INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2018/04/20 18:46:16 fuzzer started 2018/04/20 18:46:17 dialing manager at 10.128.0.26:40315 2018/04/20 18:46:23 kcov=true, comps=false 2018/04/20 18:46:26 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="d95fede92f6d", @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast=0xc, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/20 18:46:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00006f5000)={&(0x7f0000d1e000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000adefe0)={0x18, 0x18, 0x321, 0x0, 0x0, {0x40000001}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/20 18:46:26 executing program 7: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f}, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f}, 0xa) 2018/04/20 18:46:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00001f5000)={&(0x7f0000074000)=@alg, 0x80, &(0x7f0000612f80)=[{&(0x7f0000f81000)=""/4096, 0x1000}], 0x1, &(0x7f0000f7ffca)=""/87, 0x57}, 0x0) 2018/04/20 18:46:26 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) keyctl$invalidate(0x15, 0x0) 2018/04/20 18:46:26 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) close(r0) 2018/04/20 18:46:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@dev={0xfe, 0x80}, @empty, @remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000e}) 2018/04/20 18:46:26 executing program 6: clone(0x200, &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000500), 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) syzkaller login: [ 41.326199] ip (3756) used greatest stack depth: 54688 bytes left [ 41.948226] ip (3815) used greatest stack depth: 54672 bytes left [ 42.031581] ip (3819) used greatest stack depth: 54408 bytes left [ 42.811406] ip (3901) used greatest stack depth: 54200 bytes left [ 43.211126] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.217613] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.251671] device bridge_slave_0 entered promiscuous mode [ 43.284316] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.290790] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.294980] ip (3936) used greatest stack depth: 53656 bytes left [ 43.326133] device bridge_slave_0 entered promiscuous mode [ 43.364774] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.371218] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.406927] device bridge_slave_0 entered promiscuous mode [ 43.416767] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.423260] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.431775] device bridge_slave_0 entered promiscuous mode [ 43.443197] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.449641] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.464576] device bridge_slave_0 entered promiscuous mode [ 43.477961] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.484462] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.506282] device bridge_slave_1 entered promiscuous mode [ 43.515733] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.522185] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.547903] device bridge_slave_0 entered promiscuous mode [ 43.564195] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.570654] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.585602] device bridge_slave_1 entered promiscuous mode [ 43.591908] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.598400] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.614971] device bridge_slave_0 entered promiscuous mode [ 43.631336] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.637782] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.647348] device bridge_slave_1 entered promiscuous mode [ 43.662760] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.669245] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.698406] device bridge_slave_0 entered promiscuous mode [ 43.713392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.720515] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.726974] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.740095] device bridge_slave_1 entered promiscuous mode [ 43.747488] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.753974] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.785353] device bridge_slave_1 entered promiscuous mode [ 43.802691] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.809164] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.828925] device bridge_slave_1 entered promiscuous mode [ 43.836464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.848420] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.854914] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.866428] device bridge_slave_1 entered promiscuous mode [ 43.880695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.888004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.900065] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.906507] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.951010] device bridge_slave_1 entered promiscuous mode [ 43.957899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.967956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.982885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.991774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.044948] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.082236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.148147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.173694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.190976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.201699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.233511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.387626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.935669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.976825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.010696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.150645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.181576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.191716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.202104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.213551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.238706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.257645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.386162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.405807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