INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. 2018/04/20 03:26:08 fuzzer started 2018/04/20 03:26:08 dialing manager at 10.128.0.26:41811 2018/04/20 03:26:14 kcov=true, comps=false 2018/04/20 03:26:17 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/20 03:26:17 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x2}, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400314, 0x12f03, 0x0, &(0x7f0000000080)) 2018/04/20 03:26:17 executing program 7: mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x6, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x0, 0xa, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) 2018/04/20 03:26:17 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') 2018/04/20 03:26:17 executing program 2: unshare(0x40600) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 2018/04/20 03:26:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000200)='\b', 0x1, 0x1000020020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f00000005c0)="9a", 0x1, 0x91, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/20 03:26:17 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x10b}, 0xffffffffffffff0d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x400000, 0x0, &(0x7f0000000000)) 2018/04/20 03:26:17 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x9}, 0xb) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) syzkaller login: [ 47.387373] ip (3869) used greatest stack depth: 54560 bytes left [ 47.741869] ip (3902) used greatest stack depth: 54200 bytes left [ 48.039432] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.045926] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.064314] device bridge_slave_0 entered promiscuous mode [ 48.122312] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.128805] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.166814] device bridge_slave_0 entered promiscuous mode [ 48.278648] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.285238] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.323251] device bridge_slave_0 entered promiscuous mode [ 48.336967] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.343459] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.372011] device bridge_slave_1 entered promiscuous mode [ 48.382764] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.389214] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.399539] device bridge_slave_0 entered promiscuous mode [ 48.414198] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.420753] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.444009] device bridge_slave_1 entered promiscuous mode [ 48.457093] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.463588] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.481298] device bridge_slave_0 entered promiscuous mode [ 48.489746] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.497697] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.509654] device bridge_slave_0 entered promiscuous mode [ 48.526421] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.532931] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.548790] device bridge_slave_0 entered promiscuous mode [ 48.571233] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.577711] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.600077] device bridge_slave_0 entered promiscuous mode [ 48.613463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.623812] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.630320] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.644777] device bridge_slave_1 entered promiscuous mode [ 48.655088] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.661572] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.672893] device bridge_slave_1 entered promiscuous mode [ 48.683248] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.689758] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.722988] device bridge_slave_1 entered promiscuous mode [ 48.731227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.740461] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.746979] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.779765] device bridge_slave_1 entered promiscuous mode [ 48.786535] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.793096] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.811088] device bridge_slave_1 entered promiscuous mode [ 48.839254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.850105] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.856616] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.878995] device bridge_slave_1 entered promiscuous mode [ 48.891000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.901923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.928413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.956933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.002790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.019757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.089506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.098158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.108541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.168953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.211152] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.228266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.377632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.823251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.987649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.044252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.098147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.141257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.156500] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.203990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.245232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.263424] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.298866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.333819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 