INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. 2018/04/06 23:30:23 fuzzer started 2018/04/06 23:30:24 dialing manager at 10.128.0.26:38639 2018/04/06 23:30:30 kcov=true, comps=false 2018/04/06 23:30:32 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) 2018/04/06 23:30:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000480)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952f9521d5b2238ecbce3fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:32 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390d006dc80000009d4d54", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000b37000)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000140)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}, 0x0) recvmsg$kcm(r1, &(0x7f0000e63000)={0x0, 0xfffffffffffffea8, &(0x7f0000000100)=[{&(0x7f0000588fa9)=""/87, 0x389}], 0x1, &(0x7f0000142000)=""/60, 0x3c}, 0x0) 2018/04/06 23:30:32 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x200000026}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x3, 0x730000, 0x730008, &(0x7f0000000640)) 2018/04/06 23:30:33 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xed}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x4, 0x3, 0x1, &(0x7f0000000300)) 2018/04/06 23:30:33 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:33 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @broadcast=0xffffffff, 0x0, 0x0, 'wlc\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/06 23:30:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x40) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000740)={0x0, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000440)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0x50, [], 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000100)=""/80}, &(0x7f0000000200)=0x78) syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="38a9cc145b74aaaaaaaaaaaa0806000186dd061000090180c200000000000000000000000000000000000000aaaaaaaaaa000000000001"], &(0x7f00000002c0)={0x0, 0x3, [0x86d, 0xef8, 0xe9a, 0x49d]}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x7a8, 0x0, 0xfffffffffffff88c}, 0xc) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x109800, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)=0x0) timer_create(0x0, &(0x7f0000000340)={0x0, 0x36, 0x4, @tid=r3}, &(0x7f0000000380)) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000005c0)={'ipvs\x00'}, &(0x7f0000000600)=0x1e) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000004c0)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'lblc\x00'}, 0x2c) dup(r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000680)={0x0, 0x0, 0x1ff, 0x0, 0x1}) syzkaller login: [ 38.303546] ip (3758) used greatest stack depth: 54672 bytes left [ 38.863537] ip (3811) used greatest stack depth: 54408 bytes left [ 39.837273] ip (3908) used greatest stack depth: 54200 bytes left [ 41.684968] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 41.892726] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 41.950596] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.010258] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.028168] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.074184] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.089655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.105522] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.302223] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.467807] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.739894] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.753541] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.829390] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.851863] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.878348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.969977] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.056980] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.063252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.072920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.259939] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.266181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.274644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.495971] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.502289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.516645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.544513] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.553200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.573187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.602668] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.609377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.626524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.657798] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.665359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.687767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.743512] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.749764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.763603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.823597] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.830121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.841698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/06 23:30:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r0, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 2018/04/06 23:30:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f00006ba000)={@link_local={0x1, 0x80, 0xc2}, @random="e2701bb60689", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001, "b09b6d5c2a91e414699d955ce83b632ad4049739030d61b6f37e405db505735e"}}}}}, &(0x7f0000ea3000)) 2018/04/06 23:30:50 