.432913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.481293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.499765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.582864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.093231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.103773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.225987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.306618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.340795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.407368] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.427365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.445979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.466101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.481208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.513900] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.521150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.539650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.576456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.589407] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.596547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.621997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.661291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.668826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.696444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.707165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 46.715213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.730417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.756536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.787994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.796091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.811436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.856933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.881381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 46.892167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.900432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.919097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.940658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.958114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.976520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.987118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.001704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.013691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.024761] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.034112] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.041202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.071738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.082562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.091211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.099706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.107815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.133198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.140412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.152742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.179891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.187539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.194924] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.202220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.226730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.252577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.274745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.292697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.306765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.339695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.347148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.361964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.381739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.401488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.427184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.191885] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.198372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.205257] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.211703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.253472] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.264903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.310254] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.316724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.323589] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.330100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.380326] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.439015] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.445528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.452388] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.458842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.498422] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.508073] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.514515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.521344] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.527770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.547664] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.561833] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.568297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.575175] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.581627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.613206] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.712393] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.718865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.725700] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.732133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.783210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.804426] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.810887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.817740] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.824176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.857104] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.880804] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.887263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.894130] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.900569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.959375] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.272198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.289642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.316624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.335257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.350420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.359629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.368435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.579445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.675532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.796096] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.811588] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.879960] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.948235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.037251] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.184084] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.378131] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.384375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.395314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.522664] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.528921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.540082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.577697] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.584709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.591890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.650900] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.657309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.671162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.703553] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.714190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.755290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.783957] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.791215] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.800684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.839611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.864504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.886947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.101539] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.108124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.118569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 18:46:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0xc) sendmsg(r0, &(0x7f0000001700)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bpq0\x00'}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000440)="03", 0x1}], 0x1}, 0x0) 2018/04/20 18:46:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) recvmmsg(r1, &(0x7f000000ab00)=[{{&(0x7f000000a680)=@in, 0x80, &(0x7f000000a9c0), 0x0, &(0x7f000000aa00)=""/225, 0xe1}}], 0x1, 0x0, &(0x7f000000acc0)={0x0, 0x989680}) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/04/20 18:46:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f000000b540)=[{{&(0x7f000000a040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x80, &(0x7f000000b240), 0x0, &(0x7f000000b280)=[{0x10}], 0x10, 0x4}, 0x1}], 0x1, 0x4000004) 2018/04/20 18:46:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000080)=@generic={0x0, "7a390e1af411173076d4ab0151a482d83f18de80d8200d8f23f8f12c37634f7c914fc2cda8677e55f76c0d214054f4516116892d67cfcca0ae2832d76486284a0fad03a2f0f1c8020c627ce45c970b36df83aa20cf44a94219d60c0487cb86f20fbe43a38af682b80405d54969941dcd2b12f6071a1f4e6218a250b70a5a"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) 2018/04/20 18:46:52 executing program 7: r0 = memfd_create(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000002180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000030c000)={0x0, 0x0, 0x0, "98de7a8c5ae95ec8792c92150fc33a664f13eeab65c0322901ca6bd31bde2c51f06c5f0b014f9f91eeb7647c7240f476c8d75dd000aa8faf8fb5740200a6dc4d"}) r3 = syz_open_dev$sndseq(&(0x7f0000001080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0x400}}) 2018/04/20 18:46:52 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x26}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x20000000, 0x0, &(0x7f0000000080)) 2018/04/20 18:46:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7a, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x7f, 0x0, 0x0, 0x0, "020003fe040000000000031703ffffe7fbffffffffffffffffff030807a7e633"}) 2018/04/20 18:46:52 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc0bc5310, &(0x7f0000000040)={0x200000000000, 0x0, 0x0, {}, 0x0, 0x3}) 2018/04/20 18:46:53 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000200)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x357, &(0x7f0000000640), 0x0, &(0x7f0000000100)}, 0x0) 2018/04/20 18:46:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 2018/04/20 18:46:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) memfd_create(&(0x7f00007b0000)="1f00", 0x0) 2018/04/20 18:46:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000010000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000018000)="640000000005ff031dffee946f0000000a200a0009000800001d25680c1ba3e20400ff7ee55b18b0860dc4977bf4efc90a36a52cb0258863cebb091c27491810f81630d760346024d93357ea6fc31a803e7f820cfeb5c5290b5e5c6a5f3b908c02441247", 0x64}], 0x1}, 0x0) 2018/04/20 18:46:53 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="40020020", 0x4) sendfile(r2, r1, &(0x7f0000807000), 0x3f) 2018/04/20 18:46:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)) 2018/04/20 18:46:53 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') sendfile(r0, r1, &(0x7f0000000000)=0x122, 0x6) 2018/04/20 18:46:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000002540)=[{{&(0x7f0000002040)=@alg, 0x22e, &(0x7f0000002500)}}], 0x1, 0x0, &(0x7f0000002680)) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/20 18:46:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40600) clone(0x18c2503, &(0x7f000052cf69), &(0x7f0000850ffc), &(0x7f0000e9b000), &(0x7f0000000000)) 2018/04/20 18:46:53 executing program 0: munmap(&(0x7f0000009000/0x1000)=nil, 0x1000) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) 2018/04/20 18:46:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000013c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000001380)={&(0x7f00000011c0)={0x28, r1, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x28}, 0x1}, 0x0) 2018/04/20 18:46:53 