50.361447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.372018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.470071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.477471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.585978] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 51.116850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.193420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.322654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.346636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.368096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.409988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.428729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.439731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.511458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.537290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.552726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.566189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.588399] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.598952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.617526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.657742] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.665391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.693633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.725197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.732951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.745541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.754693] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.761832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.772920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.835486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.842746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.856850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.880380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.888157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.895778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.909926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.939402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.972185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.995748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.019375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.031692] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.039898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.056553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.064728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.081262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.098235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.105566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.116148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.138205] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.147650] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.159883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 52.171699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.188445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.241827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.266360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.293814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.313628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.334838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.342720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.350906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.359666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.367098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.375914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.396617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.413364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.428834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.451786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 52.462225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.495356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.323886] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.330387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.337347] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.343838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.418521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.429276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.456005] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.462547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.469476] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.475931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.492621] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.676244] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.682761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.689633] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.696148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.704727] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.713765] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.720232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.727091] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.733504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.743491] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.758732] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.765214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.772221] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.778702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.795381] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.809139] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.815709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.822633] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.829144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.884963] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.894789] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.901272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.908274] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.914799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.940348] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.953790] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.960305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.967224] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.973700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.024287] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.456776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.474814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.509760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.542675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.562718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.578668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.586161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.000898] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.052121] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.253484] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.292191] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.316982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.416955] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.538466] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.546783] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.819954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.826298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.838731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.887405] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.893734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.901416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.117609] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.125118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.137626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.160467] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.170146] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.182098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.207201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.239574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.257915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.281449] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.292810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.312409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.347253] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.355234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.381831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.406467] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.413710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.426509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.451501] ip (5262) used greatest stack depth: 53976 bytes left 2018/04/20 03:26:45 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000100)="020000002800001f00000040", 0xc, 0x0) 2018/04/20 03:26:45 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x2}, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x400314, 0x12f03, 0x0, &(0x7f0000000080)) 2018/04/20 03:26:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000a82fc0), &(0x7f0000a8d000)={0x0, 0x989680}, &(0x7f00006ab000)={&(0x7f00001da000), 0x8}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}, [0x9, 0x81, 0x18, 0x0, 0x3, 0x2, 0x9, 0x7, 0x0, 0x0, 0x0, 0x5, 0x10001, 0x8]}, &(0x7f0000000040)=0x100) 2018/04/20 03:26:45 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x9}, 0xb) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/20 03:26:45 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000010000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000010c90)=ANY=[@ANYBLOB="2000000058000103ffffffffffffffff000000000000260008000000"], 0x1}, 0x1}, 0x0) 2018/04/20 03:26:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/11}, 0x329f5b02923c274, 0x0, 0x6b67fc445e09dd4a) 2018/04/20 03:26:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@bridge_newneigh={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa}}, 0x1c}, 0x1}, 0x0) 2018/04/20 03:26:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00005a1000)={&(0x7f0000f7ffa8)=ANY=[@ANYBLOB="3400000019000100040000000000000002200000ff00fe000000000008000600ab00000008000400", @ANYBLOB="080001007f000001"], 0x2}, 0x1, 0x0, 0x0, 0x4006}, 0x4000000) 2018/04/20 03:26:45 