a5c3588fd76e7856b69b191bd06f45b990899f6c1aaf3d5303b98eba333bd9dbca8907bb134c365644f34af9e2d5434fb02262cee6a9f077d4e807e3033b058d73ab308756f2e851554f778121fbe997f5cbabb1c25b886b8396b57d87e1e2a30dd7f86cdc66d8e396afff58f84abb1fdaa89dc8782454e50a31de44f40fcd13fce851b68c03ff965188c1e99e2846e43873989325428e643aca9ded61f1642963"}, {0x18, 0x11b, 0x200, "fbe7f09681af9085"}, {0xe0, 0x0, 0x7fffffff, "5be7418b731f8722e78b6ac4e579b132184ce565d1e605af86e848f7e83fa67a9085348471888fcecb8d4b27933fb56410fd1aa37140ecce26afc1edb8ac4ec178b4012b0650dd32ea65e997b1c9f88b9359130180372cdf48a6b8e55399f8014e070f095c5775450ad9d621a95070f51ba12511fdaba747de931d36e95df18adb839087160c02be19b603af43f341694aa2ed0db4944df3f9b33e305d2876dab6d72d89bf72ad462c1aa5e3674dc739aabcd05236c3a10e074d89404360a4335f6a4440eb283398ecf9791ae156"}, {0xd0, 0x13f, 0x19, "cc961cb397d8cd7558535ab469c46e890c39f1e9fa366f1cd4fefc657b07b19244d50dfe51318ac8ff62066fe17ca2de6a6fbfda62ff549c6922263b43bba7526d62d8c796ade9399ba76e845f83b0c0b0b53d631f36460c27f2b6b96dccc1350215c5897d65a662ccc24fc4ff23186e31f5a92e80a6229c214e6ee4a7162df8e07f42d7e91a49da0260346c1d8faf0b8c2bc81b2964c3fe48aa452bd9a12c103bd3c913282172b5295f1a1c83f1b6b9ad362fd709c79e144c"}, {0xd8, 0x10b, 0xc176, "4fae69c369f8f8c1e7c8e3f56514818d7900687968f380adf055824df6f226972a0e9bf0dc91d8f066c3721a085abb15d330179b27ff078e8c868a36a503b0cef31904b91ba9365873db6b8ef1a51e1b6f82f3e0343d58779b67f5e99fc9cd90e56f75cc48b88456b04f5bbdfa61e35b63680cf372d483dd65f394f673be71b4871586084b6d1f7c2e40e692a5662bd0788726fd99d2adc3ec9d1b9f5b9011c73838bf0edc7ec169b4b1cb83c4560efd282a0f0cdd4d6b3df7e6c9193735a2a02d4484"}, {0x40, 0xff, 0x74dd, "555d352a9c12604c8cb1f492cad6f56cbf1957902038ed6d84690e40dbd92008d43040773161375ade5aa5d1"}], 0x5d0, 0x40050}, 0x4000000) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'bcsf0\x00', {0x2, 0x4e23, @rand_addr=0x7}}) shutdown(r0, 0xfffffffffffffffe) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000ac0), &(0x7f0000000b40)=0x68) sendto$inet(r0, &(0x7f0000dc2fe8)="d704000000000000000100000000040009001e88", 0x14, 0x0, &(0x7f0000000ff0)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) 2018/04/17 06:48:00 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f00000000c0)={&(0x7f00000013c0)=""/4096, 0x1000}) ptrace$setopts(0x4206, r1, 0x7f, 0x12) 2018/04/17 06:48:00 executing program 2: r0 = inotify_init() mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x1f, 0x81}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x1, 0x5c8b, 0x4}) 2018/04/17 06:48:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@hci, &(0x7f0000000100)=0x80, 0x80800) signalfd(r0, &(0x7f0000000140)={0x10001}, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000ffc)=@fragment, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x8005, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000040)) 2018/04/17 06:48:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x8, 0x800, 0x510, 'queue1\x00', 0x80000000}) 2018/04/17 06:48:00 executing program 0: r0 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x22232000) r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}) 2018/04/17 06:48:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) move_pages(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000ff4000/0xc000)=nil], &(0x7f00000000c0)=[0x8001], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) close(r0) 2018/04/17 06:48:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/sockstat\x00') ioctl$sock_proto_private(r0, 