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:50 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000acf000)={0x0, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000998f70)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) 2018/04/06 23:30:50 executing program 4: msgsnd(0x0, &(0x7f0000292ff8), 0x8, 0x0) msgsnd(0x0, &(0x7f0000000000), 0x8, 0x0) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/79}, 0x57, 0x1, 0xa4a3ad41a879dde0) 2018/04/06 23:30:50 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390d006dc80000009d4d54", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000b37000)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000140)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}, 0x0) recvmsg$kcm(r1, &(0x7f0000e63000)={0x0, 0xfffffffffffffea8, &(0x7f0000000100)=[{&(0x7f0000588fa9)=""/87, 0x389}], 0x1, &(0x7f0000142000)=""/60, 0x3c}, 0x0) 2018/04/06 23:30:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000002a0025f000150000000000000080000916000000000000000000000000000000", 0x24) 2018/04/06 23:30:50 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000480)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952f9521d5b2238ecbce3fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:50 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="0f", 0x1) 2018/04/06 23:30:50 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x20000e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) sendto$inet(r0, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000794ffc)=0x8e, 0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000100), 0xbcc19d340664a29f) 2018/04/06 23:30:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r0, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 2018/04/06 23:30:50 executing program 6: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000008c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28}, 0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) add_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000440)=@generic={0x0, "4fb6fa0caf25b268a55c08c613f3f83fc27648dd12b3cbdd7c8ecededa2f6b45c7d072ab4edf865217948b4ad4cf71a33febae62873e1bd25d9ee00943b811be4b1a7d66dd33eff03e229b7b18257f49a33106c205ad3353b82345bbf1328684a3e166d814f9dadde96ec71795763ead6dd09668d7c5b406b6ddc265d3e0"}, 0x80, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0) 2018/04/06 23:30:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") fstat(r0, &(0x7f0000000080)) 2018/04/06 23:30:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000bc0)="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", 0x439, 0x0, &(0x7f00000000c0)={0x2}, 0x10) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/06 23:30:50 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x63, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/06 23:30:50 executing program 7: syz_emit_ethernet(0x1fd, &(0x7f0000000080)={@random="85a970b0146b", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff82, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x4], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) 2018/04/06 23:30:51 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:51 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000480)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952f9521d5b2238ecbce3fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 2018/04/06 23:30:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f000034dff4)={0x10}, 0xc, &(0x7f00004f3ff0)={&(0x7f000034dcb0)={0x14, 0x11, 0x1000000000901}, 0x14}, 0x1}, 0x0) 2018/04/06 23:30:51 executing program 3: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') 2018/04/06 23:30:51 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setrlimit(0x7, &(0x7f000046eff0)) dup(r0) 2018/04/06 23:30:51 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x4000) 2018/04/06 23:30:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000bc0)="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", 0x439, 0x0, &(0x7f00000000c0)={0x2}, 0x10) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/06 23:30:51 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000100), 0x4) sendmsg(r0, &(0x7f0000000bc0)={&(0x7f0000000240)=@l2={0x1f}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000c00)}, 0x0) 2018/04/06 23:30:51 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x4000) 2018/04/06 23:30:51 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xb0}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 2018/04/06 23:30:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x80}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 2018/04/06 23:30:51 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x84}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x705000, 0x1, &(0x7f0000000180)) 2018/04/06 23:30:52 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000480)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952f9521d5b2238ecbce3fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x84}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x7fffffffefff, 0x1, &(0x7f0000000180)) 2018/04/06 23:30:52 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xca}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x8004700b, 0x1, &(0x7f0000000000)) 2018/04/06 23:30:52 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x4000) 2018/04/06 23:30:52 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x84}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x400000, 0x1, &(0x7f0000000180)) 2018/04/06 23:30:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x788}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xad}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 2018/04/06 23:30:52 executing program 2: r0 = socket$inet(0x2, 0x4008000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000ac0), 