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) accept4(0xffffffffffffffff, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) shutdown(0xffffffffffffffff, 0x0) poll(&(0x7f0000000180)=[{r1}, {r0}], 0x2, 0x0) 2018/04/20 18:46:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c90756b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000040)={[{@nocase='nocase', 0x2c}]}) mkdir(&(0x7f0000000080)='./file0/f.le0\x00', 0x0) 2018/04/20 18:46:53 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') writev(r0, &(0x7f00000000c0)=[{&(0x7f00000018c0)='+', 0x1}], 0x1) 2018/04/20 18:46:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) recvmmsg(r1, &(0x7f000000ab00)=[{{&(0x7f000000a680)=@in, 0x80, &(0x7f000000a9c0), 0x0, &(0x7f000000aa00)=""/225, 0xe1}}], 0x1, 0x0, &(0x7f000000acc0)={0x0, 0x989680}) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/04/20 18:46:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) ioctl$int_in(r1, 0x5452, &(0x7f000079d000)=0x100000000000001) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 18:46:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000d7bfc8)=@routing, 0x8) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c2d000), 0x0) 2018/04/20 18:46:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000080)={0x2, 0x1, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0xfc0000) accept4(r0, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x10, 0x0) 2018/04/20 18:46:54 executing program 1: 2018/04/20 18:46:54 executing program 3: 2018/04/20 18:46:54 executing program 7: 2018/04/20 18:46:54 executing program 1: 2018/04/20 18:46:55 executing program 0: 2018/04/20 18:46:55 executing program 3: 2018/04/20 18:46:55 executing program 6: 2018/04/20 18:46:55 executing program 7: 2018/04/20 18:46:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000500)="1f000000520007f200934e060b3f405a6100b2fef5000f430aa9f07e130586", 0x1f) recvmmsg(r0, &(0x7f0000002400)=[{{&(0x7f0000001fc0)=@vsock, 0x80, &(0x7f0000002380)}}], 0x4000000000002e3, 0x0, &(0x7f0000002580)={0x77359400}) 2018/04/20 18:46:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) ioctl$int_in(r1, 0x5452, &(0x7f000079d000)=0x100000000000001) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/20 18:46:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) recvmmsg(r1, &(0x7f000000ab00)=[{{&(0x7f000000a680)=@in, 0x80, &(0x7f000000a9c0), 0x0, &(0x7f000000aa00)=""/225, 0xe1}}], 0x1, 0x0, &(0x7f000000acc0)={0x0, 0x989680}) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/04/20 18:46:55 executing program 5: 2018/04/20 18:46:55 executing program 5: 2018/04/20 18:46:55 executing program 0: 2018/04/20 18:46:55 executing program 6: 2018/04/20 18:46:55 executing program 7: 2018/04/20 18:46:55 executing program 3: 2018/04/20 18:46:55 executing program 2: 2018/04/20 18:46:55 executing program 1: 2018/04/20 18:46:55 executing program 5: 2018/04/20 18:46:55 executing program 7: 2018/04/20 18:46:55 executing program 3: 2018/04/20 18:46:56 executing program 6: 2018/04/20 18:46:56 executing program 0: 2018/04/20 18:46:56 executing program 2: 2018/04/20 18:46:56 executing program 1: 2018/04/20 18:46:56 executing program 3: 2018/04/20 18:46:56 executing program 7: 2018/04/20 18:46:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) recvmmsg(r1, &(0x7f000000ab00)=[{{&(0x7f000000a680)=@in, 0x80, &(0x7f000000a9c0), 0x0, &(0x7f000000aa00)=""/225, 0xe1}}], 0x1, 0x0, &(0x7f000000acc0)={0x0, 0x989680}) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/04/20 18:46:56 executing program 5: 2018/04/20 18:46:56 executing program 2: 2018/04/20 18:46:56 executing program 7: 2018/04/20 18:46:56 executing program 5: 2018/04/20 18:46:56 executing program 1: 2018/04/20 18:46:56 executing program 6: 2018/04/20 18:46:56 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000b40), 0x4) 2018/04/20 18:46:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f00000002c0)='\a', 0x1}], 0x1) 2018/04/20 18:46:56 executing program 6: 2018/04/20 18:46:56 executing program 5: 2018/04/20 18:46:56 executing program 1: 2018/04/20 18:46:56 executing program 7: 2018/04/20 18:46:56 executing program 3: 2018/04/20 18:46:57 executing program 2: 2018/04/20 18:46:57 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000b40), 0x4) 2018/04/20 18:46:57 executing program 6: 2018/04/20 18:46:57 executing program 1: 2018/04/20 18:46:57 executing program 5: 2018/04/20 18:46:57 executing program 3: 2018/04/20 18:46:57 executing program 4: 2018/04/20 18:46:57 executing program 7: 2018/04/20 18:46:57 executing program 7: 2018/04/20 18:46:57 executing program 5: 2018/04/20 18:46:57 executing program 1: 2018/04/20 18:46:57 executing program 2: 2018/04/20 18:46:57 executing program 6: 2018/04/20 18:46:57 executing program 3: 2018/04/20 18:46:57 executing program 4: 2018/04/20 18:46:57 executing program 7: 2018/04/20 18:46:57 executing program 0: 2018/04/20 18:46:57 executing program 0: 2018/04/20 18:46:57 executing program 3: r0 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"64596df17c0e42dcd01624c7d189e000", 0x4000020000000401}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) 2018/04/20 18:46:57 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000008000)={&(0x7f000000c000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x821, 0x0, 0x0, {0x4}, [@nested={0x10, 0x0, [@typed={0xc, 0x1, @uid}]}]}, 0x24}, 0x1}, 0x0) 2018/04/20 18:46:57 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) sync() 2018/04/20 18:46:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x3a, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @icmpv6=@echo_request={0x80}}}}}}, &(0x7f0000000180)) 2018/04/20 18:46:57 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @loopback=0x7f000001, 0x0, 0x0, 'lblcr\x00$\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/20 18:46:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f000038aff4)={0x10}, 0xc, &(0x7f0000023000)={&(0x7f0000307000)={0x20, 0xb, 0x6, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u32}]}, 0x20}, 0x1}, 0x0) 2018/04/20 18:46:57 executing program 7: 2018/04/20 18:46:57 executing program 0: 2018/04/20 18:46:57 executing program 6: futex(&(0x7f0000000000), 0x3, 0xfffffffffffffff9, &(0x7f0000000040), &(0x7f0000000080), 0x0) 2018/04/20 18:46:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xb, 0x43, 0x4, 0x100000002, 0x1}, 