INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. 2018/04/22 11:41:52 fuzzer started 2018/04/22 11:41:52 dialing manager at 10.128.0.26:42949 syzkaller login: [ 49.845195] can: request_module (can-proto-0) failed. [ 49.856963] can: request_module (can-proto-0) failed. 2018/04/22 11:41:59 kcov=true, comps=false 2018/04/22 11:42:02 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0xffffffffffffffff, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'syz_tun\x00'}}, 0x1e) 2018/04/22 11:42:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000007c0)={'team_slave_1\x00'}) 2018/04/22 11:42:02 executing program 7: r0 = socket(0x10, 0x400000000003, 0x0) write(r0, &(0x7f0000000140)="170000001a001bed0000132100f404fffffd9872eff0cf", 0x17) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002e00)=[{{&(0x7f00000000c0)=@nfc_llcp, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000800)=""/250, 0xfa}}, {{&(0x7f0000000900)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000001d40)=""/4096, 0x1000}], 0x1, &(0x7f0000002f00)=""/39, 0x27}}], 0x2, 0x0, &(0x7f0000000000)={0x0, r1+10000000}) 2018/04/22 11:42:02 executing program 4: 2018/04/22 11:42:02 executing program 2: 2018/04/22 11:42:02 executing program 3: 2018/04/22 11:42:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)='g', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) 2018/04/22 11:42:02 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x44) [ 54.694154] IPVS: ftp: loaded support on port[0] = 21 [ 54.802602] IPVS: ftp: loaded support on port[0] = 21 [ 54.865289] IPVS: ftp: loaded support on port[0] = 21 [ 54.944267] IPVS: ftp: loaded support on port[0] = 21 [ 55.076509] IPVS: ftp: loaded support on port[0] = 21 [ 55.161843] IPVS: ftp: loaded support on port[0] = 21 [ 55.296185] IPVS: ftp: loaded support on port[0] = 21 [ 55.465927] IPVS: ftp: loaded support on port[0] = 21 [ 56.286922] ip (4671) used greatest stack depth: 54408 bytes left [ 57.026609] ip (4729) used greatest stack depth: 54200 bytes left [ 57.770709] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.777209] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.800480] device bridge_slave_0 entered promiscuous mode [ 57.877203] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.883711] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.923101] device bridge_slave_0 entered promiscuous mode [ 57.986293] ip (4796) used greatest stack depth: 54184 bytes left [ 57.992638] ip (4800) used greatest stack depth: 53656 bytes left [ 58.043492] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.050125] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.088713] device bridge_slave_1 entered promiscuous mode [ 58.149864] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.156371] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.189842] device bridge_slave_1 entered promiscuous mode [ 58.324441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.390621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.416369] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.422886] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.456226] device bridge_slave_0 entered promiscuous mode [ 58.522488] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.528989] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.568203] device bridge_slave_0 entered promiscuous mode [ 58.587854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.631390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.653802] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.660290] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.724977] device bridge_slave_1 entered promiscuous mode [ 58.743181] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.749710] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.757296] device bridge_slave_0 entered promiscuous mode [ 58.804628] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.811143] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.855006] device bridge_slave_1 entered promiscuous mode [ 58.869512] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.876091] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.898195] device bridge_slave_0 entered promiscuous mode [ 58.925504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.934747] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.941264] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.977970] device bridge_slave_1 entered promiscuous mode [ 59.055792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.096066] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.102575] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.138320] device bridge_slave_1 entered promiscuous mode [ 59.156813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.165204] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.171679] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.220266] device bridge_slave_0 entered promiscuous mode [ 59.237013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.266523] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.275550] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.282014] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.290957] device bridge_slave_0 entered promiscuous mode [ 59.308839] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.325557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.341483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.444610] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.451134] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.472842] device bridge_slave_1 entered promiscuous mode [ 59.497014] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.512956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.545278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.553277] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.559784] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.608268] device bridge_slave_1 entered promiscuous mode [ 59.635732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.683791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.709776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.817255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.862880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.869952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.931070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.951542] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.981656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.988801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.069886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.077413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.090506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.146134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.167311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.174340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.186918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.235347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.390857] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.405220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.412743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.463358] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.473233] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.609335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.667333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.675618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.686485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.702128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.729212] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.741498] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.756670] team0: Port device team_slave_0 added [ 60.780210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.787244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.804536] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.830086] team0: Port device team_slave_0 added [ 60.855947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.925431] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.932461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.966015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.973501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.017843] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.033253] team0: Port device team_slave_1 added [ 61.052215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.061930] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.088176] team0: Port device team_slave_1 added [ 61.104793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.111775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.172109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.181866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.199299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.224632] team0: Port device team_slave_0 added [ 61.263313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.270374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.285148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.311710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.324220] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.344233] team0: Port device team_slave_1 added [ 61.357995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.403978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.413788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.428290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.466117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.473690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.480694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.492424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.520467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.571782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.578844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.607765] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.618645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.632572] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.667123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.678911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.707281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.738171] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.746199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.764875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.816326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.838162] team0: Port device team_slave_0 added [ 61.876144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.890260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.904808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.929619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.939752] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.954086] team0: Port device team_slave_0 added [ 61.969369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.995182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.034714] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.049740] team0: Port device team_slave_0 added [ 62.069647] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.077471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.095577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.116334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.128559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.147832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.174871] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.193436] team0: Port device team_slave_1 added [ 62.208894] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.218296] team0: Port device team_slave_1 added [ 62.241632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.249190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.262263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.302525] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.316434] team0: Port device team_slave_1 