0x0, 0x20000802, &(0x7f0000000a80)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0), 0xfff, 0x0, &(0x7f00000002c0)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/06 23:30:52 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="1d6fde797136c2386a228b2c7dc0db9fe425c699e778d27d2a0be2dd0a8181144dc32436b22ffc6811f328a5c037dda211dbb5af4ba9a344db162af7f634ac682fac91ba531aa52158688822703802a85aea3bf2e347305da3c5be4f1af3cd9de7bcb7eaf15fa038cd14fa33d96f6e61007d2aaf1ce979c31a5cd2425f0617209272c6705f5ee8a6c9ff4cc516a6f31b29b9caff246001ede21be2df5166ff227bacf436397a89e30d94416a092a7c8c4c0b7552cbf2de6040beedeef0de68480799ede0c3a8", 0xc6, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 2018/04/06 23:30:52 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f000018c000)={0x0, 0x2710}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000014, &(0x7f0000beeffc)=0xfffffffffffffffd, 0x4) sendto$inet(r0, &(0x7f0000a2d000), 0xffffffffffffff8e, 0x20000000, &(0x7f00007f4000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) syz_emit_ethernet(0x79, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/06 23:30:52 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000080)) 2018/04/06 23:30:52 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x312, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/06 23:30:52 executing program 6: r0 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r0, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) writev(r0, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') 2018/04/06 23:30:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000005b80)="8000000000040000ae000000d90300006c000000010000000000000000000000002000000020000080740000000000002b5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)=ANY=[]) 2018/04/06 23:30:52 executing program 5: r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:52 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='vmnet1(+/vboxnet1&)%\x00') r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x101000, 0x0) sendto$ipx(r1, &(0x7f00000002c0)="4a628d1cca248d94bb8071a99289cde4603dba5705819cdec8a94fa5235db33c603496457092fbc40ef69c", 0x2b, 0x8000, &(0x7f0000000300)={0x4, 0x1, 0xff, "256294b0be1b", 0x75a9}, 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) ioctl$TIOCEXCL(r1, 0x540c) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="e30c2dc299027d029b") ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)=r1) getpeername$unix(r1, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) 2018/04/06 23:30:52 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000bba000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000080)) 2018/04/06 23:30:52 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000a7c000)=0x2d, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e20, @multicast1=0xe0000001}}) 2018/04/06 23:30:52 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x7fff, 0x2, 0x8000, 0x80000000, 0x0}, &(0x7f0000000040)=0x10) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10, 0x80800) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e23, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}}, 0x84) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) madvise(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x9) setsockopt$inet_int(r0, 0x0, 0x25, &(0x7f0000000080)=0x5fe, 0x4) 2018/04/06 23:30:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554faab744adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a288bc2854cf884ed860d26200fa7eb8437972a66281cee276a5f8a672d1ac9c41f93b40d5c3ada641c8dbac8049196402a589def17bd6656890e7ba5b4bbe2b84b954d5c9881df5f39cc2699ea2dd4e437aef80a2dccab9eee06ee04") unshare(0x8000400) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e22, 0x800, @empty, 0xfffffffffffffffa}, {0xa, 0x4e23, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x100000001}, 0x10000, [0x8, 0x3f, 0x7ff0, 0x4, 0x80000, 0x8, 0x2, 0x1]}, 0x5c) read$eventfd(r0, &(0x7f0000000200), 0x8000) 2018/04/06 23:30:52 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:52 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x8) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) close(r2) 2018/04/06 23:30:53 executing program 5: r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:53 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x0, 0x1, 0x9, 0x3, 0xcb0b}, 0xc) 2018/04/06 23:30:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x40086602, &(0x7f00000000c0)={0x800cd}) 2018/04/06 23:30:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000cab5b3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000d6af50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) 2018/04/06 23:30:53 executing program 6: clone(0x6, &(0x7f0000000000), &(0x7f0000476ffc), &(0x7f0000000040), &(0x7f000043dffe)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000637ff8)={0xeb}, 0x8, 0x0) read(r0, &(0x7f0000000180)=""/128, 0x80) 2018/04/06 23:30:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="2f6465762e7309003f880dd3a83fd1d4ae455e00a29f2be8440000000000000000", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r0, r1) 2018/04/06 23:30:53 executing program 5: r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:53 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7001) 2018/04/06 23:30:53 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:53 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x200000}) 2018/04/06 23:30:53 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in6}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 2018/04/06 23:30:53 executing program 3: r0 = memfd_create(&(0x7f0000d65000)='-ppp0#:)\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) 2018/04/06 23:30:53 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:53 