0x89ec, &(0x7f0000000040)="f6d12c24b2b7441be613b7f74c065fcf4d9142bc7b6490c9b5af0d8517a4a63ed511b1b9f2009032f477c35689fce5fae4afc5013a4d0c8ffb54066d8db6d9e045a6ae55ec6214361f3646a7ad144f36fad603453c3ff945d0da81b202971b4cf9d60c8955c781e40d36bc73588573fbf887d982168798c6278d167cbeca0d1b615689f39934f63d9767abe8fcee717435c2e8f3fb559209bba0cf6e08af051de6dfd9757f82d3bd1b85808f6339804e59a5e6c16bd22bcbda032b9e202bec9e726ddb8fb80001f7c61f6e96575c0a1b") readv(r0, &(0x7f0000002380)=[{&(0x7f0000002300)=""/69, 0x45}], 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x7, 0x2, 0x9}) 2018/04/17 06:48:00 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0xfffffffffffffff8, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000000eff4)={0x90000005}) epoll_wait(r1, &(0x7f000000affb)=[{}], 0x355, 0x0) 2018/04/17 06:48:01 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f00000001c0), 0x1) 2018/04/17 06:48:01 executing program 3: r0 = getgid() lchown(&(0x7f0000000200)='./file0\x00', 0x0, r0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004000)={0xffffffffffffffff, &(0x7f0000007000), &(0x7f0000000000), 0x4000}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000003fec)={0x0, 0x0, 0x4, 0x8}, 0x187) r2 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x400) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000004c0)={0x81, {0x2, 0x4e24, @multicast1=0xe0000001}, {0x2, 0x4e20, @broadcast=0xffffffff}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, 0x4, 0x1, 0x5, 0x8, &(0x7f0000000480)='teql0\x00', 0x3, 0xc1de, 0x2}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x4b99, 0x5) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) sendfile(r4, r4, &(0x7f0000000040), 0x1) fallocate(r3, 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f00000000c0)={0xc}) sendfile(r4, r3, 0x0, 0xc08f) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$llc(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) sendfile(r3, r1, &(0x7f0000000140), 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000240)=0x29e) capget(&(0x7f0000000180)={0x0, r6}, &(0x7f00000001c0)={0x9, 0x0, 0x5, 0x1, 0x1ff, 0x8}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) r7 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) sync() getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000380)=0x54) lseek(r7, 0x0, 0x0) r8 = fcntl$getown(r5, 0x9) capget(&(0x7f0000000080)={0x399f1336, r8}, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x1aef, 0x800, 0x304c, 0x5}) fdatasync(r2) 2018/04/17 06:48:01 executing program 7: r0 = socket$inet6(0xa, 0x200000002, 0x0) bind$inet6(r0, &(0x7f00005d6fe4)={0xa}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000040), 0x4) 2018/04/17 06:48:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x28060400) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r2, r3, r4}, 0xc) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/17 06:48:01 executing program 5: unshare(0x400) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000440)='net/rt6_stats\x00') ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0c0583b, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) 2018/04/17 06:48:01 executing program 2: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x40000) pipe(&(0x7f0000000140)={0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x3) mmap(&(0x7f00002ce000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x802132, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) lseek(r1, 