0x2c) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x20}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180)='\'', &(0x7f0000eee000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000100)={r0, &(0x7f0000000380), &(0x7f0000000040)=""/84}, 0x18) 2018/04/20 18:46:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0x40, 0x3f) 2018/04/20 18:46:57 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/20 18:46:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') r1 = epoll_create(0x1f) exit(0x0) poll(&(0x7f0000000080)=[{r0}], 0x2bd, 0x9b) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000b58ff4)) mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) 2018/04/20 18:46:57 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000006ffc)={{&(0x7f0000003000/0x1000)=nil, 0x1000}}) 2018/04/20 18:46:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x20, 0x20, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0xc, 0x0, @fd}]}, 0x20}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x26, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/226, 0xe2}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x4030582a, &(0x7f00000000c0)={"73690100000000001000"}) 2018/04/20 18:46:57 executing program 5: move_pages(0x0, 0x6, &(0x7f0000000040)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f0000000080), &(0x7f00000000c0), 0x0) kexec_load(0x0, 0x2, &(0x7f0000000040), 0x0) 2018/04/20 18:46:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0x39, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa}, [@replay_esn_val={0x1c, 0x17}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}, 0x1}, 0x0) 2018/04/20 18:46:57 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r1, 0xa01, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 2018/04/20 18:46:58 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$addseals(r0, 0x409, 0x800003) 2018/04/20 18:46:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x20, 0x20, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0xc, 0x0, @fd}]}, 0x20}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x26, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/226, 0xe2}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x4030582a, &(0x7f00000000c0)={"73690100000000001000"}) 2018/04/20 18:46:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0x40, 0x3f) 2018/04/20 18:46:58 executing program 6: r0 = socket(0x11, 0x4000000000080003, 0x0) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "a0051f05d8edd160ba253a14391a32de78b97cff25cc93f6d7bafcb7c812159dee29722828a4ed2775de8e4c89078a4ea87878c0a79f006cf69d9f3dc00ecf"}, 0x60) 2018/04/20 18:46:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) mmap(&(0x7f0000399000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 2018/04/20 18:46:58 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 2018/04/20 18:46:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() prctl$setptracer(0x59616d61, r0) 2018/04/20 18:46:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000003c0)="c1", 0x1}], 0x1, &(0x7f00000004c0)=[@iv={0xb0, 0x117, 0x2, 0x95, "729446954ea191d5cdac7b88ed2b94264fdfcb5bebf308126240a3009b40d78c52221cd38726d042a9a0e6c211519f92e75b31755c4b2967574ac34fb987a287eabad42f4c133866d321ab7e276f6f25fa565ab69802cef112e262a2ee76920ccee0fcd1edcbd5f89b701060c751907395f90ccfdd1c2c601f743745c287e29d4a0eea39fd6c7746cc77afe8b7d44bd128afca2d7b"}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x38, 0x117, 0x2, 0x20, "45f62f26a04f3990176d7a0f476f70d11071d88f9fef4872d6402b553d65701d"}], 0x118, 0x80}, 0x0) 2018/04/20 18:46:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') r1 = epoll_create(0x1f) exit(0x0) poll(&(0x7f0000000080)=[{r0}], 0x2bd, 0x9b) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000b58ff4)) mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) 2018/04/20 18:46:59 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) ftruncate(r0, 0x0) 2018/04/20 18:46:59 executing program 3: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) accept4(r0, 0x0, &(0x7f0000000000), 0x0) 2018/04/20 18:46:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000006fc8)={0x0, 0x0, &(0x7f000000e000), 0x0, &(0x7f0000011000)}, 0xc100) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="69e23e4896a984957489294a22e985fa5f9c7033", 0x14}], 0x1, &(0x7f00000000c0)}, 0x0) 2018/04/20 18:46:59 executing program 6: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x2, 0x6}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r1, 0x1, 0x6, @random="b89c2ecee91b"}, 0x10) 2018/04/20 18:46:59 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 2018/04/20 18:46:59 executing program 1: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x40) 2018/04/20 18:46:59 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2003e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) tee(r1, r0, 0x1, 0x0) 2018/04/20 18:46:59 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @broadcast=0xffffffff}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 2018/04/20 18:46:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000004c0)={'veth0\x00', 0x1}) 2018/04/20 18:46:59 executing program 4: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) 2018/04/20 18:46:59 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000020000", 0x1f) 2018/04/20 18:46:59 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000300)=""/9, 0x9}, {&(0x7f00000003c0)=""/4096, 0xfffffef9}], 0x2) 2018/04/20 18:46:59 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) ftruncate(r0, 0x0) [ 72.408015] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 72.487185] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/20 18:47:00 executing program 3: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x3e) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000004c0)="6b73c47ace60a7241549c019165f82fe0d756ad6283faade8cc030f9dc1f272ff7a07f52fda8089fbaa08a4a78b0aeee7f26199eb80de2a833e51182fb25561326da4b1847d111e5e43932186f505f6b9018679952e9", 0x56}, {&(0x7f0000000640)="3fa3d49b1260a5c630ed2d00f8c87b8a6000b123527f09125564215134d38f16156c55567ace61b05f298f12ea4a713cc839a4044a0c1634fcb9f83d0753e4efff9d75a2aeed27c6d0a78d72336309cdf3281fa82386", 0x56}], 0x2) 2018/04/20 18:47:00 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x7fff}, 0x2c) 2018/04/20 18:47:00 executing program 1: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f000003e000)='\'', 0x0) 2018/04/20 18:47:00 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f11d55)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x18) connect$inet6(r0, &(0x7f0000f02000)={0xa}, 0x1c) 