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x809802, &(0x7f0000653ff0)={0x2, 0x4e20}, 0x10) 2018/04/20 03:26:45 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x9}, 0xb) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 03:26:45 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000200)='\b', 0x1, 0x1000020020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f0000000240)="d7", 0x1, 0x0, &(0x7f00000006c0)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="9a", 0x1, 0x91, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000d00)='lp\x00', 0x3) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/20 03:26:45 executing program 2: 2018/04/20 03:26:45 executing program 1: 2018/04/20 03:26:45 executing program 3: 2018/04/20 03:26:45 executing program 5: 2018/04/20 03:26:45 executing program 4: 2018/04/20 03:26:45 executing program 1: 2018/04/20 03:26:45 executing program 3: 2018/04/20 03:26:45 executing program 7: 2018/04/20 03:26:45 executing program 2: 2018/04/20 03:26:45 executing program 5: 2018/04/20 03:26:45 executing program 6: 2018/04/20 03:26:45 executing program 0: 2018/04/20 03:26:45 executing program 4: 2018/04/20 03:26:45 executing program 3: 2018/04/20 03:26:45 executing program 1: 2018/04/20 03:26:46 executing program 4: 2018/04/20 03:26:46 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000080)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x2}, 0x8) 2018/04/20 03:26:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02030000160000000000000000000000040003200000000000220000000000000000000000000000000000000000000004000600000000000a0000000000000000000000000000000000000000000000000000bf67fcad95e51a918b80b0f2047c000000000004000400000000000000000000000000000000000000000000000000ff0300000000000000000000000000000000000005000500000000000a00000000000000fe800000000000000000"], 0xb0}, 0x1}, 0x0) 2018/04/20 03:26:46 executing program 6: uname(&(0x7f0000000cc0)=""/4096) 2018/04/20 03:26:46 executing program 3: unshare(0x40600) r0 = timerfd_create(0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) dup3(0xffffffffffffffff, r0, 0x0) syz_open_dev$sg(&(0x7f0000000380)='/dev/sg#\x00', 0x0, 0x0) 2018/04/20 03:26:46 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000080)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x2}, 0x8) 2018/04/20 03:26:46 executing program 1: 2018/04/20 03:26:46 executing program 5: 2018/04/20 03:26:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0x2, 0x6, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x32}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x0, 0x0, &(0x7f0000000080)) close(r0) 2018/04/20 03:26:46 executing program 7: 2018/04/20 03:26:46 executing program 4: 2018/04/20 03:26:46 executing program 6: 2018/04/20 03:26:46 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000080)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x2}, 0x8) 2018/04/20 03:26:46 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000b06ffc), 0x4) write(r1, &(0x7f0000001c40), 0x0) close(r0) 2018/04/20 03:26:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x104) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x104) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter6\x00') readv(r2, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/246, 0xf6}, {&(0x7f0000000340)=""/170, 0xaa}], 0x2) 2018/04/20 03:26:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x202}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller0\x00', {0x2}}) 2018/04/20 03:26:46 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000780)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000002800010c00000000000000000000000008000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}, 0x1}, 0x0) 2018/04/20 03:26:46 executing program 3: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x1) 2018/04/20 03:26:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x10000000000001, 0x0) bind$unix(r1, &(0x7f0000674ff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000006000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) close(r1) 2018/04/20 03:26:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000001680)="9b", 0x1) r1 = syz_open_pts(r0, 0x80a80) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/104, 0x68}], 0x1) 2018/04/20 03:26:46 executing program 4: r0 = gettid() capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}) [ 72.750417] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 2018/04/20 03:26:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net\x00') getdents64(r0, &(0x7f0000000380)=""/142, 0xfffffffffffffd31) 2018/04/20 03:26:47 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000080)="25c897d4", 0x4}], 0x1, 0x0) ioctl(r0, 0x20000000002201, &(0x7f0000000080)) 2018/04/20 03:26:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x20000000002203, &(0x7f0000000040)) 2018/04/20 03:26:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x202}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller0\x00', {0x2}}) 2018/04/20 03:26:47 executing program 4: r0 = gettid() capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}) 2018/04/20 03:26:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"7643986e300000ff0700"}) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="2900000018001980013d75241a0407210206e30067ffbd010a0000000800050000000200080000bf00", 0x29}], 0x1) 2018/04/20 03:26:47 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x10000000000001, 0x0) bind$unix(r1, &(0x7f0000674ff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000006000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) close(r1) 