added [ 62.344360] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.369720] team0: Port device team_slave_0 added [ 62.391813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.407830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.421855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.467836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.477160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.493086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.512810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.521594] team0: Port device team_slave_0 added [ 62.545419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.553262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.574826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.612477] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.637913] team0: Port device team_slave_1 added [ 62.656471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.666783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.680246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.722607] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.729659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.742712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.771290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.789328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.808129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.839425] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.858663] team0: Port device team_slave_1 added [ 62.887120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.894236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.915088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.946799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.959795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.990303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.047288] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.054827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.073518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.096207] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.103728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.118334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.139801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.159806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.167867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.177759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.216147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.246824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.279279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.299134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.307753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.338215] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.345930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.367410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.394909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.406785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.414817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.426344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.441173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.480211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.506242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.520008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.532358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.574256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.590102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.612640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.641342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.651523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.675208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.839694] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.847486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.868900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.104522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.112169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.125372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.850840] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.857368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.864287] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.870754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.903156] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.914368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.163100] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.169599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.176489] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.182941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.216548] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.259830] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.266327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.273252] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.279708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.353875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.886213] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.892726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.899622] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.906119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.952758] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.969286] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.975748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.982595] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.989073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.003486] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.014499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.025925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.033614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.042013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.251943] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.258438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.265318] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.271765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.281827] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.349475] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.355988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.362911] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.369407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.434295] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.502798] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.509308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.516246] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.522729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.596227] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.039396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.051904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.077908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.987235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.169545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.573528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.846817] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.861921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.980005] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.146404] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.268541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.396613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.435356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.665739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.675671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.697810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.750073] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.777660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.866190] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.872964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.885172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.000462] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.157460] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.223809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.321882] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.328197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.341922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.575810] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.595743] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.603102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.616880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.639522] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.706216] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.854782] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.861297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.873462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.089828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.096215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.109511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.156608] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.186619] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.193190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.213982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.484735] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.506559] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.512875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.523741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.670570] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.996919] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.036356] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.358623] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.192225] team_slave_1: Invalid MTU 0 requested, hw min 68 [ 82.235695] team_slave_1: Invalid MTU 0 requested, hw min 68 2018/04/22 11:42:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000031c0)=@migrate_id={0x12, 0x10, 0xfa00, {&(0x7f00000006c0), 0xffffffff, r0}}, 0x18) 2018/04/22 11:42:31 executing program 2: mmap(&(0x7f0000077000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2000080003, 0x2) getsockopt(r0, 0x0, 0xcf, &(0x7f0000001ff8)=""/8, &(0x7f0000000ffc)=0x8) 2018/04/22 11:42:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f00008d1ff4)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000000000)={0x14, 0x1d, 0x3, 0x0, 0x0, {0x1f}}, 0x14}, 0x1}, 0x0) 2018/04/22 11:42:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000001e00010d000000000000000007000000", @ANYBLOB], 0x2}, 0x1}, 0x0) 2018/04/22 11:42:31 executing program 1: r0 = socket$inet(0x2, 0x4000001000000001, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x10, 0x0, 0x0) 2018/04/22 11:42:31 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0xfff, 0x8, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x13, 0x0, 0x0, 0xfa12, 0x0, 0x0}, 0x2c) 2018/04/22 11:42:31 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/22 11:42:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00001d3000)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000002a00)=[{{&(0x7f0000001200)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x80, &(0x7f0000002340)}}, {{&(0x7f0000002380)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000002680)=[{&(0x7f0000002580)="a5", 0x1}], 0x1, &(0x7f0000000340)=ANY=[]}, 0x3}], 0x2, 0x1000004004000) 2018/04/22 11:42:32 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/22 11:42:32 executing program 1: 2018/04/22 11:42:32 executing program 0: 2018/04/22 11:42:32 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xee}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x4, 0x0, 0x0, &(0x7f0000000540)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 2018/04/22 11:42:32 executing program 