0x0, 0x6) mount(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='qnx6\x00', 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x18140, 0x0) mmap(&(0x7f0000000000/0xdf5000)=nil, 0xdf5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/17 06:48:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='memory.stat\x00', 0x0, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f00000000c0)="07f2c178eb3bcaaab972fc797119cda566b07bb7fa98d6b62f2e7fe4ecfc622aebb67a32055809f8a8eb050e171271943a44414369a6c4a7c32c20b063a8d94a3897c724dad70ff2ea22194b83cd37c9f1ffe432640a389e02e2b1a91f343e5252cff7a38a78e131d55540a0c766bac9d48c4d02a2442defa3a142eec40740254d299cc973dbe56a4874d332e39ac64b52dd60a84bd09d4f6415c751f9f511e5138c8e895925b45a868a5f94ef1b26644e548cd048ccfa85b9be1da307") getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, 0x99f, 0x7fffffff, 0x8, 0x4}, &(0x7f0000000080)=0x98) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000300)={'syzkaller1\x00', 0x8}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)={r3, 0x1ff, 0x2, [0x5, 0x0]}, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000040)={0x28, 0x2, 0x2, 0x7ffffffff, 0x0, 0x0, {}, [@nested={0x14, 0x6, [@generic="b46e2fe913506edd96c8c82094"]}]}, 0x28}, 0x1}, 0x0) 2018/04/17 06:48:01 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @broadcast}, &(0x7f0000000200)=0xc) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, r1}, 0x14) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000002000)="b08205b420af456f148c7cfe394f6d358af4a464698cadff82bea950f7", &(0x7f00000003c0)}}, &(0x7f0000000540)=0x0) r3 = epoll_create1(0x80000) r4 = openat(0xffffffffffffff9c, &(0x7f000051f000)='./file0\x00', 0x40, 0x25339208158ec6c2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000100)={{r5, r6+10000000}, {0x77359400}}, &(0x7f0000000180)) execveat(r4, &(0x7f0000001ff8)='./file0\x00', &(0x7f0000000ff0), &(0x7f0000001fe4)=[&(0x7f0000000140)='mqueue\x00', &(0x7f0000000000)='/dev/vcs\x00', &(0x7f0000001000)='.posix_acl_access*vmnet0md5sumsecurity{keyringuser.wlan0selinux\x00'], 0x1000) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0x4}) [ 71.216190] ================================================================== [ 71.223794] WARNING: memcpy-param-overlap in generic_perform_write+0x4c6/0x990 [ 71.231247] __msan_memcpy(ffff8801c3b15001, ffff8801c3b15000, 4095) [ 71.237741] CPU: 1 PID: 6098 Comm: syz-executor3 Not tainted 4.16.0+ #84 [ 71.244596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.253970] Call Trace: [ 71.256596] dump_stack+0x185/0x1d0 [ 71.260259] __msan_memcpy+0x90/0x1f0 2018/04/17 06:48:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) prctl$intptr(0x17, 0x16) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/17 06:48:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x40, 0x0) connect$netrom(r1, &(0x7f0000000080)=@full={{0x3, {"46897ed52f8b03"}, 0x3}, [{"7c34b022e0d414"}, {"c6a5e89f1b4796"}, {"3cd70fa1273e42"}, {"5a9eeb2e7b1918"}, {"2e29ec0adaaeef"}, {"6310d0d801dab4"}, {"2e26fadc227d3b"}, {"091ed38e8e35d5"}]}, 0x48) setns(r1, 0x4000000) r2 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x811) write$evdev(r2, &(0x7f0000a59000)=[{{0x0, 0x7530}}, {}], 0x26) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000380)=0x8) 2018/04/17 06:48:01 executing program 7: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e21, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0xb0}}, 