2018/04/20 03:26:47 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f0000000100), 0x0, &(0x7f0000000000/0x4000)=nil, 0x2) 2018/04/20 03:26:47 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x80000000}) 2018/04/20 03:26:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18002000000000000000000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/04/20 03:26:47 executing program 5: r0 = socket$inet6(0xa, 0x8000000000000802, 0x1000000088) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r0, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/20 03:26:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"7643986e300000ff0700"}) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="2900000018001980013d75241a0407210206e30067ffbd010a0000000800050000000200080000bf00", 0x29}], 0x1) 2018/04/20 03:26:47 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000020f88)="24000000100007031dfffd946fa2830020200a0009000300001d85687f0000000400ff7e28000000050a43ba16a0aa1ca10bb356da5d8060000000060000000029ec2400020cd37ed01cc073", 0x4c}], 0x1}, 0x0) 2018/04/20 03:26:47 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x18040100, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000e9b000), &(0x7f00000000c0)) 2018/04/20 03:26:47 executing program 1: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00000000c0)) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) 2018/04/20 03:26:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00003b8ffc)=0x246) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) 2018/04/20 03:26:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/110, 0x9c) getdents64(r0, &(0x7f0000f57971)=""/1679, 0x68f) getdents64(r0, &(0x7f0000179f35)=""/203, 0xcb) 2018/04/20 03:26:48 executing program 2: 2018/04/20 03:26:48 executing program 3: 2018/04/20 03:26:48 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4080007fd}, 0xc) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) 2018/04/20 03:26:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x361, 0x10400003) 2018/04/20 03:26:48 executing program 5: 2018/04/20 03:26:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000009c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000ac0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=ANY=[@ANYBLOB="380000001800110300000000000000000a000000000000000000000008000400", @ANYBLOB="140001"], 0x2}, 0x1}, 0x0) 2018/04/20 03:26:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x4f}, 0xffffff7e) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x6f2000, 0x7fffffffefff, 0x0, &(0x7f0000000080)) 2018/04/20 03:26:48 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/04/20 03:26:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000adbd3964f87bac4750dd4035309aeb312c676927b6444674bbc2b9d50072c9cc55c22e875084ab4fceb8e7ea81b45a6bc9f07f8ab1b1af6deade64bce0da7d23baa6eae183056d9e79e46794f8d0da132953cee86e63eb729fe7fc7db33b37123110fdd50b60064d73a40abec4e425b832f42891051050d424f200fc", 0xa0) 2018/04/20 03:26:48 executing program 6: 2018/04/20 03:26:48 executing program 1: 2018/04/20 03:26:48 executing program 4: 2018/04/20 03:26:48 executing program 0: 2018/04/20 03:26:48 executing program 5: 2018/04/20 03:26:48 executing program 7: 2018/04/20 03:26:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x4f}, 0xffffff7e) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x6f2000, 0x7fffffffefff, 0x0, &(0x7f0000000080)) 2018/04/20 03:26:48 executing program 6: 2018/04/20 03:26:48 executing program 4: 2018/04/20 03:26:48 executing program 1: 2018/04/20 03:26:49 executing program 3: 2018/04/20 03:26:49 executing program 6: 2018/04/20 03:26:49 executing program 5: 2018/04/20 03:26:49 executing program 0: 2018/04/20 03:26:49 executing program 7: 2018/04/20 03:26:49 executing program 4: 2018/04/20 03:26:49 executing program 1: 2018/04/20 03:26:49 executing program 2: 2018/04/20 03:26:49 executing program 3: 2018/04/20 03:26:49 executing program 0: 2018/04/20 03:26:49 executing program 6: 2018/04/20 03:26:49 executing program 1: 2018/04/20 03:26:49 executing program 5: 2018/04/20 03:26:49 executing program 4: 2018/04/20 03:26:49 executing program 7: 2018/04/20 03:26:49 executing program 2: 2018/04/20 03:26:49 executing program 3: 2018/04/20 03:26:49 executing program 0: 2018/04/20 03:26:49 executing program 6: 2018/04/20 03:26:49 executing program 1: 2018/04/20 03:26:49 executing program 4: 2018/04/20 03:26:49 executing program 5: 2018/04/20 03:26:49 executing program 7: 2018/04/20 03:26:49 executing program 2: 2018/04/20 03:26:49 executing program 0: 2018/04/20 03:26:49 executing program 3: 2018/04/20 03:26:49 executing program 6: 2018/04/20 03:26:49 executing program 1: 2018/04/20 03:26:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000000)=@bridge_newneigh={0x30, 0x1c, 0x801, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x8}, [@NDA_DST_IPV6={0x14, 0x1, @loopback={0x0, 0x1}}]}, 0x30}, 0x1}, 0x0) 2018/04/20 03:26:49 executing program 4: 2018/04/20 03:26:49 executing program 2: 2018/04/20 03:26:49 executing program 7: 2018/04/20 03:26:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8b94, &(0x7f0000000080)={"76657468300000000000000600", @ifru_data=&(0x7f0000000000)="9fc5f2ef50193fd242b40558e885d1f8bfae3547be1005d1415e41ee8be6bff1"}) 2018/04/20 03:26:49 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@dev={0xfe, 0x80}, 0x0, 0x0, 0xff, 0x1}, 0x20) 2018/04/20 03:26:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f00000000c0), 0x89) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) ioctl$VT_DISALLOCATE(r1, 