7: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 2018/04/22 11:42:32 executing program 5: getrandom(&(0x7f00000005c0)=""/4096, 0x1000, 0x0) 2018/04/22 11:42:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:32 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000002, '\b\a\x00\x00'}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x8a3]}) 2018/04/22 11:42:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/22 11:42:32 executing program 2: 2018/04/22 11:42:32 executing program 0: 2018/04/22 11:42:32 executing program 5: 2018/04/22 11:42:32 executing program 7: 2018/04/22 11:42:32 executing program 4: 2018/04/22 11:42:32 executing program 1: 2018/04/22 11:42:32 executing program 3: 2018/04/22 11:42:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:32 executing program 5: 2018/04/22 11:42:32 executing program 2: 2018/04/22 11:42:32 executing program 4: 2018/04/22 11:42:32 executing program 0: 2018/04/22 11:42:32 executing program 7: 2018/04/22 11:42:32 executing program 1: 2018/04/22 11:42:32 executing program 3: 2018/04/22 11:42:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:33 executing program 0: 2018/04/22 11:42:33 executing program 4: 2018/04/22 11:42:33 executing program 2: 2018/04/22 11:42:33 executing program 1: 2018/04/22 11:42:33 executing program 5: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) sendmmsg(r0, &(0x7f0000001a40)=[{{&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001a80)}}], 0x1, 0x0) 2018/04/22 11:42:33 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="88", 0x1, 0x7fff, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x34000}}, 0x1c) 2018/04/22 11:42:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00001e9ff7)='net/udp6\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000723f20)=""/127, 0x2ee}], 0x1, 0x0) 2018/04/22 11:42:33 executing program 2: 2018/04/22 11:42:33 executing program 1: 2018/04/22 11:42:33 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f00008d1ff4)={0x10, 0x0, 0x3000000000000}, 0xc, &(0x7f0000007000)={&(0x7f0000000000)={0x14, 0x1d, 0x3, 0x0, 0x0, {0x1f}}, 0x14}, 0x1}, 0x0) 2018/04/22 11:42:33 executing program 5: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) sendmmsg(r0, &(0x7f0000001a40)=[{{&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001a80)}}], 0x1, 0x0) 2018/04/22 11:42:33 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x20800, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x40, 0x4, 0x1, 0x1f, 0x0, 0x7, 0x4, 0x2, 0x5, 0x3, 0x6, 0xac7, 0xc87, 0x0, 0x0, 0x6, 0x3, 0x4, 0x401, 0x7fffffff, 0x10001, 0x80000000, 0x100, 0x2, 0x4, 0x7f, 0x7f, 0x3, 0x4, 0x0, 0x100000001, 0x137, 0x7, 0x2, 0x100000001, 0x4, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000080), 0x5}, 0x2204, 0x6, 0x3ff, 0x7, 0x8, 0x800, 0x3bf}, r0, 0x1, r1, 0xb) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x2) 2018/04/22 11:42:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:33 executing program 3: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="cec19c1729f7c811339cddd62b6e6f4854f39f3bcef463e4b64f1c9a568109e915e6f529f7db762bfa6baac4544503786415d8cc38d41b", 0x37) r2 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r0) accept4$alg(r3, 0x0, 0x0, 0x80000) 2018/04/22 11:42:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000223ff7)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xd, 0x8012, r0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000001fef)='/selinux/context\x00', 0x2, 0x0) write$vnet(r0, &(0x7f00000000c0)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000040)=""/77, 0x1, 0x3}}, 0x68) 2018/04/22 11:42:33 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000240)=""/4096) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) move_pages(r2, 0x1, &(0x7f00000000c0)=[&(0x7f0000fee000/0xf000)=nil], &(0x7f0000000100), &(0x7f0000000140), 0x0) 2018/04/22 11:42:33 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) ioctl(r0, 0x5, &(0x7f0000001000)="06") fcntl$setstatus(r0, 0x4, 0x4000003ffc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000001040)="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", &(0x7f0000000100)=""/67}, 0x18) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/225) 2018/04/22 11:42:33 executing program 5: r0 = memfd_create(&(0x7f0000000000)=',cpuset\x00', 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x4) 2018/04/22 11:42:33 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x280000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x9, 0x3, 0x288, 0x0, 0xffffffff, 0xffffffff, 0xe0, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, &(0x7f0000000040), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x12}, @local={0xac, 0x14, 0x14, 0xaa}, 0xffffffff, 0xff, 'syz_tun\x00', 'vcan0\x00', {0xa33d3e9a6d8ce781}, {0xff}, 0x7f, 0x1}, 0x0, 0x98, 0xe0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x401, 0x3, 0x5, 'pptp\x00', 0x8}}}, {{@uncond, 0x0, 0xc8, 0x110, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x800, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@rand_addr=0x4, 'syz_tun\x00', 0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x2e8) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_settings={0x0, 0x0, @sync=&(0x7f0000000080)}}) 2018/04/22 11:42:33 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x3, 0x448, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, &(0x7f0000000240), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x0, 0x0, 'veth0\x00', 'dummy0\x00', 'veth0\x00', 'ip6gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xb8, 0xf0}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x5, 0x0, 0x0, 'gretap0\x00', 'veth0\x00', 'ip6gre0\x00', 'irlan0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x100, 0x100, 0x130, [@helper={'helper\x00', 0x28, {{0x0, 'amanda\x00'}}}, @time={'time\x00', 0x18}]}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'syzkaller0\x00', "ffff00000000000050379b0000f900", 'ip6_vti0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x128, 0x160, 0x198, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @mark_m={'mark_m\x00', 0x18}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @common=@dnat={'dnat\x00', 0x10}}]}]}, 0x4c0) write$binfmt_elf32(r0, &(0x7f00000009c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0xada1, 0x2, 0x1, 0x20, 0x2, 0x7, 0x6, 0x1be, 0x38, 0x34a, 0xf41b, 0xe0, 0x20, 0x1, 0x0, 0x4, 0x100000001}, [{0x7, 0xc919, 0x0, 0xc00, 0x40, 0xfffffffffffff800, 0x3f, 0x3}, {0x70000000, 0x9, 0x5, 0x8, 0x100, 0x7, 0x5, 0xbe}], "635aac384ac0f9e284dc3dcf0af52c74281461ff87e39f6c3100594c08e2c452b646921914bc65fc9a72fbffcff28ec20621cecbfe1b24d490959b214f3fab1a627a", [[], [], []]}, 0x3ba) [ 84.679717] program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO 2018/04/22 11:42:33 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) unshare(0x400) ioctl(r0, 0x40000000401870cb, &(0x7f00000000c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept$netrom(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x400000) getsockname$netlink(r2, &(0x7f0000000040), &(0x7f00000000c0)=0xc) [ 84.746667] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/22 11:42:33 executing program 2: prlimit64(0x0, 0x9, &(0x7f00000000c0), &(0x7f0000000100)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x424000, 0x1) recvfrom$inet6(r0, &(0x7f0000000300)=""/254, 0xfffffd2a, 0x40002041, &(0x7f00000002c0)={0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}, 0x400000ec}, 0x1c) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) io_setup(0xffffffff90a732e4, &(0x7f0000000280)) [ 84.798669] program syz-executor4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 84.809853] xt_helper: cannot load conntrack support for proto=7 2018/04/22 11:42:33 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x2c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x8, {0x2, 0x4e20, @rand_addr}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @rand_addr}, 0x8, 0x10001, 0x74, 0x1, 0x400, &(0x7f0000000040)='gretap0\x00', 0x8401, 0x1, 0x200}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x10001, 0x0) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000180)={0x1, r3}) getegid() 2018/04/22 11:42:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) [ 84.840247] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/22 11:42:33 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}], 0x1c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)) accept4(r0, &(0x7f0000000240)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x80, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', r2}) 2018/04/22 11:42:33 executing program 7: clock_getres(0x0, &(0x7f00000000c0)) 2018/04/22 11:42:34 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:34 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x8440) getsockname(r0, &(0x7f0000000240)=@ethernet={0x0, @broadcast}, &(0x7f0000000140)=0x80) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'team_slave_0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="000000005d6d0000000000000000000000000000000000000000000000000000000000000019d03c25ab7e209607f491d6452e00afe803f996f40cc40bec2d14d1d935afb5f842335b8d0fe3dedd7dd1418d5148b4453a4dd91f3d6613709aa49b3e2906b52ac28aa4f90827c7366e8a12eb03f35f12a11e7ae4751ac6e5456e2067d022fc71da5c6273da000000000000"]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) sched_setparam(r2, &(0x7f0000000100)=0x9) 2018/04/22 11:42:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfffffffffffffffd}, 0x2c) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/bnep\x00') ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000040)={{0x9, 0x3a}, 'port0\x00', 0x4, 0x8, 0xa7, 0x7, 0x7, 0x8387, 0x80000001, 0x0, 0x2, 0x9066}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000140)=""/243, &(0x7f0000000240)=0xf3) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8, 0x4401) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000700000000000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/22 11:42:34 executing program 4: r0 = creat(&(0x7f0000000900)='./file0\x00', 0x80) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000080)=0x10000000, 0x4) ioctl$TCGETA(r0, 0x5405, &(0x7f00000004c0)) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0xcf96, &(0x7f0000000100)=0x2) io_setup(0x9, &(0x7f0000000140)=0x0) syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x6, 0x305000) syz_mount_image$hfsplus(&(0x7f0000000600)='hfsplus\x00', &(0x7f0000000640)='./file0\x00', 0x10001, 0x2, &(0x7f0000000800)=[{&(0x7f0000000680)="fbcbb0fe1caaa9c7b17639d0e223e29759eafbe3ac106c844910773bf99068bd047e87e5d28275aa022eaddf0e50e93eee7ca0b8091c02daf35b7d5ca7ff81d226c23531fc70a9e6134331699113a5122007c2d135f68fb4e618fe829092b394f1beb28343bc02bc4b6b441e4c70c3c0f112f845382a0c985d2038ad24f88695943967a8bcdfb60839a9278d20593aa5b06a86341b00335e9f996abffe8f64072f8622e6d72e4037dc805bec88d1eb53eb860784c7eee779bb07a31643198ed60416b6208b062a", 0xc7, 0x1}, {&(0x7f0000000780)="54c5af2ff257a893b0e62a863a522d4d6d37adfc9e5520b8bc18c614946542dc9595fa33f58feecd197c8ad112bca1de8cc9da1a506816fcfea28f1d71b4d17d370797b87ac058743bc8ea04a3c71fb97dd804043ecad3a05e6148d171b89da9a6eda9538c7a369f", 0x68, 0x7}], 0x10, &(0x7f0000000940)=ANY=[@ANYBLOB="7569643d30372c6e6f626172726965722c268e134a93f17d680ab57f8def4ac5476465636f2d706f73652c00590bcd4a6e22231392a6a3ae969353e574a1b5947c6f8a6bd3e056c9a3003bc946d68ede2d858e2faf0f283f8f25659004a5609c2d86a8d65f93fac54cc778ddd00b66a7973a311c8cb5edd2c1da3ea471098027f87889685cfe97307ac83b8766bae4aadabb0930960bccb6f39149b149f4bb2b9c6d79bf81b0ebc8639e569202600eff1aed77974224b88a212ec249484d77a97f07836721ab486617b7576094c215af9095d61b326d85cc5e7aec2425d3a8ad1b"]) io_submit(r1, 0x3, &(0x7f0000000400)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x4, r0, &(0x7f0000000180)="52be7c36ed3c6beb2abd22ba61adc5289cdeef88bec30664319dc3bd5de6e3b5af836172fe9aeb1f92ae51c2678de8f6c37de07373829215bc661a4114159cd6ada817c75715d3e3a614e6a1176a0317fcc94a37f39a29aa1d69b597a255dfe6a28b22538ae21d2ccb82cbae85d1bc82623faac53dfe7cc7b52e8f5f5496f4a4a7df4d05a0b2ed230e3965136b065785fc36c93a4c2ad49c595963ca9b53", 0x9e, 0x1, 0x0, 