executing program 0: r0 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 2018/04/06 23:30:53 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000000140)='nfs4\x00', 0x0, &(0x7f0000590ffe)='v4') 2018/04/06 23:30:53 executing program 6: clone(0x6, &(0x7f0000000000), &(0x7f0000476ffc), &(0x7f0000000040), &(0x7f000043dffe)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000637ff8)={0xeb}, 0x8, 0x0) read(r0, &(0x7f0000000180)=""/128, 0x80) 2018/04/06 23:30:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000540)={0x10, 0x0, 0x0, 0x400000000006}, 0xc) 2018/04/06 23:30:54 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000002fba)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="832e9efd8612", @empty, @random="8e6749a6601f", @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f0000007000)) 2018/04/06 23:30:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000001ac0)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 2018/04/06 23:30:54 executing program 3: syz_emit_ethernet(0x261, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @rand_addr, @link_local={0x1, 0x80, 0xc2}, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x0) 2018/04/06 23:30:54 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0), &(0x7f00000001c0), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000b7dff0), &(0x7f0000048000), 0x0) exit(0x0) 2018/04/06 23:30:54 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x4) [ 57.169169] device bridge0 entered promiscuous mode 2018/04/06 23:30:54 executing program 7: socket$packet(0x11, 0x800000000002, 0x300) r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/06 23:30:54 executing program 6: clock_gettime(0x4, &(0x7f0000226000)) clock_gettime(0x400002000000000c, &(0x7f0000000040)) [ 57.375482] device bridge0 left promiscuous mode [ 57.482602] syz-executor7 (5361) used greatest stack depth: 53248 bytes left 2018/04/06 23:30:55 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f00000004c0)={{0x0, 0x2710}}, 0x0) 2018/04/06 23:30:55 executing program 6: clock_gettime(0x4, &(0x7f0000226000)) clock_gettime(0x400002000000000c, &(0x7f0000000040)) 2018/04/06 23:30:55 executing program 7: r0 = semget$private(0x0, 0x6, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) semtimedop(r0, &(0x7f0000000080)=[{}], 0x1, &(0x7f00000000c0)) 2018/04/06 23:30:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) fadvise64(r0, 0x4d, 0x10000, 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000400)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup2(0xffffffffffffffff, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) fsync(r0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) fsync(r0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000003c0)={0x6, 0x0, 0x2, 0x7, 0xe0, 0x3, 0x324, 0x8dc3}, 0x20) 2018/04/06 23:30:55 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xe, {0x2, 0x0, @broadcast=0xffffffff}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/06 23:30:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000480)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000002d00)=[{&(0x7f0000000880)="a1", 0x1}], 0x1}, 0x4841) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xfd2e, 0x21, 0x0, 0x0) 2018/04/06 23:30:55 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffd, 0x4) 2018/04/06 23:30:55 executing program 6: clock_gettime(0x4, &(0x7f0000226000)) clock_gettime(0x400002000000000c, &(0x7f0000000040)) 2018/04/06 23:30:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000acd000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000001c0)) 2018/04/06 23:30:55 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f00000004c0)={{0x0, 0x2710}}, 0x0) 2018/04/06 23:30:55 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0x0, 0x4) 2018/04/06 23:30:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000480)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000002d00)=[{&(0x7f0000000880)="a1", 0x1}], 0x1}, 0x4841) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xfd2e, 0x21, 0x0, 0x0) 2018/04/06 23:30:55 executing program 6: clock_gettime(0x4, &(0x7f0000226000)) clock_gettime(0x400002000000000c, &(0x7f0000000040)) 2018/04/06 23:30:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000acd000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000001c0)) 2018/04/06 23:30:55 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0x0, 0x4) 2018/04/06 23:30:56 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f00000004c0)={{0x0, 0x2710}}, 0x0) 2018/04/06 23:30:56 executing program 6: clock_gettime(0x400002000000000c, &(0x7f0000000040)) 2018/04/06 23:30:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x440000000000127c, &(0x7f0000000040)) 2018/04/06 23:30:56 executing program 7: r0 = semget$private(0x0, 0x6, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) semtimedop(r0, &(0x7f0000000080)=[{}], 0x1, &(0x7f00000000c0)) 2018/04/06 23:30:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ddff8), 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a"}) 2018/04/06 23:30:56 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0x0, 0x4) 2018/04/06 23:30:56 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/254}, {&(0x7f0000000000)=""/72}, {&(0x7f0000000200)=""/75}, {&(0x7f0000000300)=""/104}], 0x116, &(0x7f00000011c0)}, 0x0) sendto$inet(r0, &(0x7f0000000480)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952f9521d5b2238ecbce3fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) 2018/04/06 23:30:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x2, 0x4e21, 0x8048, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x3, 0x3ca07082, 0x0, 0x0, 0xfffffffe000}, {0x3f, 0x5da, 0x7fff}, 0x20, 0x6e6bbf, 0x1, 0x0, 0x0, 0x3}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d5, 