0x5608) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x5fd9, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000100)='oom_score_adj\x00', 0x0, 0x0, &(0x7f0000000140)) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000976000), 0x0, 0x0, &(0x7f000072e000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socket$inet6_sctp(0xa, 0x0, 0x84) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@mcast2}, &(0x7f0000000140)=0x14) socket$inet(0x2, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000ad6fad), 0x0, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/20 03:26:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x9}, 0xb) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="b6", 0x1}], 0x1) close(r0) 2018/04/20 03:26:49 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) 2018/04/20 03:26:49 executing program 4: 2018/04/20 03:26:50 executing program 7: 2018/04/20 03:26:50 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 2018/04/20 03:26:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000000), 0x1}], 0x1000000000000030) 2018/04/20 03:26:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast=0xffffffff}, 0xd) 2018/04/20 03:26:50 executing program 7: clone(0x40000000, &(0x7f0000000280), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000002c0)) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) [ 76.183762] hrtimer: interrupt took 56235 ns 2018/04/20 03:26:50 executing program 4: 2018/04/20 03:26:50 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/04/20 03:26:50 executing program 3: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f00000000c0)="d8", 0x1) fallocate(r0, 0x10, 0x0, 0x8000) 2018/04/20 03:26:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000000), 0x1}], 0x1000000000000030) 2018/04/20 03:26:50 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 2018/04/20 03:26:50 executing program 0: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000000000000aafe8000000000000000000003000000aa4e204e20", @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f00000002c0)) 2018/04/20 03:26:50 executing program 7: clone(0x40000000, &(0x7f0000000280), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000002c0)) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) 2018/04/20 03:26:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002fdd)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f000000bf20)=ANY=[@ANYBLOB="5c000000150001000000000000000000e0000002000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="1d000000000000000c0008000800080004000000"], 0x3}, 0x1}, 0x0) 2018/04/20 03:26:51 executing program 4: 2018/04/20 03:26:51 executing program 0: 2018/04/20 03:26:51 executing program 5: 2018/04/20 03:26:51 executing program 3: 2018/04/20 03:26:51 executing program 6: 2018/04/20 03:26:51 executing program 1: 2018/04/20 03:26:51 executing program 2: 2018/04/20 03:26:51 executing program 4: 2018/04/20 03:26:51 executing program 1: 2018/04/20 03:26:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) 2018/04/20 03:26:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 2018/04/20 03:26:51 executing program 5: 2018/04/20 03:26:51 executing program 0: 2018/04/20 03:26:51 executing program 6: 2018/04/20 03:26:51 executing program 4: 2018/04/20 03:26:51 executing program 1: 2018/04/20 03:26:51 executing program 3: 2018/04/20 03:26:51 executing program 7: 2018/04/20 03:26:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 2018/04/20 03:26:51 executing program 6: 2018/04/20 03:26:51 executing program 1: 2018/04/20 03:26:51 executing program 5: 2018/04/20 03:26:51 executing program 0: 2018/04/20 03:26:51 executing program 4: 2018/04/20 03:26:51 executing program 3: 2018/04/20 03:26:51 executing program 7: 2018/04/20 03:26:52 executing program 0: 2018/04/20 03:26:52 executing program 7: getpid() socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0xfffffffffffffe3b) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x730000, 0x0, 0x0, &(0x7f0000000000)) 2018/04/20 03:26:52 executing program 3: 2018/04/20 03:26:52 executing program 6: 2018/04/20 03:26:52 executing program 2: r0 = socket(0x10, 0x4000000000000802, 0x0) write(r0, &(0x7f0000000040)="1f0000001e0007f1ffffffe60700007702000041576b8d3d6c3908d2000145", 0x1f) recvfrom$inet(r0, &(0x7f0000000080)=""/133, 0x85, 0x0, 0x0, 0x0) 2018/04/20 03:26:52 executing program 5: 2018/04/20 03:26:52 executing program 1: 2018/04/20 03:26:52 executing program 4: 2018/04/20 03:26:52 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000500)=[{0x0, 0x7}], 0x1) 2018/04/20 03:26:52 executing program 1: clock_gettime(0x8, &(0x7f0000962000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @multicast1}, &(0x7f0000000280)=0xc) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0x11, @multicast1=0xe0000001, 0x0, 0x1000000080000003, 'none\x00'}, 0x2c) fdatasync(r0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'nr0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00', r1}) 2018/04/20 03:26:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond_slave_0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000740)=ANY=[@ANYBLOB="340000001400092500000000000000000a000000", @ANYBLOB="080008000006000014000200ff020401000000000000f8ff00000001"], 0x2}, 0x1}, 0x0) 2018/04/20 03:26:52 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="cdbf0e000084aaaaaaaaaaaa86dd6002290f00383a00fe07f17bc1576c5325a06be56fa5b2b23fa3d400000000000000000000ff02000000020000000000000000000102009042f7d82d06592aa342150baca66375a1780000000000000000b52e0000000001fe8000002000000000c7c40e4f07f4e74ed49e826710e6daca255f0799a69a85eb5ddb6b1cc612273bbea5810e1b9584f6860cf3b381b715ca79432481f0713663910d8b55fb02ba2eadac6a66ecf841e9bd6d23ad3b0939bfb16d86edef32f5d6543a4738840dfc5d2e8ad7cb5ffff5"], 