0x0, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x1, r0, &(0x7f0000000280)="d7053b5ba577b21f32de2410ad699326b53c14e05189f381fc15be1856cd3602eb389bc856be028d554a28a4e57e3626468c1f105b8753d3431ef237d9238e7e823bc081c95ddf446844b9dad4e31eac77b68f69bb37a057f4cbd97dff06e5b4447567f1154a40882747efc4d3ae970f90943fb99b33d4d69ca03dc6e60bd3f988a8891a11213470b78ad9013156f07ff4a8751e1e403cf251e5e89ab4226de5dfd8bdb151dc4d27a8256dad5d419588fbafba397ec21abe10334be5", 0xbc, 0x800, 0x0, 0x1, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xe, 0x3, r0, &(0x7f0000000380)="753a7f9293e60fc969579d", 0xb, 0x7f, 0x0, 0x1, r0}]) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000440)={0x7, 0x7, 0x40, 0x6b0b, 0xec5, 0x9}) ioperm(0x0, 0x8, 0x0) inotify_init1(0x80000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e20, @loopback=0x7f000001}}, 0xfe47, 0x1, 0x1, "a15f2c06d4b45fc0f7a7de8bf1673360f751e1b5b3759734e5ca84609a4381286caf7af0cb1146e0f104462bf3e6e25d6273ef37a717ea10aa51cb027bd40b3dfbecd0c14c9ce5ff598e60e157fd3b20"}, 0xd8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r2, 0x540c) ioctl$TIOCNOTTY(r3, 0x5422) 2018/04/22 11:42:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:34 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0xfffffffffffffe00}, 0x11) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000240)={0xffffffffffffffff, {{0xa, 0x4e26, 0x7fff, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x40000000000087}}}, 0x88) getpeername$inet6(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/22 11:42:34 executing program 7: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x200000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x180010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r2, 0x0, 0x70bd26, 0x25dfdbfb, {0x4}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x54}, 0x1, 0x0, 0x0, 0xc000}, 0x20000000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f00000001c0)=""/168, 0xa8}, &(0x7f0000000280), 0x41}, 0x20) 2018/04/22 11:42:34 executing program 3: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x200000d, 0x11, r0, 0x0) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ff0ff4ffffffffffffffaa6f71990000"], 0x12) capset(&(0x7f0000000ffc)={0x20080522}, &(0x7f0000000000)) [ 85.243925] syz-executor1: vmalloc: allocation failure: 17045651456 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 85.255920] syz-executor1 cpuset=syz1 mems_allowed=0 [ 85.261190] CPU: 1 PID: 6843 Comm: syz-executor1 Not tainted 4.16.0+ #85 [ 85.268050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.277428] Call Trace: [ 85.280062] dump_stack+0x185/0x1d0 [ 85.283738] warn_alloc+0x3fc/0x660 [ 85.287452] ? __vmalloc_node_range+0x10b/0x1140 [ 85.292260] __vmalloc_node_range+0xa6f/0x1140 [ 85.296904] __vmalloc_node_flags_caller+0x102/0x120 [ 85.302061] ? xt_alloc_entry_offsets+0x62/0x70 [ 85.306777] ? xt_alloc_entry_offsets+0x62/0x70 [ 85.311504] kvmalloc_node+0x2a6/0x2e0 [ 85.315457] xt_alloc_entry_offsets+0x62/0x70 [ 85.319997] translate_table+0x216/0x3870 [ 85.324232] ? __kmalloc_node+0xf67/0x1190 [ 85.328552] ? kvmalloc_node+0x1a1/0x2e0 [ 85.332725] do_ip6t_set_ctl+0x60c/0x930 [ 85.336934] ? cleanup_entry+0x5c0/0x5c0 [ 85.341063] nf_setsockopt+0x476/0x4d0 [ 85.345067] ipv6_setsockopt+0x1e2/0x340 [ 85.349228] ? ipv6_update_options+0x510/0x510 [ 85.353898] tcp_setsockopt+0x1bb/0x1f0 [ 85.357932] ? tcp_disconnect+0x15e0/0x15e0 [ 85.362294] sock_common_setsockopt+0x136/0x170 [ 85.367072] ? sock_common_recvmsg+0x270/0x270 [ 85.371732] SYSC_setsockopt+0x4b8/0x570 [ 85.375901] SyS_setsockopt+0x76/0xa0 [ 85.379808] do_syscall_64+0x309/0x430 [ 85.383753] ? SYSC_recv+0xe0/0xe0 [ 85.387343] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/04/22 11:42:34 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x2d6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x80000000}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) socket$packet(0x11, 0x2, 0x300) socket$l2tp(0x18, 0x1, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) 2018/04/22 11:42:34 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x60002000}) shutdown(r1, 0x1) epoll_pwait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140), 0x8) [ 85.392558] RIP: 0033:0x455389 [ 85.395758] RSP: 002b:00007f380f40dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 85.403505] RAX: ffffffffffffffda RBX: 00007f380f40e6d4 RCX: 0000000000455389 [ 85.410795] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000014 [ 85.418088] RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 [ 85.425382] R10: 0000000020001fde R11: 0000000000000246 R12: 00000000ffffffff [ 85.432679] R13: 000000000000055f R14: 00000000006fb188 R15: 0000000000000000 [ 85.440337] Mem-Info: 2018/04/22 11:42:34 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 85.442908] active_anon:71298 inactive_anon:78 isolated_anon:0 [ 85.442908] active_file:3422 inactive_file:8478 isolated_file:0 [ 85.442908] unevictable:0 dirty:51 writeback:0 unstable:0 [ 85.442908] slab_reclaimable:3361 slab_unreclaimable:8938 [ 85.442908] mapped:73942 shmem:84 pagetables:1051 bounce:0 [ 85.442908] free:1087144 free_pcp:255 free_cma:0 2018/04/22 11:42:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) [ 85.476595] Node 0 active_anon:285308kB inactive_anon:312kB active_file:13688kB inactive_file:33912kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:295768kB dirty:204kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 106496kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 85.504926] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 85.531291] lowmem_reserve[]: 0 2820 7247 7247 [ 85.536954] Node 0 DMA32 free:2891552kB min:26240kB low:32800kB high:39360kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2892208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:656kB local_pcp:0kB free_cma:0kB [ 85.564774] lowmem_reserve[]: 0 0 4426 4426 [ 85.569286] Node 0 Normal free:1438536kB min:41196kB low:51492kB high:61788kB active_anon:283412kB inactive_anon:312kB active_file:13688kB inactive_file:33912kB unevictable:0kB writepending:204kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:10496kB pagetables:4376kB bounce:0kB free_pcp:500kB local_pcp:116kB free_cma:0kB [ 85.599324] lowmem_reserve[]: 0 0 0 0 [ 85.603297] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 85.616811] Node 0 DMA32: 2*4kB (M) 3*8kB (M) 2*16kB (M) 3*32kB (M) 2*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 1*2048kB (M) 704*4096kB (M) = 2891552kB [ 85.632393] Node 0 Normal: 120*4kB (UM) 41*8kB (UME) 4*16kB (UME) 5*32kB (UME) 17*64kB (UE) 7*128kB (UME) 3*256kB (ME) 1*512kB (M) 14*1024kB (ME) 7*2048kB (UM) 345*4096kB (UM) = 1446088kB [ 85.649641] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 85.658328] 11983 total pagecache pages [ 85.662431] 0 pages in swap cache [ 85.666007] Swap cache stats: add 0, delete 0, find 0/0 [ 85.671522] Free swap = 0kB [ 85.674633] Total swap = 0kB [ 85.677747] 1965969 pages RAM [ 85.680940] 0 pages HighMem/MovableOnly [ 85.684991] 105641 pages reserved 2018/04/22 11:42:34 executing program 2: unshare(0x20000001004000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x200000003, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000005ff0)={0x0, &(0x7f0000964ff8)}, 0x10) 2018/04/22 11:42:34 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:34 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xff, 0x28a082) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000040)={{0x4, 0xffffffffffffff80}, 'port0\x00', 0x0, 0x1, 0x6, 0x0, 0x401, 0x6, 0x7, 0x0, 0x4, 0xffffffffffffff31}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) fcntl$addseals(r0, 0x409, 0x7) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0xe) close(r0) [ 85.789417] syz-executor1: vmalloc: allocation failure: 17045651456 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 85.801382] syz-executor1 cpuset=syz1 mems_allowed=0 [ 85.806628] CPU: 0 PID: 6868 Comm: syz-executor1 Not tainted 4.16.0+ #85 [ 85.813494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.822876] Call Trace: [ 85.825516] dump_stack+0x185/0x1d0 [ 85.829193] warn_alloc+0x3fc/0x660 [ 85.832907] ? __vmalloc_node_range+0x10b/0x1140 [ 85.837715] __vmalloc_node_range+0xa6f/0x1140 [ 85.842367] __vmalloc_node_flags_caller+0x102/0x120 [ 85.847523] ? xt_alloc_entry_offsets+0x62/0x70 [ 85.852237] ? xt_alloc_entry_offsets+0x62/0x70 [ 85.856972] kvmalloc_node+0x2a6/0x2e0 [ 85.860925] xt_alloc_entry_offsets+0x62/0x70 [ 85.865465] translate_table+0x216/0x3870 [ 85.869704] ? __kmalloc_node+0xf67/0x1190 [ 85.874029] ? kvmalloc_node+0x1a1/0x2e0 [ 85.878207] do_ip6t_set_ctl+0x60c/0x930 [ 85.882346] ? cleanup_entry+0x5c0/0x5c0 [ 85.886468] nf_setsockopt+0x476/0x4d0 [ 85.890470] ipv6_setsockopt+0x1e2/0x340 [ 85.894640] ? ipv6_update_options+0x510/0x510 [ 85.899303] tcp_setsockopt+0x1bb/0x1f0 [ 85.903347] ? tcp_disconnect+0x15e0/0x15e0 [ 85.907739] sock_common_setsockopt+0x136/0x170 [ 85.912513] ? sock_common_recvmsg+0x270/0x270 [ 85.917167] SYSC_setsockopt+0x4b8/0x570 [ 85.921336] SyS_setsockopt+0x76/0xa0 [ 85.926335] do_syscall_64+0x309/0x430 [ 85.930279] ? SYSC_recv+0xe0/0xe0 [ 85.933880] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/04/22 11:42:34 executing program 3: r0 = semget$private(0x0, 0x0, 0x204) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/16) syz_emit_ethernet(0x230, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaa010f00002bb43c40b80800460000280000000000069078ac14ffaae006676e63ec02f05cca71f4b8f34e73affb6c68b2de9bb471563b447c419d5062a48721025d5e6d5cd4fdc9f565cf27cc84c6962950822b4a38ad1da14cefe820eeecdca15df129d177cd4b71e36c3540735cd1297fe7453ec12485a293f8b65c18df6820e2fed4cab1731fda8f2057b591a1d30dc588b9913bef8f421ed9eb823e0202013a2ffdada407f6", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5000000090780000"], 0x0) [ 85.939099] RIP: 0033:0x455389 [ 85.942311] RSP: 002b:00007f380f3ecc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 85.950080] RAX: ffffffffffffffda RBX: 00007f380f3ed6d4 RCX: 0000000000455389 [ 85.957376] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000014 [ 85.964672] RBP: 000000000072bf58 R08: 0000000000000004 R09: 0000000000000000 [ 85.971975] R10: 0000000020001fde R11: 0000000000000246 R12: 00000000ffffffff [ 85.979305] R13: 000000000000055f R14: 00000000006fb188 R15: 0000000000000001 2018/04/22 11:42:35 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xfff, 0xde7d, 0xcf}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x6}, 0x8) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000240)=@un=@abs, 0x80, &(0x7f0000001340)}, 0x40000060) 2018/04/22 11:42:35 executing program 0: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(0xffffffffffffffff) sendto$ax25(r1, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r1, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:35 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede-generic)\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079", 0x18) sendmmsg$unix(r0, &(0x7f0000000600)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)="52b7539a7572cde7694fb9d8e6ab4ad6136d7eae88902c42991f984ecf4fa2ebaf28059f08080cc3", 0x28}], 0x1}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000000)=""/23, 0x17}, {&(0x7f00000009c0)=""/18, 0x12}], 0x2, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x4) connect$unix(r1, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) 2018/04/22 11:42:35 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600)=[{{&(0x7f0000000040)=@rc, 0xa, &(0x7f0000001580), 0x0, &(0x7f0000001600)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000002640)={0x0, 0x989680}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0xfffffffffffffee7) writev(r0, &(0x7f0000000500), 0x26b) 2018/04/22 11:42:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6664001a000000") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) renameat(r0, &(0x7f0000000040)='8/file0\x00', r0, &(0x7f0000000080)='./file0\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f00000000c0)='8/file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/22 11:42:35 executing program 