0xff}, 0xa, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x34ff, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1}}, 0xe8) truncate(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) 2018/04/06 23:30:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x3) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) sendfile(r0, r1, &(0x7f00000ddff8)=0xe00, 0x102000001) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf, 0x0, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) 2018/04/06 23:30:56 executing program 6: clock_gettime(0x0, &(0x7f0000000040)) 2018/04/06 23:30:56 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f00003e9000)='./control/file0\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x0) [ 59.524213] ================================================================== [ 59.531605] BUG: KMSAN: uninit-value in copy_page_to_iter+0x754/0x1b70 [ 59.538264] CPU: 0 PID: 5449 Comm: blkid Not tainted 4.16.0+ #81 [ 59.544398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.553739] Call Trace: [ 59.556327] dump_stack+0x185/0x1d0 [ 59.559951] ? kmsan_internal_check_memory+0x145/0x1d0 [ 59.565218] kmsan_report+0x142/0x240 [ 59.569015] kmsan_internal_check_memory+0x164/0x1d0 [ 59.574118] kmsan_copy_to_user+0x69/0x160 [ 59.578353] copy_page_to_iter+0x754/0x1b70 [ 59.582686] generic_file_read_iter+0x2ee8/0x43f0 [ 59.587544] blkdev_read_iter+0x20d/0x280 [ 59.591695] ? blkdev_write_iter+0x5f0/0x5f0 [ 59.596097] __vfs_read+0x6fb/0x8e0 [ 59.599725] vfs_read+0x36c/0x6c0 [ 59.603173] SYSC_read+0x172/0x360 [ 59.606712] SyS_read+0x55/0x80 [ 59.609983] do_syscall_64+0x309/0x430 [ 59.613869] ? vfs_write+0x8d0/0x8d0 [ 59.617583] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.622759] RIP: 0033:0x7f59c5db2310 [ 59.626454] RSP: 002b:00007ffe30281668 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 59.634150] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59c5db2310 [ 59.641408] RDX: 0000000000000400 RSI: 000000000211bc58 RDI: 0000000000000003 [ 59.648667] RBP: 000000000211bc30 R08: 0000000000000028 R09: 0000000001680000 [ 59.655932] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000211b030 [ 59.663195] R13: 0000000000000400 R14: 000000000211b080 R15: 000000000211bc48 [ 59.670458] [ 59.672067] Uninit was stored to memory at: [ 59.676382] kmsan_internal_chain_origin+0x12b/0x210 [ 59.681475] kmsan_memcpy_origins+0x11d/0x170 [ 59.685957] __msan_memcpy+0x19f/0x1f0 [ 59.689835] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 59.695277] generic_perform_write+0x4c6/0x990 [ 59.699850] __generic_file_write_iter+0x43b/0x990 [ 59.704767] blkdev_write_iter+0x3a8/0x5f0 [ 59.708991] do_iter_readv_writev+0x7bb/0x970 [ 59.713476] do_iter_write+0x30d/0xd40 [ 59.717352] vfs_iter_write+0x118/0x180 [ 59.721316] iter_file_splice_write+0xbc3/0x1710 [ 59.726066] direct_splice_actor+0x19b/0x200 [ 59.730462] splice_direct_to_actor+0x764/0x1040 [ 59.735204] do_splice_direct+0x335/0x540 [ 59.739336] do_sendfile+0x1067/0x1e40 [ 59.743217] SYSC_sendfile64+0x1b3/0x300 [ 59.747266] SyS_sendfile64+0x64/0x90 [ 59.751054] do_syscall_64+0x309/0x430 [ 59.754931] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.760098] Uninit was created at: [ 59.763627] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 59.768629] kmsan_alloc_page+0x82/0xe0 [ 59.772593] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 59.777334] alloc_pages_vma+0xcc8/0x1800 [ 59.781472] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 59.786476] shmem_getpage_gfp+0x35db/0x5770 [ 59.790873] shmem_file_read_iter+0x508/0x1180 [ 59.795447] generic_file_splice_read+0x4e8/0x830 [ 59.800286] splice_direct_to_actor+0x4c6/0x1040 [ 59.805030] do_splice_direct+0x335/0x540 [ 59.809163] do_sendfile+0x1067/0x1e40 [ 59.813040] SYSC_sendfile64+0x1b3/0x300 [ 59.817091] SyS_sendfile64+0x64/0x90 [ 59.820881] do_syscall_64+0x309/0x430 [ 59.824774] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.829943] [ 59.831556] Bytes 0-1023 of 1024 are uninitialized [ 59.836463] ================================================================== [ 59.843802] Disabling lock debugging due to kernel taint [ 59.849235] Kernel panic - not syncing: panic_on_warn set ... [ 59.849235] [ 59.856590] CPU: 0 PID: 5449 Comm: blkid Tainted: G B 4.16.0+ #81 [ 59.864017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.873351] Call Trace: [ 59.875940] dump_stack+0x185/0x1d0 [ 59.879559] panic+0x39d/0x940 [ 59.882759] ? kmsan_internal_check_memory+0x145/0x1d0 [ 59.888021] kmsan_report+0x238/0x240 [ 59.891816] kmsan_internal_check_memory+0x164/0x1d0 [ 59.896909] kmsan_copy_to_user+0x69/0x160 [ 59.901135] copy_page_to_iter+0x754/0x1b70 [ 59.905458] generic_file_read_iter+0x2ee8/0x43f0 [ 59.910307] blkdev_read_iter+0x20d/0x280 [ 59.914448] ? blkdev_write_iter+0x5f0/0x5f0 [ 59.918848] __vfs_read+0x6fb/0x8e0 [ 59.922470] vfs_read+0x36c/0x6c0 [ 59.925924] SYSC_read+0x172/0x360 [ 59.929465] SyS_read+0x55/0x80 [ 59.932740] do_syscall_64+0x309/0x430 [ 59.936621] ? vfs_write+0x8d0/0x8d0 [ 59.940328] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.945504] RIP: 0033:0x7f59c5db2310 [ 59.949202] RSP: 002b:00007ffe30281668 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 59.956897] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59c5db2310 [ 59.964159] RDX: 0000000000000400 RSI: 000000000211bc58 RDI: 0000000000000003 [ 59.971418] RBP: 000000000211bc30 R08: 0000000000000028 R09: 0000000001680000 [ 59.978674] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000211b030 [ 59.985930] R13: 0000000000000400 R14: 000000000211b080 R15: 000000000211bc48 [ 59.995125] Dumping ftrace buffer: [ 59.998636] (ftrace buffer empty) [ 60.002318] Kernel Offset: disabled [ 60.005915] Rebooting in 86400 seconds..