0x0) 2018/04/20 03:26:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') sendfile(r0, r0, &(0x7f0000000000)=0x7ffff, 0x20000000000000a) 2018/04/20 03:26:52 executing program 2: getpid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0xfffffffffffffe3b) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x730000, 0x0, 0x0, &(0x7f0000000000)) 2018/04/20 03:26:52 executing program 4: 2018/04/20 03:26:52 executing program 6: 2018/04/20 03:26:52 executing program 0: 2018/04/20 03:26:52 executing program 7: 2018/04/20 03:26:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ffb3", 0xc9}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg(r0, &(0x7f00000006c0)={&(0x7f00000004c0)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000540)="a06eaae79895a4ecdccf1b49f5d4b0598b89b33829194e5d", 0x18}], 0x1, &(0x7f0000002600)}, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'team_slave_1\x00'}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)="6ba4c0c6b5b92ede308b8deccd086680187e74d58a9c4a2aed1119aaeb43eacf6d290b3eea39f888fe93387d3958299e694c7ff6c35bd931c6e788b0f74cd1425e05d1693123d3008d738b6adfacb8a8ca260e843b9f7e7929855c58eb0362649fd4e76522ed9bd0603fa75896f6c76688c531637a4a9e742462587697fd6df5c9cdc1e95f3d739a43a913e6550eb0b08146346168125026f29247e77b22c28d66350c3416da10bbb97f6ad1e38ba447a639b63e7909f3d420b2af5c86275f58e4", 0xc1}], 0x1}, 0x1) 2018/04/20 03:26:52 executing program 5: 2018/04/20 03:26:52 executing program 1: 2018/04/20 03:26:52 executing program 3: 2018/04/20 03:26:52 executing program 2: 2018/04/20 03:26:52 executing program 5: 2018/04/20 03:26:52 executing program 7: 2018/04/20 03:26:52 executing program 3: 2018/04/20 03:26:52 executing program 0: 2018/04/20 03:26:52 executing program 6: 2018/04/20 03:26:52 executing program 2: 2018/04/20 03:26:52 executing program 1: 2018/04/20 03:26:53 executing program 3: 2018/04/20 03:26:53 executing program 4: 2018/04/20 03:26:53 executing program 0: 2018/04/20 03:26:53 executing program 5: 2018/04/20 03:26:53 executing program 7: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) close(r0) 2018/04/20 03:26:53 executing program 1: 2018/04/20 03:26:53 executing program 6: 2018/04/20 03:26:53 executing program 2: 2018/04/20 03:26:53 executing program 3: 2018/04/20 03:26:53 executing program 0: mbind(&(0x7f0000af3000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000fbf000)=0xcbf, 0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000c28000)=0x800003f, 0x5, 0x0) 2018/04/20 03:26:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ffb3", 0xc9}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'team_slave_1\x00'}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)="6ba4c0c6b5b92ede308b8deccd086680187e74d58a9c4a2aed1119aaeb43eacf6d290b3eea39f888fe93387d3958299e694c7ff6c35bd931c6e788b0f74cd1425e05d1693123d3008d738b6adfacb8a8ca260e843b9f7e7929855c58eb0362649fd4e76522ed9bd0603fa75896", 0x6d}], 0x1}, 0x1) 2018/04/20 03:26:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4080000000004) write(r0, &(0x7f000058bfe4)="29000000140003b711010000040860eb01000100000000000fd57f6f61425e9ddcd54025ffffff0100", 0x29) 2018/04/20 03:26:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00', 0x2) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000080), 0x4) timer_create(0x0, &(0x7f0000001380)={0x0, 0x0, 0x1, @thr={&(0x7f0000000280), &(0x7f0000000380)}}, &(0x7f00000013c0)) timer_delete(0x0) 2018/04/20 03:26:53 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast=0xffffffff, {[@ssrr={0x89, 0x3, 0x5}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000001c0)) 2018/04/20 03:26:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)={0x10}, 0x10}], 0x1, &(0x7f0000000540)=[@rights={0x18, 0x1, 0x1, [r2, r1, r2]}], 0x18, 0x80}, 0x0) 2018/04/20 03:26:53 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x10000000002, &(0x7f0000704ffb)="89070404", 0x4) 2018/04/20 03:26:53 executing program 7: r0 = memfd_create(&(0x7f00000005c0)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da49550403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d758337ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70f42b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0x3) write(r0, &(0x7f0000000240)='v', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) fcntl$addseals(r0, 0x409, 0xc) write(r0, &(0x7f000006e000), 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x8) 2018/04/20 03:26:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 2018/04/20 03:26:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x1}, 0xc) [ 80.632400] ================================================================== [ 80.639984] WARNING: memcpy-param-overlap in generic_perform_write+0x4c6/0x990 [ 80.647454] __msan_memcpy(ffff8801bec69001, ffff8801bec69000, 8) [ 80.653875] CPU: 0 PID: 6351 Comm: syz-executor7 Not tainted 4.16.0+ #84 [ 80.660750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.670125] Call Trace: [ 80.672737] dump_stack+0x185/0x1d0 [ 80.676418] ? __perf_event_task_sched_in+0x9ed/0xa40 [ 80.681648] __msan_memcpy+0x90/0x1f0 [ 80.685470] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 80.690922] ================================================================== [ 80.698281] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 80.705023] CPU: 0 PID: 6351 Comm: syz-executor7 Not tainted 4.16.0+ #84 [ 