1: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x883e, 0x8}}}}}}, &(0x7f0000000000)) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x0) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000080), 0x4) 2018/04/22 11:42:35 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)="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", 0x2, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x8000, 0x5, 0x2, 0x7}, {0x1ff, 0x2, 0x4, 0x10001}, {0xffffffff, 0x5, 0x8, 0x3}, {0x1, 0x2, 0x0, 0xff}]}) unshare(0x400) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x7fffffff, 0x7, 0x4, 0x10001, 0x100000000, 0x5ce, 0x8, 0x2, r1}, &(0x7f0000000200)=0x20) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000040)=""/89) ioctl(r2, 0x4401000000001261, &(0x7f00000000c0)) [ 86.269475] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x5 2018/04/22 11:42:35 executing program 0 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000040)={r1, 0x7, 0x1, "327271c0ff736544ce505419e725c55f155fe23379492173075b1478bcc6fb9701ef78579f8e95400790b1ea4967738b28a27b623505347ac2af645c61383cb88fdfa7b7e4680677c520a5f3a28f65ea483b8a8387f8783fcf5113b86991a7e69a9464248e0e91616acf4852eee14701ea0f3b1df4ef76c8389be8f49481da4f146740918cd356da1396e525d475a8ce4aacd0096cf70efd66080621970975354863d2afa38bac3eedc7b3dc9edd285a4fd60199"}) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)) 2018/04/22 11:42:35 executing program 5: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0xfffffffffffffffe, 0x44031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000040)=0x9) syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') 2018/04/22 11:42:35 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYRES64], &(0x7f00000002c0)={0x0, 0x4, [0x0, 0xba7, 0x823, 0xd2d]}) msgget$private(0x0, 0x8) 2018/04/22 11:42:35 executing program 3: mkdir(&(0x7f0000554ff8)='./file0\x00', 0x0) r0 = open(&(0x7f00006c69d0)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) r1 = open(&(0x7f00004a3000)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x4) fcntl$notify(r0, 0x402, 0x0) 2018/04/22 11:42:35 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600)=[{{&(0x7f0000000040)=@rc, 0xa, &(0x7f0000001580), 0x0, &(0x7f0000001600)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000002640)={0x0, 0x989680}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0xfffffffffffffee7) writev(r0, &(0x7f0000000500), 0x26b) [ 86.378305] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x5 [ 86.482712] FAULT_INJECTION: forcing a failure. [ 86.482712] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 86.494815] CPU: 1 PID: 6933 Comm: syz-executor0 Not tainted 4.16.0+ #85 [ 86.501716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.511105] Call Trace: [ 86.513753] dump_stack+0x185/0x1d0 [ 86.517440] should_fail+0x87b/0xab0 [ 86.521224] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 86.526031] ? kmsan_set_origin_inline+0x6b/0x120 [ 86.530926] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 86.536346] ? __wake_up_common+0x123/0xa60 [ 86.540720] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 86.545477] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 86.550981] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 86.556394] ? kmsan_set_origin_inline+0x6b/0x120 [ 86.561321] ? kmsan_set_origin+0x9e/0x160 [ 86.565611] alloc_pages_current+0x6b5/0x970 [ 86.570071] skb_page_frag_refill+0x3ba/0x5e0 [ 86.574641] ? kmsan_set_origin+0x9e/0x160 [ 86.578988] tun_get_user+0x10f9/0x7c60 [ 86.583008] ? mntput_no_expire+0xad/0x17c0 [ 86.587416] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 86.592868] tun_chr_write_iter+0x1d4/0x330 [ 86.597268] ? tun_chr_read_iter+0x460/0x460 [ 86.601737] do_iter_readv_writev+0x84d/0xa00 [ 86.606295] ? tun_chr_read_iter+0x460/0x460 [ 86.610760] do_iter_write+0x30d/0xd40 [ 86.614700] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 86.620202] do_writev+0x3c9/0x830 [ 86.623846] ? syscall_return_slowpath+0xe9/0x700 [ 86.628763] ? fput+0x25c/0x2e0 [ 86.632095] SYSC_writev+0x9b/0xb0 [ 86.635752] SyS_writev+0x56/0x80 [ 86.639298] do_syscall_64+0x309/0x430 [ 86.643259] ? SYSC_readv+0xb0/0xb0 [ 86.646937] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 86.652153] RIP: 0033:0x455241 [ 86.655368] RSP: 002b:00007fe62f352ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 86.663116] RAX: ffffffffffffffda RBX: 0000000000000366 RCX: 0000000000455241 [ 86.670411] RDX: 0000000000000001 RSI: 00007fe62f352bf0 RDI: 00000000000000fc 2018/04/22 11:42:35 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x4000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000040)={0xfffffffffffffffd, 0x4, [0x7f]}) move_pages(0x0, 0x1daf, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10040, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xb}}, 0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 'team_slave_1\x00'}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x3bd, 0x4) 2018/04/22 11:42:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ptype\x00') setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000400), 0xfffffd68) lseek(r0, 0x800000000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x8b3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="08003100cedb3c326cdc2fafc02ee01bf0951295eabe34d40900000000000000d2bdb340ec10952f96accabae169bd8198b31b858d912f033c039f087d10dcada53d6c8e87d6171ba48f681029b1286cb4e165c8d9db0810411e4ee022bbabf9885dce928c5b"], 0x39) 2018/04/22 11:42:35 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = dup(r0) sendto$ax25(r1, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r1, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:35 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x3) fgetxattr(r0, &(0x7f0000000000)=@random={'security.', '\x00'}, &(0x7f0000000080)=""/177, 0xb1) [ 86.677713] RBP: 0000000020000080 R08: 00000000000000fc R09: 0000000000000000 [ 86.685016] R10: 0000000000000366 R11: 0000000000000293 R12: 0000000000000013 [ 86.692313] R13: 0000000000000661 R14: 00000000006fc9b8 R15: 0000000000000000 2018/04/22 11:42:35 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f00000003c0)=""/138, &(0x7f0000000480)=0x8a) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x0, 0x30, 0x8, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x401, 0x5, [0x8001, 0x100000001, 0x20, 0x10000000bd3, 0x20]}, &(0x7f0000000280)=0x12) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000004c0)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000500)=0x4) r5 = perf_event_open(&(0x7f0000e6a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='{Ocgroup%trusted+\x00') r6 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x20000) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000002c0)) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000300)={r3, 0x7, 0x0, 0x8, 0x20}, &(0x7f0000000340)=0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r5) syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x6, 0x400000) 2018/04/22 11:42:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x13) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x8000}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000692000)=@sack_info={0x0, 0x0, 0x1}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100), &(0x7f00000000c0)=0xc) 2018/04/22 11:42:35 executing program 5: r0 = epoll_create1(0x80001) uname(&(0x7f00000011c0)=""/143) r1 = memfd_create(&(0x7f0000001340)='security.selinux\x00', 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0xe1e3, 0x820e, 0xe26a128, 0x8, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x20, 0xb78, 0x0, 0x10001, 0x1000, 0x80000000000000, 0x7, 0x7fff, r2}, 0x20) fgetxattr(r0, &(0x7f0000000040)=@known='security.selinux\x00', &(0x7f00000000c0)=""/208, 0xd0) close(r0) r3 = openat(r1, &(0x7f0000001380)='./file0\x00', 0x448802, 0x8) fcntl$setstatus(r3, 0x4, 0x40000) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000200)={0x0, 0x0, 0x7fff}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x21c3}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000280)={r4, r5}) ioctl$TTUNGETFILTER(r3, 0x801054db, &(0x7f00000023c0)=""/4096) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000001280)=""/9) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f00000012c0)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast2=0xe0000002}, 0xc) 2018/04/22 11:42:36 executing program 0 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:36 executing program 7: unshare(0x8000400) r0 = socket(0x10, 0x7, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000240)=0x15007c) mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0xfffffffffffffffe, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) unshare(0xc000000) getpgrp(0xffffffffffffffff) mincore(&(0x7f0000fed000/0x11000)=nil, 0x11000, &(0x7f0000000040)=""/94) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) 2018/04/22 11:42:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x1000000000000180, &(0x7f0000000080)=[{0x0, 0x88, 0x4362, "be190b40afb3f07368ab8dc873f5a8b3c8a71afeb6ef76e57f4b9d1dc43b022b429e761d736e8c1fe1995990b21b4d070c67da65d0a848583abbf533020457578488efcfae0eff51c17f577d37ac237a2ef49179a03847db7b146829d86063d0eb"}, {0x0, 0x11f, 0x10a2, "a515a876456da3b3b2bdd293ede155f4000e7c68f82e33f0796e1951ba6fb77c6e8b6e424251dc4c00bb324365a05bce839ecf0e0b63f5b8d835f7dce3dac20c135729ced9936f4a00644dd200dc39579bf0a3251ef69066aab6d9d3def0d0a67ef50f8505"}, {0x0, 0x1ff, 0x10000, "f4f8560de87934f3f4"}, {0x0, 0x109, 0x1000, "f0c8a00970d084d67514e8dcd2dd9ad9"}, {0x0, 0x117, 0x6, "8b1d4facc03cc2771ba1dcff9f059571106f951ba0d60b5ed5deceb0cd94d5fc11f8e3305d5c92bdb30ff80da979a96574761756f8ee349efe621938e645b692978f56f377160480fb4cc0984210002ac7d9bb707a2089fbcced1022e15c85d6a070df8ef19b646d51ca0177e1b2fdfc825a6aa13b9964a7759af4b00ccde3776e7afcf612cafa3f098f26f500ea29ec70b1244941d5c60b2b16d68cb0"}, {0x0, 0x11f, 0x157cfd22, "29a7d68b91f02129daf0d03dc0c419ceed403c37b323d1e1db57d8ad9f8c18fa3aa3aed71beacc8c8943ac8bd28001044988f1317f1a260d472426acf908303678d7612fd70754350fc4491774a50885af853bcbd08697b0c68d65381cfdae726a1c32f619683eb11946559bdeb1013a1caa26e1a081dc88597ca688497fbc86b7c58735cfcddae45bed3d830f2edf38605bbd19a55d34a46dd6343061399de8cbc5c6afb9ac0000"}, {0x0, 0x0, 0x1f, "f31b59e69894f787ebcfaa7c710fa123a87c4669566c0cb6a904bd6c14b40253d9dff3910b4872a6c75c740789"}, {0x0, 0x105, 0x1ff, "e50b3b5e29c2894f419daf92341002310490bf865f5301ca5ee05d1392f412b9739d7d30184cdc5a935e24dd027fcff1deba28bd4701ddbaab5105dd409957c5641be2cf6ad787a3690a5f506ce858c74a5ae08c64fa016027295bfd01cf54377dd6c768c4a5c3d8c6121c1751df6020a02961eac617fe5b7d6638160dcd54f15f2cb8fc74b3"}, {0x0, 0x29, 0x0, "31fece02d0d89c0c6d62719edf346736bbaaba15c5ab8d4b96fc2f2a1d201ea8d969cb8d9d7cd2488d49a812ca3b7dc90612b22d163e4d45ca8af7173bd0eee995d3e06b11cbd1e5aac20ebb30f1f669d6569b9c3f516e209907d9daa3fb141f1cafb7ae37167a29786a30d8e1c6a946d5c0ff43b9be1c9b1ef1dd21088b0c667f477d4d4b5e548a630bb118cf1b2fddf04127711c0b35f372a9edd2f9770046dcbbea7f302e15ce37c5359abe41aaf469e58ec6f6a0bf7058b7a163d0d880a2e7eb5a1cccf8564739c8b24c341778146e9dd70b3699b2ff"}]}}, {{&(0x7f0000000a80)=@in={0x2, 0x4e22, @rand_addr}, 0x10, &(0x7f0000001bc0), 0x0, &(0x7f0000000500)=[{0xfffffffffffffd45, 0x1, 0x25}], 0x10}}], 0x129, 0x0) 2018/04/22 11:42:36 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x180, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) seccomp(0x2, 0x4, &(0x7f0000028ff0)={0x0, &(0x7f0000d97ff8)}) fcntl$getflags(r0, 0x40a) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000140)={0x0, r0}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10001, 0x7ff}) prctl$seccomp(0x16, 0x1, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x2, 0x6, 0x7fff, 0x7}]}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000080)={0x7fffffff, r1, 0x10003, 0x2acdc89f}) 2018/04/22 11:42:36 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000080), 0x1000, &(0x7f0000000140)=ANY=[@ANYRES32]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000001c0)="4a1b912cfc8dc64246cf3204cf19645f30f37afeff524b3a75ddaded71051d563c39281b2ff5d7b4fc7794d5e202c3dd5c87ef26fc863313ea6a047f2057cd4751230827b8a441297c", 