0x7, 0xffffffffffffffff, 0x200, "9747b421b235dd4aa7c2bb70ce7045ed29d48029523bc37df23617655cc34a6edee385076b509f304ffa66a99c11526f9d0073caa2322bd4881ddfb9126de0258cb2acb8f8753d9b3d98bc272c39c7e9"}, 0xd8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000003f42)="e9b1102fd162d2883afda6ca384faf121d74cc184624fce45026608dab3c7b831ea74850369babebbb881b4705fb9d5b6904ab9ea2bf03d896bd297cb7b37702c0a3363c7b53618766bfaea1eff261f0b2e23ea64dae4b74e1384260720bb174676f336b965c9cb4b46b75ae551d1a742a5e977acd7cce7ec8f0b0695c6d6012d40ea9373a4dcd9710956cc6e7ed45055df929909a53679bad", 0x99) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) fcntl$setstatus(r0, 0x4, 0x2800) sendto$inet6(r2, &(0x7f0000003fd9), 0xfdc2, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x16) [ 71.264103] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 71.269566] ================================================================== [ 71.276932] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 71.283685] CPU: 1 PID: 6098 Comm: syz-executor3 Not tainted 4.16.0+ #84 [ 71.290513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.299859] Call Trace: [ 71.302446] dump_stack+0x14a/0x1d0 [ 71.306076] ? kernel_text_address+0x248/0x3a0 [ 71.310651] kmsan_report+0x142/0x240 [ 71.314449] __msan_warning_32+0x6c/0xb0 [ 71.318515] kernel_text_address+0x248/0x3a0 [ 71.322930] __kernel_text_address+0x34/0xe0 [ 71.327345] show_trace_log_lvl+0x954/0x1030 [ 71.331752] ? generic_perform_write+0x4c6/0x990 [ 71.336518] show_stack+0xfc/0x150 [ 71.340058] ? print_worker_info+0x1b0/0x660 [ 71.344469] dump_stack+0x185/0x1d0 [ 71.348094] __msan_memcpy+0x90/0x1f0 [ 71.351897] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 71.357354] generic_perform_write+0x4c6/0x990 [ 71.361947] __generic_file_write_iter+0x43b/0x990 2018/04/17 06:48:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_names\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x3}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x15d}, 0x10) [ 71.366880] ? rcu_all_qs+0x32/0x1f0 [ 71.370602] generic_file_write_iter+0x814/0xbf0 [ 71.375364] ? __generic_file_write_iter+0x990/0x990 [ 71.380465] do_iter_readv_writev+0x7bb/0x970 [ 71.384976] ? __generic_file_write_iter+0x990/0x990 [ 71.390097] do_iter_write+0x30d/0xd40 [ 71.393991] ? kmsan_set_origin_inline+0x6b/0x120 [ 71.398832] ? __generic_file_write_iter+0x990/0x990 [ 71.403936] vfs_iter_write+0x118/0x180 [ 71.407921] iter_file_splice_write+0xbc3/0x1710 [ 71.412689] ? splice_from_pipe+0x2c0/0x2c0 2018/04/17 06:48:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) r1 = dup(r0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea9}, 0xb) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000740)={r2, @loopback=0x7f000001, @multicast2=0xe0000002}, 0xc) [ 71.417009] ? splice_from_pipe+0x2c0/0x2c0 [ 71.421333] direct_splice_actor+0x19b/0x200 [ 71.425747] splice_direct_to_actor+0x764/0x1040 [ 71.430506] ? do_splice_direct+0x540/0x540 [ 71.434829] ? security_file_permission+0x28f/0x4b0 [ 71.439849] ? rw_verify_area+0x35e/0x580 [ 71.444005] do_splice_direct+0x335/0x540 [ 71.448159] do_sendfile+0x1067/0x1e40 [ 71.452057] SYSC_sendfile64+0x297/0x300 [ 71.456126] SyS_sendfile64+0x64/0x90 [ 71.459924] do_syscall_64+0x309/0x430 [ 71.463817] ? SYSC_sendfile+0x320/0x320 [ 71.467883] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 71.473065] RIP: 0033:0x455329 [ 71.476248] RSP: 