80.711854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.721197] Call Trace: [ 80.723792] dump_stack+0x14a/0x1d0 [ 80.727405] ? kernel_text_address+0x248/0x3a0 [ 80.731992] kmsan_report+0x142/0x240 [ 80.735799] __msan_warning_32+0x6c/0xb0 [ 80.739851] kernel_text_address+0x248/0x3a0 [ 80.744252] __kernel_text_address+0x34/0xe0 [ 80.748643] show_trace_log_lvl+0x954/0x1030 [ 80.753046] ? generic_perform_write+0x4c6/0x990 [ 80.757818] show_stack+0xfc/0x150 [ 80.761362] ? print_worker_info+0x1b0/0x660 [ 80.765758] dump_stack+0x185/0x1d0 [ 80.769368] ? __perf_event_task_sched_in+0x9ed/0xa40 [ 80.774557] __msan_memcpy+0x90/0x1f0 [ 80.778967] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 80.784415] generic_perform_write+0x4c6/0x990 [ 80.788980] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 80.794342] __generic_file_write_iter+0x43b/0x990 [ 80.799255] ? rwsem_down_write_failed+0x2c/0x30 [ 80.804004] generic_file_write_iter+0x814/0xbf0 [ 80.808765] ? __generic_file_write_iter+0x990/0x990 [ 80.813850] do_iter_readv_writev+0x7bb/0x970 [ 80.818329] ? __generic_file_write_iter+0x990/0x990 [ 80.823418] do_iter_write+0x30d/0xd40 [ 80.827288] ? kmsan_set_origin_inline+0x6b/0x120 [ 80.832125] ? __generic_file_write_iter+0x990/0x990 [ 80.837208] vfs_iter_write+0x118/0x180 [ 80.841167] iter_file_splice_write+0xbc3/0x1710 [ 80.845913] ? splice_from_pipe+0x2c0/0x2c0 [ 80.850247] ? splice_from_pipe+0x2c0/0x2c0 [ 80.854555] direct_splice_actor+0x19b/0x200 [ 80.858952] splice_direct_to_actor+0x764/0x1040 [ 80.863691] ? do_splice_direct+0x540/0x540 [ 80.868007] ? security_file_permission+0x28f/0x4b0 [ 80.873037] ? rw_verify_area+0x35e/0x580 [ 80.877171] do_splice_direct+0x335/0x540 [ 80.881318] do_sendfile+0x1067/0x1e40 [ 80.885208] SYSC_sendfile64+0x1b3/0x300 [ 80.889255] SyS_sendfile64+0x64/0x90 [ 80.893043] do_syscall_64+0x309/0x430 [ 80.896926] ? SYSC_sendfile+0x320/0x320 [ 80.900979] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.906149] RIP: 0033:0x455379 [ 80.909318] RSP: 002b:00007f395cb98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 80.917022] RAX: ffffffffffffffda RBX: 00007f395cb996d4 RCX: 0000000000455379 [ 80.924282] RDX: 0000000020000040 RSI: 0000000000000013 RDI: 0000000000000013 [ 80.931535] RBP: 000000000072c0c8 R08: 0000000000000000 R09: 0000000000000000 [ 80.938784] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 80.946044] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000003 [ 80.953296] [ 80.954903] Local variable description: ----flags.i.i.i.i@enter_lazy_tlb [ 80.961712] Variable was created at: [ 80.965410] enter_lazy_tlb+0x30/0x120 [ 80.969278] __schedule+0x5e6/0x730 [ 80.972878] ================================================================== [ 80.980216] Disabling lock debugging due to kernel taint [ 80.985655] Kernel panic - not syncing: panic_on_warn set ... [ 80.985655] [ 80.993003] CPU: 0 PID: 6351 Comm: syz-executor7 Tainted: G B 4.16.0+ #84 [ 81.001131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.010465] Call Trace: [ 81.013055] dump_stack+0x14a/0x1d0 [ 81.016668] panic+0x39d/0x940 [ 81.019874] ? kernel_text_address+0x248/0x3a0 [ 81.024437] kmsan_report+0x238/0x240 [ 81.028216] __msan_warning_32+0x6c/0xb0 [ 81.032259] kernel_text_address+0x248/0x3a0 [ 81.036649] __kernel_text_address+0x34/0xe0 [ 81.041048] show_trace_log_lvl+0x954/0x1030 [ 81.045441] ? generic_perform_write+0x4c6/0x990 [ 81.050196] show_stack+0xfc/0x150 [ 81.053726] ? print_worker_info+0x1b0/0x660 [ 81.058135] dump_stack+0x185/0x1d0 [ 81.061744] ? __perf_event_task_sched_in+0x9ed/0xa40 [ 81.066916] __msan_memcpy+0x90/0x1f0 [ 81.070702] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 81.076157] generic_perform_write+0x4c6/0x990 [ 81.080734] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 81.086081] __generic_file_write_iter+0x43b/0x990 [ 81.090990] ? rwsem_down_write_failed+0x2c/0x30 [ 81.095743] generic_file_write_iter+0x814/0xbf0 [ 81.100492] ? __generic_file_write_iter+0x990/0x990 [ 81.105576] do_iter_readv_writev+0x7bb/0x970 [ 81.110069] ? __generic_file_write_iter+0x990/0x990 [ 81.115163] do_iter_write+0x30d/0xd40 [ 81.119050] ? kmsan_set_origin_inline+0x6b/0x120 [ 81.123887] ? __generic_file_write_iter+0x990/0x990 [ 81.128979] vfs_iter_write+0x118/0x180 [ 81.132942] iter_file_splice_write+0xbc3/0x1710 [ 81.137772] ? splice_from_pipe+0x2c0/0x2c0 [ 81.142072] ? splice_from_pipe+0x2c0/0x2c0 [ 81.146374] direct_splice_actor+0x19b/0x200 [ 81.150763] splice_direct_to_actor+0x764/0x1040 [ 81.155503] ? do_splice_direct+0x540/0x540 [ 81.159805] ? security_file_permission+0x28f/0x4b0 [ 81.164888] ? rw_verify_area+0x35e/0x580 [ 81.169027] do_splice_direct+0x335/0x540 [ 81.173166] do_sendfile+0x1067/0x1e40 [ 81.177056] SYSC_sendfile64+0x1b3/0x300 [ 81.181107] SyS_sendfile64+0x64/0x90 [ 81.184895] do_syscall_64+0x309/0x430 [ 81.188763] ? SYSC_sendfile+0x320/0x320 [ 81.192803] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 81.197970] RIP: 0033:0x455379 [ 81.201136] RSP: 002b:00007f395cb98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 81.208820] RAX: ffffffffffffffda RBX: 00007f395cb996d4 RCX: 0000000000455379 [ 81.216074] RDX: 0000000020000040 RSI: 0000000000000013 RDI: 0000000000000013 [ 81.223322] RBP: 000000000072c0c8 R08: 0000000000000000 R09: 0000000000000000 [ 81.230577] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 81.237824] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000003 [ 81.245584] Dumping ftrace buffer: [ 81.249109] (ftrace buffer empty) [ 81.252809] Kernel Offset: disabled [ 81.256420] Rebooting in 86400 seconds..