0x49, 0x400000000}, {&(0x7f00000004c0)="22c13eb9edb396cbda10bcb1220bad27c41c1567ed6b1e41efa874554e636d8567935852759f5089d2f4dcc466d57ae361ce3c44c92f07d6ab24c62a3153bfbd5cc5ddc429032cc0ca959c825c478783e15f900d56e4ffbc17bc19c269344d9a9c6222b83a87716ec8302935556667b3c491ff88bc8dfa1faa273c39635260a61f53a8e37a2682be96fb92c3fa6786dbc2aa7117e4bc834e8e9992eb55f005dfeef0bcd7a1464ba6788a07c8301372268f68b5af2d3f4ffcc1fcdf9460f2a6191d42caa05d5048178e84f2fd0a7b0ccf0c8533e5358929b969b48631bb55b5ce6b2bbc181d149909280bc11d75f9c5fce8", 0xf1, 0x2}], 0x0, &(0x7f0000000780)=ANY=[]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) connect$can_bcm(r1, &(0x7f0000000400)={0x1d, r2}, 0x10) write$eventfd(r1, &(0x7f0000000180), 0xfffffc5d) 2018/04/22 11:42:36 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x80}, 0x1}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) setsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f00000000c0)="5829bf0cee9e6d402d2f8a1077c3b5239da91401d90eaa405089d585bc03dc4129d9caa111a0e76b59bc19a7201019d88d93b9ba7f51f9243cf28fc112f8c537242699d1d93e4435ad6f81bea48fcb384d2e34ca51c208284a4c0129009e1b43655cd0f6a40323afa51584f83b1ec8693a3072009cb05e23946550a8cc8f0c79", 0x80) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x731, 0x400) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="29172d748a736141f583afe4cbd8098f", 0x10) 2018/04/22 11:42:36 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x400) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) r1 = socket(0x15, 0x5, 0x0) setsockopt(r1, 0x114, 0x1d, &(0x7f0000000040), 0x0) [ 87.233359] audit: type=1326 audit(1524397356.231:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6981 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 2018/04/22 11:42:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) [ 87.302726] FAULT_INJECTION: forcing a failure. [ 87.302726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 87.314606] CPU: 1 PID: 6996 Comm: syz-executor0 Not tainted 4.16.0+ #85 [ 87.321466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.330829] Call Trace: [ 87.333435] dump_stack+0x185/0x1d0 [ 87.337078] should_fail+0x87b/0xab0 [ 87.340826] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 87.345598] ? kernel_poison_pages+0x40/0x360 [ 87.350122] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 87.355500] ? kernel_poison_pages+0x1a0/0x360 [ 87.360107] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 87.365569] ? get_page_from_freelist+0xab28/0xb600 [ 87.370598] ? update_stack_state+0x885/0xa40 [ 87.375113] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 87.380487] ? is_bpf_text_address+0xb4/0x4b0 [ 87.384999] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 87.389951] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 87.395424] ? kmsan_set_origin_inline+0x6b/0x120 [ 87.400306] kmsan_alloc_page+0x82/0xe0 [ 87.404324] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 87.409089] ? kmsan_set_origin_inline+0x6b/0x120 [ 87.413943] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 87.419341] ? __wake_up_common+0x123/0xa60 [ 87.423671] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 87.428356] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 87.433831] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 87.439213] ? kmsan_set_origin_inline+0x6b/0x120 [ 87.444082] alloc_pages_current+0x6b5/0x970 [ 87.448596] skb_page_frag_refill+0x3ba/0x5e0 2018/04/22 11:42:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00009f9000)={0x0, 0x0, &(0x7f0000d58ff0)=[{&(0x7f00003faf57)='>', 0x1}], 0x1, &(0x7f00005e5000)}, 0x8000) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xe080000000000, 0x0) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x8, 0x9, 0x5, 0x8, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) bind$alg(r2, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) seccomp(0x0, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x3, 0x2, 0xffffffff}, {0xffffffffffffffff, 0x40, 0x7, 0x9}, {0x822a, 0x1f, 0xb3, 0x3}, {0x40, 0x7f, 0x36, 0x8001}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000400)={0x7, 0x4, 0x27, 0x800, 0x0}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000580)={&(0x7f0000000180)=@in6={0xa, 0x5b, 0x6, @dev={0xfe, 0x80, [], 0xb}, 0x400}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000001c0)="79ba3a5575830f324816adc9f05511c326116e9ee5de90a6fc9c572c102c3ce9829114939c1b7b967e8ccad261e1c2be2f8b2960b25a92f609c74a21d47055c9f4aa51a7734861fc9ba460b8ad89da383473b0dd47ca6553cfc37e23a43d83207d95d228bbfaac4c67bdcb7eed3fdfb5d535fcc126824b179fbda25c0d138847a38775677f3c0f13bd61b5085fb16442a9ba808abf5e2322c4e02b400fbbf59af3fd6407fb7a81c655460d2dac752e172346dd2a980bb9d649a3ded161e41ecfa88b1d0e8eab12f91e4a80073bb098b4eb7f3f3910310af28587394778800d6b72d654ea2277c4ecbfc29e", 0xeb}, {&(0x7f00000002c0)="fee6728ec8c11cf4722c3b27e94d74516985e6dafd9757448d3ee965", 0x1c}, {&(0x7f0000000300)="a4584d51058d8a3aa7787c5960f38b3a56ecf38690b39cc1d264a4b0b2665e1312adda875a092e81385fddb307ecbe755501d47b7e34944f97e3d9112b596911a8418a551a809163708c2d683c04396472e067eb627813bdaefbcf6fc2acbeb5dec9a302bcd8090c275322e4cfaca1b407150b4fd57061a9a4b25020d4c8adc75c01f145b0291939e021cec704452b31582c9995df3d1ebfdfe1925f32a756e73d3012ed3d1fa67b361c8b9f507d034baba1baa9f4605354630a7981e0da", 0xbe}], 0x3, &(0x7f0000000500)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x7, 0x6, 0x5, 0xef, 0x10000, 0x0, 0x0, r4}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x21d, 0x8000, 0x22ff, 0x4, 0x5, 0x888, 0x13, r5}}], 0x60, 0x40010}, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) sendfile(r1, r3, &(0x7f0000ccb000), 0x357) [ 87.453123] ? kmsan_set_origin+0x9e/0x160 [ 87.457389] tun_get_user+0x10f9/0x7c60 [ 87.461387] ? mntput_no_expire+0xad/0x17c0 [ 87.465901] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 87.471305] tun_chr_write_iter+0x1d4/0x330 [ 87.475652] ? tun_chr_read_iter+0x460/0x460 [ 87.480073] do_iter_readv_writev+0x84d/0xa00 [ 87.484580] ? tun_chr_read_iter+0x460/0x460 [ 87.488992] do_iter_write+0x30d/0xd40 [ 87.492910] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 87.498399] do_writev+0x3c9/0x830 [ 87.501964] ? syscall_return_slowpath+0xe9/0x700 [ 87.506817] ? fput+0x25c/0x2e0 [ 87.510112] SYSC_writev+0x9b/0xb0 [ 87.513663] SyS_writev+0x56/0x80 [ 87.517144] do_syscall_64+0x309/0x430 [ 87.521045] ? SYSC_readv+0xb0/0xb0 [ 87.524685] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 87.529876] RIP: 0033:0x455241 [ 87.533067] RSP: 002b:00007fe62f352ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 87.541353] RAX: ffffffffffffffda RBX: 0000000000000366 RCX: 0000000000455241 [ 87.548628] RDX: 0000000000000001 RSI: 00007fe62f352bf0 RDI: 00000000000000fc [ 87.555912] RBP: 0000000020000080 R08: 00000000000000fc R09: 0000000000000000 [ 87.563191] R10: 0000000000000366 R11: 0000000000000293 R12: 0000000000000013 [ 87.570488] R13: 0000000000000661 R14: 00000000006fc9b8 R15: 0000000000000001 2018/04/22 11:42:37 executing program 4: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x4000000000000000}}], 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x80) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x7f, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r2, @ANYBLOB="020027bd7000fbdbdf250b0000002c000200080006000500000008220600020800030006000000080002014e8e0000080002004e2100006000025d6a001bc0b567487a997b7a900c899b7c5dd6b464a3a2bccea0e700080007000101ec00080004000800000008000b000a0000000800040004000000080002004e230000080008000800000014002100de80000000000000000000000000000b080009004000000008000b00020000000800080005000000080006000300000094368b31b5c2ff86147e79b349290b1d73bcaf8abebbcc26989b000000"], 0xa8}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 2018/04/22 11:42:37 executing program 7: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f0000000080)='./control/file0\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x0, @tick=0x7ff, {}, {0x2}, @time=@time={0x77359400}}], 0x30) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000001b00)='./control/file0\x00') dup2(r2, r1) 2018/04/22 11:42:37 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(r0, &(0x7f0000000300)={0x2}, 0x8, 0x800) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000016000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0xfffffffffffffff9, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xe5}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)="5500000019007fb1b72d1cb2a4a280a80a06050000a84321a7322369250009002100001c0100000006000500020000880d0000dc1338d544000a9b84226e2556e04075437ceeb75afb83de448daa7227c43ab82200", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000000c0)={0x7fffffff, {{0xa, 0x4e24, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, 0x1, 0x3, [{{0xa, 0x4e24, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0x13}, 0x80}}, {{0xa, 0x4e23, 0x6, @empty, 0xabc}}, {{0xa, 0x4e21, 0xa98a, @local={0xfe, 0x80, [], 0xaa}, 0xffffffffffff63e3}}]}, 0x210) 2018/04/22 11:42:37 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(r1) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:37 executing program 0 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 11:42:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00009f9000)={0x0, 0x0, &(0x7f0000d58ff0)=[{&(0x7f00003faf57)='>', 0x1}], 0x1, &(0x7f00005e5000)}, 0x8000) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xe080000000000, 0x0) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x8, 0x9, 0x5, 0x8, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) bind$alg(r2, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) seccomp(0x0, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x3, 0x2, 0xffffffff}, {0xffffffffffffffff, 0x40, 0x7, 0x9}, {0x822a, 0x1f, 0xb3, 0x3}, {0x40, 0x7f, 0x36, 0x8001}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000400)={0x7, 0x4, 0x27, 0x800, 0x0}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000580)={&(0x7f0000000180)=@in6={0xa, 0x5b, 0x6, @dev={0xfe, 0x80, [], 0xb}, 0x400}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000001c0)="79ba3a5575830f324816adc9f05511c326116e9ee5de90a6fc9c572c102c3ce9829114939c1b7b967e8ccad261e1c2be2f8b2960b25a92f609c74a21d47055c9f4aa51a7734861fc9ba460b8ad89da383473b0dd47ca6553cfc37e23a43d83207d95d228bbfaac4c67bdcb7eed3fdfb5d535fcc126824b179fbda25c0d138847a38775677f3c0f13bd61b5085fb16442a9ba808abf5e2322c4e02b400fbbf59af3fd6407fb7a81c655460d2dac752e172346dd2a980bb9d649a3ded161e41ecfa88b1d0e8eab12f91e4a80073bb098b4eb7f3f3910310af28587394778800d6b72d654ea2277c4ecbfc29e", 0xeb}, {&(0x7f00000002c0)="fee6728ec8c11cf4722c3b27e94d74516985e6dafd9757448d3ee965", 0x1c}, {&(0x7f0000000300)="a4584d51058d8a3aa7787c5960f38b3a56ecf38690b39cc1d264a4b0b2665e1312adda875a092e81385fddb307ecbe755501d47b7e34944f97e3d9112b596911a8418a551a809163708c2d683c04396472e067eb627813bdaefbcf6fc2acbeb5dec9a302bcd8090c275322e4cfaca1b407150b4fd57061a9a4b25020d4c8adc75c01f145b0291939e021cec704452b31582c9995df3d1ebfdfe1925f32a756e73d3012ed3d1fa67b361c8b9f507d034baba1baa9f4605354630a7981e0da", 0xbe}], 0x3, &(0x7f0000000500)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x7, 0x6, 0x5, 0xef, 0x10000, 0x0, 0x0, r4}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x21d, 0x8000, 0x22ff, 0x4, 0x5, 0x888, 0x13, r5}}], 0x60, 0x40010}, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) sendfile(r1, r3, &(0x7f0000ccb000), 0x357) 2018/04/22 11:42:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00009f9000)={0x0, 0x0, &(0x7f0000d58ff0)=[{&(0x7f00003faf57)='>', 0x1}], 0x1, &(0x7f00005e5000)}, 0x8000) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xe080000000000, 0x0) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x8, 0x9, 0x5, 0x8, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) bind$alg(r2, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) seccomp(0x0, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x3, 0x2, 0xffffffff}, {0xffffffffffffffff, 0x40, 0x7, 0x9}, {0x822a, 0x1f, 0xb3, 0x3}, {0x40, 0x7f, 0x36, 0x8001}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000400)={0x7, 0x4, 0x27, 