002b:00007f39b9185c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 71.483958] RAX: ffffffffffffffda RBX: 00007f39b91866d4 RCX: 0000000000455329 [ 71.491221] RDX: 0000000000000000 RSI: 0000000000000013 RDI: 0000000000000014 [ 71.498480] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 71.505736] R10: 000000000000c08f R11: 0000000000000246 R12: 00000000ffffffff [ 71.512999] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 71.520271] [ 71.521881] Local variable description: ----filepages.i@balance_dirty_pages_ratelimited [ 71.529997] Variable was created at: [ 71.533705] balance_dirty_pages_ratelimited+0xd3/0x4880 [ 71.539150] generic_perform_write+0x836/0x990 [ 71.543710] ================================================================== [ 71.551048] Disabling lock debugging due to kernel taint [ 71.556490] Kernel panic - not syncing: panic_on_warn set ... [ 71.556490] [ 71.563852] CPU: 1 PID: 6098 Comm: syz-executor3 Tainted: G B 4.16.0+ #84 [ 71.571981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.581311] Call Trace: [ 71.583898] dump_stack+0x14a/0x1d0 [ 71.587517] panic+0x39d/0x940 [ 71.590724] ? kernel_text_address+0x248/0x3a0 [ 71.595308] kmsan_report+0x238/0x240 [ 71.599116] __msan_warning_32+0x6c/0xb0 [ 71.603171] kernel_text_address+0x248/0x3a0 [ 71.607580] __kernel_text_address+0x34/0xe0 [ 71.611986] show_trace_log_lvl+0x954/0x1030 [ 71.616392] ? generic_perform_write+0x4c6/0x990 [ 71.621151] show_stack+0xfc/0x150 [ 71.624688] ? print_worker_info+0x1b0/0x660 [ 71.629082] dump_stack+0x185/0x1d0 [ 71.632695] __msan_memcpy+0x90/0x1f0 [ 71.636485] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 71.641945] generic_perform_write+0x4c6/0x990 [ 71.646534] __generic_file_write_iter+0x43b/0x990 [ 71.651450] ? rcu_all_qs+0x32/0x1f0 [ 71.655155] generic_file_write_iter+0x814/0xbf0 [ 71.659902] ? __generic_file_write_iter+0x990/0x990 [ 71.665091] do_iter_readv_writev+0x7bb/0x970 [ 71.669579] ? __generic_file_write_iter+0x990/0x990 [ 71.674668] do_iter_write+0x30d/0xd40 [ 71.678539] ? kmsan_set_origin_inline+0x6b/0x120 [ 71.683375] ? __generic_file_write_iter+0x990/0x990 [ 71.688480] vfs_iter_write+0x118/0x180 [ 71.692444] iter_file_splice_write+0xbc3/0x1710 [ 71.697199] ? splice_from_pipe+0x2c0/0x2c0 [ 71.701508] ? splice_from_pipe+0x2c0/0x2c0 [ 71.705809] direct_splice_actor+0x19b/0x200 [ 71.710202] splice_direct_to_actor+0x764/0x1040 [ 71.714948] ? do_splice_direct+0x540/0x540 [ 71.719266] ? security_file_permission+0x28f/0x4b0 [ 71.724277] ? rw_verify_area+0x35e/0x580 [ 71.728426] do_splice_direct+0x335/0x540 [ 71.732565] do_sendfile+0x1067/0x1e40 [ 71.736445] SYSC_sendfile64+0x297/0x300 [ 71.740504] SyS_sendfile64+0x64/0x90 [ 71.744293] do_syscall_64+0x309/0x430 [ 71.748162] ? SYSC_sendfile+0x320/0x320 [ 71.752208] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 71.757378] RIP: 0033:0x455329 [ 71.760549] RSP: 002b:00007f39b9185c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 71.768251] RAX: ffffffffffffffda RBX: 00007f39b91866d4 RCX: 0000000000455329 [ 71.775515] RDX: 0000000000000000 RSI: 0000000000000013 RDI: 0000000000000014 [ 71.782779] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 71.790039] R10: 000000000000c08f R11: 0000000000000246 R12: 00000000ffffffff [ 71.797296] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 71.805023] Dumping ftrace buffer: [ 71.808534] (ftrace buffer empty) [ 71.812214] Kernel Offset: disabled [ 71.815815] Rebooting in 86400 seconds..