0x800, 0x0}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000580)={&(0x7f0000000180)=@in6={0xa, 0x5b, 0x6, @dev={0xfe, 0x80, [], 0xb}, 0x400}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000001c0)="79ba3a5575830f324816adc9f05511c326116e9ee5de90a6fc9c572c102c3ce9829114939c1b7b967e8ccad261e1c2be2f8b2960b25a92f609c74a21d47055c9f4aa51a7734861fc9ba460b8ad89da383473b0dd47ca6553cfc37e23a43d83207d95d228bbfaac4c67bdcb7eed3fdfb5d535fcc126824b179fbda25c0d138847a38775677f3c0f13bd61b5085fb16442a9ba808abf5e2322c4e02b400fbbf59af3fd6407fb7a81c655460d2dac752e172346dd2a980bb9d649a3ded161e41ecfa88b1d0e8eab12f91e4a80073bb098b4eb7f3f3910310af28587394778800d6b72d654ea2277c4ecbfc29e", 0xeb}, {&(0x7f00000002c0)="fee6728ec8c11cf4722c3b27e94d74516985e6dafd9757448d3ee965", 0x1c}, {&(0x7f0000000300)="a4584d51058d8a3aa7787c5960f38b3a56ecf38690b39cc1d264a4b0b2665e1312adda875a092e81385fddb307ecbe755501d47b7e34944f97e3d9112b596911a8418a551a809163708c2d683c04396472e067eb627813bdaefbcf6fc2acbeb5dec9a302bcd8090c275322e4cfaca1b407150b4fd57061a9a4b25020d4c8adc75c01f145b0291939e021cec704452b31582c9995df3d1ebfdfe1925f32a756e73d3012ed3d1fa67b361c8b9f507d034baba1baa9f4605354630a7981e0da", 0xbe}], 0x3, &(0x7f0000000500)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x7, 0x6, 0x5, 0xef, 0x10000, 0x0, 0x0, r4}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x21d, 0x8000, 0x22ff, 0x4, 0x5, 0x888, 0x13, r5}}], 0x60, 0x40010}, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) sendfile(r1, r3, &(0x7f0000ccb000), 0x357) 2018/04/22 11:42:37 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000080), 0x1000, &(0x7f0000000140)=ANY=[@ANYRES32]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000001c0)="4a1b912cfc8dc64246cf3204cf19645f30f37afeff524b3a75ddaded71051d563c39281b2ff5d7b4fc7794d5e202c3dd5c87ef26fc863313ea6a047f2057cd4751230827b8a441297c", 0x49, 0x400000000}, {&(0x7f00000004c0)="22c13eb9edb396cbda10bcb1220bad27c41c1567ed6b1e41efa874554e636d8567935852759f5089d2f4dcc466d57ae361ce3c44c92f07d6ab24c62a3153bfbd5cc5ddc429032cc0ca959c825c478783e15f900d56e4ffbc17bc19c269344d9a9c6222b83a87716ec8302935556667b3c491ff88bc8dfa1faa273c39635260a61f53a8e37a2682be96fb92c3fa6786dbc2aa7117e4bc834e8e9992eb55f005dfeef0bcd7a1464ba6788a07c8301372268f68b5af2d3f4ffcc1fcdf9460f2a6191d42caa05d5048178e84f2fd0a7b0ccf0c8533e5358929b969b48631bb55b5ce6b2bbc181d149909280bc11d75f9c5fce8", 0xf1, 0x2}], 0x0, &(0x7f0000000780)=ANY=[]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) connect$can_bcm(r1, &(0x7f0000000400)={0x1d, r2}, 0x10) write$eventfd(r1, &(0x7f0000000180), 0xfffffc5d) [ 88.027355] audit: type=1326 audit(1524397357.026:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6981 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 [ 88.113774] FAULT_INJECTION: forcing a failure. [ 88.113774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 88.125645] CPU: 0 PID: 7033 Comm: syz-executor0 Not tainted 4.16.0+ #85 [ 88.132495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.141859] Call Trace: [ 88.144469] dump_stack+0x185/0x1d0 [ 88.148118] should_fail+0x87b/0xab0 [ 88.151859] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 88.156717] ? kernel_poison_pages+0x40/0x360 [ 88.161222] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 88.166707] ? kernel_poison_pages+0x1a0/0x360 [ 88.171303] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 88.176770] ? get_page_from_freelist+0xab28/0xb600 [ 88.181801] ? update_stack_state+0x885/0xa40 [ 88.186330] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 88.191704] ? is_bpf_text_address+0xb4/0x4b0 [ 88.196215] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 88.201256] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 88.206719] ? kmsan_set_origin_inline+0x6b/0x120 [ 88.211581] kmsan_alloc_page+0x82/0xe0 [ 88.215560] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 88.220316] ? kmsan_set_origin_inline+0x6b/0x120 [ 88.225173] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 88.230551] ? __wake_up_common+0x123/0xa60 [ 88.234888] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 88.239571] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 88.245047] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 88.251050] ? kmsan_set_origin_inline+0x6b/0x120 [ 88.255923] alloc_pages_current+0x6b5/0x970 [ 88.260352] skb_page_frag_refill+0x3ba/0x5e0 [ 88.264868] ? kmsan_set_origin+0x9e/0x160 [ 88.269215] tun_get_user+0x10f9/0x7c60 [ 88.273207] ? mntput_no_expire+0xad/0x17c0 [ 88.277556] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 88.282953] tun_chr_write_iter+0x1d4/0x330 [ 88.287292] ? tun_chr_read_iter+0x460/0x460 [ 88.291715] do_iter_readv_writev+0x84d/0xa00 [ 88.296234] ? tun_chr_read_iter+0x460/0x460 [ 88.300656] do_iter_write+0x30d/0xd40 [ 88.304560] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 88.310031] do_writev+0x3c9/0x830 [ 88.313590] ? syscall_return_slowpath+0xe9/0x700 [ 88.318445] ? fput+0x25c/0x2e0 [ 88.321743] SYSC_writev+0x9b/0xb0 [ 88.325298] SyS_writev+0x56/0x80 [ 88.328761] do_syscall_64+0x309/0x430 [ 88.332659] ? SYSC_readv+0xb0/0xb0 [ 88.336300] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.341488] RIP: 0033:0x455241 [ 88.344678] RSP: 002b:00007fe62f352ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 88.352395] RAX: ffffffffffffffda RBX: 0000000000000366 RCX: 0000000000455241 2018/04/22 11:42:37 executing program 4: r0 = dup(0xffffffffffffff9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f0000000080)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=@flushpolicy={0x364, 0x1d, 0x400, 0x70bd29, 0x25dfdbfb, "", [@address_filter={0x28, 0x1a, {@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0xa, 0xffffffffffffff31}}, @policy={0xac, 0x7, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e22, 0x1, 0x4e24, 0x1ff, 0xa, 0x20, 0x80, 0xc, r1, r2}, {0x71, 0x4, 0xfff, 0x1ff, 0x95, 0x7, 0x7}, {0x6, 0x100000000000000, 0xffffffff00000001, 0xffffffffffff7fff}, 0x9, 0x6e6bbe, 0x2, 0x0, 0x1, 0x3}}, @algo_auth={0xf8, 0x1, {{'rmd320\x00'}, 0x578, "a8c4cf753bec341c6d50c56d56401d375e24a7d49ba6f669806896b77445893784cf303357a53c58acb5451369167d81a3793f8731c49fb91838ae0a6b9b51e53106e791d6be9099e775aad9e1d1ceaef65a2313e17c990578893ab26fcfdf7b762eef553765f0f4a6445508b45766c69052d18da9a353d1aa67968fe475830154fc4799cfc5452b1a581deb5dd21687b2007a2d059b1b27f50f566f6a00193c87052a9682fb86c0c47dc53a22ba87"}}, @srcaddr={0x14, 0xd, @in6=@local={0xfe, 0x80, [], 0xaa}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd27, 0x70bd29, 0x70bd27, 0x70bd2a, 0x0, [0x462, 0x5, 0x8, 0x9d, 0x9, 0x7fff]}}, @output_mark={0x8, 0x1d, 0x8}, @ipv4_hthresh={0x8, 0x3, {0x0, 0xc}}, @ipv4_hthresh={0x8, 0x3, {0x3, 0x13}}, @algo_crypt={0x128, 0x2, {{'ecb-camellia-asm\x00'}, 0x6f0, "6aec7cb1f626d7ac2c80eeab36edf9d2608feca3f00630fb1378dbddaf2bc045c03238229365c5ba7ace9ff6850516cc763dc0633486b092f59d98a603d681557465b2993243a8cc8d8fc5664a42adad1abd41e15b78af8a006e59aa15bfb77b0299b48e13032d4d93383a86ba7018a634ace7baebe6bdaaf6df961f9466fa42959046e193de79cf6f26b816d6378f62f1d370f931873b3ff5a65c5364dd40454ad6128b07366e99f761229eac5b46795e764f2502d9a3f05b5a8ec6aaf30e9900c08108b25007e1a3ed0cabe0993ba2154331fb8407dc9243ee3331d47d"}}]}, 0x364}, 0x1, 0x0, 0x0, 0x20004804}, 0x800) r3 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r4 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/22 11:42:37 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = dup(0xffffffffffffffff) sendto$ax25(r2, &(0x7f0000000040), 0x0, 0x20048000, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/81, 0x51, 0x0, 0x0, 0x0) 2018/04/22 11:42:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00009f9000)={0x0, 0x0, &(0x7f0000d58ff0)=[{&(0x7f00003faf57)='>', 0x1}], 0x1, &(0x7f00005e5000)}, 0x8000) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xe080000000000, 0x0) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x8, 0x9, 0x5, 0x8, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) bind$alg(r2, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) seccomp(0x0, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x3, 0x2, 0xffffffff}, {0xffffffffffffffff, 0x40, 0x7, 0x9}, {0x822a, 0x1f, 0xb3, 0x3}, {0x40, 0x7f, 0x36, 0x8001}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000400)={0x7, 0x4, 0x27, 0x800, 0x0}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000580)={&(0x7f0000000180)=@in6={0xa, 0x5b, 0x6, @dev={0xfe, 0x80, [], 0xb}, 0x400}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000001c0)="79ba3a5575830f324816adc9f05511c326116e9ee5de90a6fc9c572c102c3ce9829114939c1b7b967e8ccad261e1c2be2f8b2960b25a92f609c74a21d47055c9f4aa51a7734861fc9ba460b8ad89da383473b0dd47ca6553cfc37e23a43d83207d95d228bbfaac4c67bdcb7eed3fdfb5d535fcc126824b179fbda25c0d138847a38775677f3c0f13bd61b5085fb16442a9ba808abf5e2322c4e02b400fbbf59af3fd6407fb7a81c655460d2dac752e172346dd2a980bb9d649a3ded161e41ecfa88b1d0e8eab12f91e4a80073bb098b4eb7f3f3910310af28587394778800d6b72d654ea2277c4ecbfc29e", 0xeb}, {&(0x7f00000002c0)="fee6728ec8c11cf4722c3b27e94d74516985e6dafd9757448d3ee965", 0x1c}, {&(0x7f0000000300)="a4584d51058d8a3aa7787c5960f38b3a56ecf38690b39cc1d264a4b0b2665e1312adda875a092e81385fddb307ecbe755501d47b7e34944f97e3d9112b596911a8418a551a809163708c2d683c04396472e067eb627813bdaefbcf6fc2acbeb5dec9a302bcd8090c275322e4cfaca1b407150b4fd57061a9a4b25020d4c8adc75c01f145b0291939e021cec704452b31582c9995df3d1ebfdfe1925f32a756e73d3012ed3d1fa67b361c8b9f507d034baba1baa9f4605354630a7981e0da", 0xbe}], 0x3, &(0x7f0000000500)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x7, 0x6, 0x5, 0xef, 0x10000, 0x0, 0x0, r4}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x21d, 0x8000, 0x22ff, 0x4, 0x5, 0x888, 0x13, r5}}], 0x60, 0x40010}, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) sendfile(r1, r3, &(0x7f0000ccb000), 0x357) 2018/04/22 11:42:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f00005a1000)={&(0x7f0000000000)=@dellink={0x20, 0x11, 0xb1d, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}, 0x1}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='sched\x00') ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000340)={0x0, 0x5, 0x5, 0xc4, &(0x7f00000000c0)=""/196, 0x2, &(0x7f0000000200)=""/2, 0xe1, &(0x7f0000000240)=""/225}) r3 = dup2(r0, r0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x1, 0x2) [ 88.359679] RDX: 0000000000000001 RSI: 00007fe62f352bf0 RDI: 00000000000000fc [ 88.366970] RBP: 0000000020000080 R08: 00000000000000fc R09: 0000000000000000 [ 88.374253] R10: 0000000000000366 R11: 0000000000000293 R12: 0000000000000013 [ 88.381549] R13: 0000000000000661 R14: 00000000006fc9b8 R15: 0000000000000002 [ 88.529260] ================================================================== [ 88.536700] BUG: KMSAN: uninit-value in wp512_process_buffer+0x4ad5/0x4d90 [ 88.543734] CPU: 1 PID: 7045 Comm: syz-executor1 Not tainted 4.16.0+ #85 [ 88.550579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.559948] Call Trace: [ 88.562558] dump_stack+0x185/0x1d0 [ 88.566207] ? wp512_process_buffer+0x4ad5/0x4d90 [ 88.571071] kmsan_report+0x142/0x240 [ 88.574893] __msan_warning_32+0x6c/0xb0 [ 88.578973] wp512_process_buffer+0x4ad5/0x4d90 [ 88.583657] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 88.589148] ? __save_stack_trace+0x90d/0xb00 [ 88.593667] ? save_stack_trace+0xa5/0xf0 [ 88.597829] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 88.603296] ? update_stack_state+0x885/0xa40 [ 88.607813] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.613202] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 88.618666] ? update_stack_state+0x885/0xa40 [ 88.623183] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 88.628567] ? is_bpf_text_address+0xb4/0x4b0 [ 88.633088] ? __is_insn_slot_addr+0x198/0x1c0 [ 88.637685] ? kernel_text_address+0x34d/0x3a0 [ 88.642283] ? __kernel_text_address+0x34/0xe0 [ 88.646905] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 88.652372] ? __save_stack_trace+0x90d/0xb00 [ 88.656887] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.662274] ? save_stack_trace+0xa5/0xf0 [ 88.666438] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.671840] ? __irqentry_text_end+0x1fb47e/0x1fb47e [ 88.676984] ? kmsan_internal_chain_origin+0x1d3/0x210 [ 88.682286] ? kmsan_internal_chain_origin+0x12b/0x210 [ 88.687600] ? __msan_chain_origin+0x69/0xc0 [ 88.692031] ? wp512_update+0x76c/0xc40 [ 88.696030] ? shash_finup_unaligned+0x202/0x3f0 [ 88.700812] ? shash_ahash_finup+0x468/0xa30 [ 88.705248] ? shash_async_finup+0x11c/0x1b0 [ 88.709682] ? crypto_ahash_op+0x89a/0xc10 [ 88.713931] ? crypto_ahash_finup+0x8c/0xb0 [ 88.718260] ? hash_sendpage+0x88a/0xe10 [ 88.722335] ? sock_sendpage+0x1de/0x2c0 2018/04/22 11:42:37 executing program 0 (fault-call:0 fault-nth:3): syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 88.726402] ? pipe_to_sendpage+0x31b/0x430 [ 88.730731] ? __splice_from_pipe+0x49a/0xf30 [ 88.735235] ? generic_splice_sendpage+0x1c6/0x2a0 [ 88.740169] ? direct_splice_actor+0x19b/0x200 [ 88.744871] ? splice_direct_to_actor+0x764/0x1040 [ 88.749802] ? do_splice_direct+0x335/0x540 [ 88.754125] ? do_sendfile+0x1067/0x1e40 [ 88.758195] ? SYSC_sendfile64+0x1b3/0x300 [ 88.762432] ? SyS_sendfile64+0x64/0x90 [ 88.766435] ? do_syscall_64+0x309/0x430 [ 88.770512] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.775888] ? kernel_text_address+0x34d/0x3a0 [ 88.780485] ? __kernel_text_address+0x34/0xe0 [ 88.785082] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 88.790548] ? __save_stack_trace+0x90d/0xb00 [ 88.795051] ? apic_timer_interrupt+0xa/0x20 [ 88.799474] ? apic_timer_interrupt+0xa/0x20 [ 88.803897] wp512_update+0x5f4/0xc40 [ 88.807716] ? wp512_init+0xf0/0xf0 [ 88.811359] shash_finup_unaligned+0x202/0x3f0 [ 88.811953] FAULT_INJECTION: forcing a failure. [ 88.811953] name failslab, interval 1, probability 0, space 0, times 1 [ 88.815948] ? crypto_shash_finup+0x520/0x520 [ 88.815964] shash_ahash_finup+0x468/0xa30 [ 88.815984] ? __kmalloc+0x20c/0x350 [ 88.816003] shash_async_finup+0x11c/0x1b0 [ 88.816020] crypto_ahash_op+0x89a/0xc10 [ 88.816035] ? __kmalloc+0x23c/0x350 [ 88.816050] ? shash_async_final+0x1f0/0x1f0 [ 88.816065] ? shash_async_final+0x1f0/0x1f0 [ 88.816079] crypto_ahash_finup+0x8c/0xb0 [ 88.816093] hash_sendpage+0x88a/0xe10 [ 88.816109] ? hash_recvmsg+0xd50/0xd50 [ 88.816147] sock_sendpage+0x1de/0x2c0 [ 88.876725] pipe_to_sendpage+0x31b/0x430 [ 88.880868] ? sock_fasync+0x2b0/0x2b0 [ 88.884751] ? propagate_umount+0x3a30/0x3a30 [ 88.889245] __splice_from_pipe+0x49a/0xf30 [ 88.893563] ? generic_splice_sendpage+0x2a0/0x2a0 [ 88.898485] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 88.903839] generic_splice_sendpage+0x1c6/0x2a0 [ 88.908586] ? iter_file_splice_write+0x1710/0x1710 [ 88.915588] ? iter_file_splice_write+0x1710/0x1710 [ 88.920592] direct_splice_actor+0x19b/0x200 [ 88.924995] splice_direct_to_actor+0x764/0x1040 [ 88.929743] ? do_splice_direct+0x540/0x540 [ 88.934067] ? security_file_permission+0x28f/0x4b0 [ 88.939090] ? rw_verify_area+0x35e/0x580 [ 88.943245] do_splice_direct+0x335/0x540 [ 88.947394] do_sendfile+0x1067/0x1e40 [ 88.951292] SYSC_sendfile64+0x1b3/0x300 [ 88.956310] SyS_sendfile64+0x64/0x90 [ 88.960126] do_syscall_64+0x309/0x430 [ 88.964022] ? SYSC_sendfile+0x320/0x320 [ 88.968093] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.973269] RIP: 0033:0x455389 [ 88.976445] RSP: 002b:00007f380f40dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 88.984137] RAX: ffffffffffffffda RBX: 00007f380f40e6d4 RCX: 0000000000455389 [ 88.991393] RDX: 0000000020ccb000 RSI: 0000000000000015 RDI: 0000000000000014 [ 88.998652] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 89.005907] R10: 0000000000000357 R11: 0000000000000246 R12: 00000000ffffffff [ 89.013171] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 89.020430] [ 89.020464] CPU: 0 PID: 7060 Comm: syz-executor0 Not tainted 4.16.0+ #85 [ 89.022041] Uninit was stored to memory at: [ 89.022071] kmsan_internal_chain_origin+0x12b/0x210 [ 89.028908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.033199] __msan_chain_origin+0x69/0xc0 [ 89.033223] wp512_update+0x76c/0xc40 [ 89.038305] Call Trace: [ 89.047646] shash_finup_unaligned+0x202/0x3f0 [ 89.047671] shash_ahash_finup+0x468/0xa30 [ 89.051917] dump_stack+0x185/0x1d0 [ 89.055671] shash_async_finup+0x11c/0x1b0 [ 89.055693] crypto_ahash_op+0x89a/0xc10 [ 89.058277] should_fail+0x87b/0xab0 [ 89.062808] crypto_ahash_finup+0x8c/0xb0 [ 89.062835] hash_sendpage+0x88a/0xe10 [ 89.067078] should_failslab+0x279/0x2a0 [ 89.070650] sock_sendpage+0x1de/0x2c0 [ 89.070671] pipe_to_sendpage+0x31b/0x430 [ 89.074925] kmem_cache_alloc+0x136/0xb90 [ 89.078928] __splice_from_pipe+0x49a/0xf30 [ 89.078948] generic_splice_sendpage+0x1c6/0x2a0 [ 89.082668] ? build_skb+0x102/0x6b0 [ 89.086760] direct_splice_actor+0x19b/0x200 [ 89.086782] splice_direct_to_actor+0x764/0x1040 [ 89.090664] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 89.094679] do_splice_direct+0x335/0x540 [ 89.094700] do_sendfile+0x1067/0x1e40 [ 89.098642] ? copy_page_from_iter+0xa9c/0x10b0 [ 89.102696] SYSC_sendfile64+0x1b3/0x300 [ 89.102715] SyS_sendfile64+0x64/0x90 [ 89.106897] build_skb+0x102/0x6b0 [ 89.111149] do_syscall_64+0x309/0x430 [ 89.111173] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.115981] tun_get_user+0x1808/0x7c60 [ 89.119585] Uninit was created at: [ 89.119609] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 89.124038] ? mntput_no_expire+0xad/0x17c0 [ 89.128737] kmsan_alloc_page+0x82/0xe0 [ 89.128762] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 89.134248] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 89.138573] alloc_pages_vma+0xcc8/0x1800 [ 89.138596] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 89.142529] tun_chr_write_iter+0x1d4/0x330 [ 89.147127] shmem_getpage_gfp+0x35db/0x5770 [ 89.147150] shmem_fallocate+0xde2/0x1610 [ 89.151222] ? tun_chr_read_iter+0x460/0x460 [ 89.154978] vfs_fallocate+0x9dc/0xde0 [ 89.155000] SYSC_fallocate+0x119/0x1d0 [ 89.158532] do_iter_readv_writev+0x84d/0xa00 [ 89.162381] SyS_fallocate+0x64/0x90 [ 89.162402] do_syscall_64+0x309/0x430 [ 89.167684] ? tun_chr_read_iter+0x460/0x460 [ 89.171604] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.171618] Disabling lock debugging due to kernel taint [ 89.175162] do_iter_write+0x30d/0xd40 [ 89.180135] Kernel panic - not syncing: panic_on_warn set ... [ 89.180135] [ 89.184461] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 89.276404] do_writev+0x3c9/0x830 [ 89.280011] ? syscall_return_slowpath+0xe9/0x700 [ 89.284890] ? fput+0x25c/0x2e0 [ 89.288192] SYSC_writev+0x9b/0xb0 [ 89.291800] SyS_writev+0x56/0x80 [ 89.295305] do_syscall_64+0x309/0x430 [ 89.299224] ? SYSC_readv+0xb0/0xb0 [ 89.302864] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.308057] RIP: 0033:0x455241 [ 89.311247] RSP: 002b:00007fe62f352ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 89.318969] RAX: ffffffffffffffda RBX: 0000000000000366 RCX: 0000000000455241 [ 89.326241] RDX: 0000000000000001 RSI: 00007fe62f352bf0 RDI: 00000000000000fc [ 89.333511] RBP: 0000000020000080 R08: 00000000000000fc R09: 0000000000000000 [ 89.340787] R10: 0000000000000366 R11: 0000000000000293 R12: 0000000000000013 [ 89.348062] R13: 0000000000000661 R14: 00000000006fc9b8 R15: 0000000000000003 [ 89.355349] CPU: 1 PID: 7045 Comm: syz-executor1 Tainted: G B 4.16.0+ #85 [ 89.363509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.372863] Call Trace: [ 89.375457] dump_stack+0x185/0x1d0 [ 89.379093] panic+0x39d/0x940 [ 89.382293] ? wp512_process_buffer+0x4ad5/0x4d90 [ 89.387125] kmsan_report+0x238/0x240 [ 89.390914] __msan_warning_32+0x6c/0xb0 [ 89.394963] wp512_process_buffer+0x4ad5/0x4d90 [ 89.399618] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 89.405055] ? __save_stack_trace+0x90d/0xb00 [ 89.409536] ? save_stack_trace+0xa5/0xf0 [ 89.413670] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 89.419107] ? update_stack_state+0x885/0xa40 [ 89.423589] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.428939] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 89.434374] ? update_stack_state+0x885/0xa40 [ 89.438857] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 89.444206] ? is_bpf_text_address+0xb4/0x4b0 [ 89.448689] ? __is_insn_slot_addr+0x198/0x1c0 [ 89.453259] ? kernel_text_address+0x34d/0x3a0 [ 89.457829] ? __kernel_text_address+0x34/0xe0 [ 89.462408] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 89.467848] ? __save_stack_trace+0x90d/0xb00 [ 89.472337] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.477692] ? save_stack_trace+0xa5/0xf0 [ 89.481833] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.487181] ? __irqentry_text_end+0x1fb47e/0x1fb47e [ 89.492282] ? kmsan_internal_chain_origin+0x1d3/0x210 [ 89.497549] ? kmsan_internal_chain_origin+0x12b/0x210 [ 89.502814] ? __msan_chain_origin+0x69/0xc0 [ 89.507204] ? wp512_update+0x76c/0xc40 [ 89.511161] ? shash_finup_unaligned+0x202/0x3f0 [ 89.515903] ? shash_ahash_finup+0x468/0xa30 [ 89.520294] ? shash_async_finup+0x11c/0x1b0 [ 89.524684] ? crypto_ahash_op+0x89a/0xc10 [ 89.528900] ? crypto_ahash_finup+0x8c/0xb0 [ 89.533204] ? hash_sendpage+0x88a/0xe10 [ 89.538118] ? sock_sendpage+0x1de/0x2c0 [ 89.542169] ? pipe_to_sendpage+0x31b/0x430 [ 89.546470] ? __splice_from_pipe+0x49a/0xf30 [ 89.550954] ? generic_splice_sendpage+0x1c6/0x2a0 [ 89.555869] ? direct_splice_actor+0x19b/0x200 [ 89.560433] ? splice_direct_to_actor+0x764/0x1040 [ 89.565347] ? do_splice_direct+0x335/0x540 [ 89.569650] ? do_sendfile+0x1067/0x1e40 [ 89.573691] ? SYSC_sendfile64+0x1b3/0x300 [ 89.577903] ? SyS_sendfile64+0x64/0x90 [ 89.581871] ? do_syscall_64+0x309/0x430 [ 89.585918] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.591263] ? kernel_text_address+0x34d/0x3a0 [ 89.595833] ? __kernel_text_address+0x34/0xe0 [ 89.600400] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 89.605837] ? __save_stack_trace+0x90d/0xb00 [ 89.610315] ? apic_timer_interrupt+0xa/0x20 [ 89.614712] ? apic_timer_interrupt+0xa/0x20 [ 89.619107] wp512_update+0x5f4/0xc40 [ 89.622898] ? wp512_init+0xf0/0xf0 [ 89.626508] shash_finup_unaligned+0x202/0x3f0 [ 89.631074] ? crypto_shash_finup+0x520/0x520 [ 89.635554] shash_ahash_finup+0x468/0xa30 [ 89.639777] ? __kmalloc+0x20c/0x350 [ 89.643475] shash_async_finup+0x11c/0x1b0 [ 89.647694] crypto_ahash_op+0x89a/0xc10 [ 89.651738] ? __kmalloc+0x23c/0x350 [ 89.655435] ? shash_async_final+0x1f0/0x1f0 [ 89.659837] ? shash_async_final+0x1f0/0x1f0 [ 89.664229] crypto_ahash_finup+0x8c/0xb0 [ 89.668359] hash_sendpage+0x88a/0xe10 [ 89.672235] ? hash_recvmsg+0xd50/0xd50 [ 89.676195] sock_sendpage+0x1de/0x2c0 [ 89.680070] pipe_to_sendpage+0x31b/0x430 [ 89.684203] ? sock_fasync+0x2b0/0x2b0 [ 89.688077] ? propagate_umount+0x3a30/0x3a30 [ 89.692556] __splice_from_pipe+0x49a/0xf30 [ 89.697346] ? generic_splice_sendpage+0x2a0/0x2a0 [ 89.702263] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 89.707621] generic_splice_sendpage+0x1c6/0x2a0 [ 89.712363] ? iter_file_splice_write+0x1710/0x1710 [ 89.717359] ? iter_file_splice_write+0x1710/0x1710 [ 89.722357] direct_splice_actor+0x19b/0x200 [ 89.726750] splice_direct_to_actor+0x764/0x1040 [ 89.731485] ? do_splice_direct+0x540/0x540 [ 89.735880] ? security_file_permission+0x28f/0x4b0 [ 89.740883] ? rw_verify_area+0x35e/0x580 [ 89.745024] do_splice_direct+0x335/0x540 [ 89.749168] do_sendfile+0x1067/0x1e40 [ 89.753050] SYSC_sendfile64+0x1b3/0x300 [ 89.757099] SyS_sendfile64+0x64/0x90 [ 89.760883] do_syscall_64+0x309/0x430 [ 89.764754] ? SYSC_sendfile+0x320/0x320 [ 89.768817] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.773989] RIP: 0033:0x455389 [ 89.777165] RSP: 002b:00007f380f40dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 89.784853] RAX: ffffffffffffffda RBX: 00007f380f40e6d4 RCX: 0000000000455389 [ 89.792108] RDX: 0000000020ccb000 RSI: 0000000000000015 RDI: 0000000000000014 [ 89.799360] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 89.806617] R10: 0000000000000357 R11: 0000000000000246 R12: 00000000ffffffff [ 89.813871] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 89.821669] Dumping ftrace buffer: [ 89.825187] (ftrace buffer empty) [ 89.828876] Kernel Offset: disabled [ 89.832478] Rebooting in 86400 seconds..