2018/04/20 18:47:00 executing program 0: r0 = socket(0x1f, 0x2000000000000005, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/20 18:47:00 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffff}, &(0x7f0000000040)=0x20) 2018/04/20 18:47:00 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) fcntl$setflags(r1, 0x2, 0x0) 2018/04/20 18:47:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000180)='\t', 0x1}], 0x1, &(0x7f0000001040)=ANY=[]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="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", 0x21d}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000340)={'#! ', './file0', [{0x20, '/selinux/enforce\x00'}], 0xa, "a139654bc816b35eb80ae4ee846a08946ff0c44588a2c8d94ccf2eb40e4ad86f82440ad7f8674c563fd2ea1923046354391c58fffac69f4b57feb1bcb48505d880c9332d7cf38df796056f3787362dc927f47f8bd66446daa627641947ed1226f0f13255e51a815175af68decf89396be229aa3d1f6a4a88cd5207596a2dc4fb57cb1cfddad4dabc35a61ea6f56cb2bb6de91e50109eff5a32e1a32f7ddef0804f9cfa"}, 0xc0) 2018/04/20 18:47:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 2018/04/20 18:47:00 executing program 0: r0 = socket(0x1f, 0x2000000000000005, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/20 18:47:00 executing program 7: r0 = socket(0x1e, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000454ff0)={0x0, 0x2710}, 0x10) recvfrom$inet6(r0, &(0x7f0000c6e000)=""/55, 0x37, 0x0, &(0x7f000024a000)={0xa}, 0x1c) 2018/04/20 18:47:00 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendto(r0, &(0x7f00009ccff0), 0x7fffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006480)=[{{0x0, 0x0, &(0x7f0000002480), 0x0, &(0x7f0000002500), 0x0, 0xc5464026521cd69c}}, {{&(0x7f0000006040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000040)}}], 0x3ffffffffffff9d, 0x40) 2018/04/20 18:47:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f000059fff4)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f0000070000)={0x14, 0x1c, 0x109, 0x0, 0x0, {0x40000001}}, 0x14}, 0x1}, 0x0) 2018/04/20 18:47:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:00 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000300)={0x0, ""/221}, 0xe5, 0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 2018/04/20 18:47:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000180)='\t', 0x1}], 0x1, &(0x7f0000001040)=ANY=[]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="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", 0x21d}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000340)={'#! ', './file0', [{0x20, '/selinux/enforce\x00'}], 0xa, "a139654bc816b35eb80ae4ee846a08946ff0c44588a2c8d94ccf2eb40e4ad86f82440ad7f8674c563fd2ea1923046354391c58fffac69f4b57feb1bcb48505d880c9332d7cf38df796056f3787362dc927f47f8bd66446daa627641947ed1226f0f13255e51a815175af68decf89396be229aa3d1f6a4a88cd5207596a2dc4fb57cb1cfddad4dabc35a61ea6f56cb2bb6de91e50109eff5a32e1a32f7ddef0804f9cfa"}, 0xc0) 2018/04/20 18:47:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x803, 0x85) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0xffffffff, 0x0, 0x200, 0xe8, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@dev={0xac, 0x14, 0x14}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'gre0\x00', 'erspan0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @loopback=0x7f000001, 0x0, 0x0, 'bridge0\x00', 'gretap0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x370) 2018/04/20 18:47:00 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3}, 0x10) sendto$inet(r1, &(0x7f0000143f1e)="96", 0x1, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00008f9ffc)) 2018/04/20 18:47:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000716000)=@in={0x2}, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="a75fdcf8382d87057501070000000000dc72564f955555cc153a58ac4e35000000000000", 0x24}], 0x1, &(0x7f0000000000)}, 0x0) 2018/04/20 18:47:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000133ffc)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/4096, 0xfea7}], 0x1) 2018/04/20 18:47:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:01 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x8002, &(0x7f0000000780)) 2018/04/20 18:47:01 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0x10001) fallocate(r0, 0x10000000000011, 0x2, 0x208021) 2018/04/20 18:47:01 executing program 6: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f00007f6fe0)) 2018/04/20 18:47:01 executing program 2: clone(0x200, &(0x7f00000003c0), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000b40000)) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f00000004c0), 0x8) getdents64(r0, &(0x7f00000003c0)=""/154, 0x9a) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/20 18:47:01 executing program 7: semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000140)) unshare(0x40000) semtimedop(0x0, &(0x7f00000a8000)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000003000)) 2018/04/20 18:47:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000000c0)='/\x00', 0x0, 0x0, &(0x7f0000000300), 0x828020, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, [0x36]}, 0x2c}]}) 2018/04/20 18:47:02 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/20 18:47:02 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='gfs2meta\x00', 0x0, &(0x7f0000000080)) 2018/04/20 18:47:02 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x54a3, &(0x7f00000001c0)=""/188) 2018/04/20 18:47:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3bf5, 0x0, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x2}, 0x0) 2018/04/20 18:47:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0xffc99a3b, &(0x7f0000000680)={0x77359400}) 2018/04/20 18:47:02 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000312ff0)=[{&(0x7f0000000080)="48000000140019ea19ca424a2efa55560affffffffe006ff00000000bc5603ca00000fff890000000709ff5bff87c3e4cb6b716c0123b261a2000000000000000000000000000000", 0x48}], 0x1) 2018/04/20 18:47:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x80003, 0x1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000580)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x14, 0x0, 0x0, 0x0, 0x0, {0x5}}, 0x14}, 0x1}, 0x0) 2018/04/20 18:47:02 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000100)={0x0, 0x8001, 0x1}) 2018/04/20 18:47:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) tkill(r0, 0x1000000000013) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000c44000)={0x77359400}, &(0x7f0000048000), 0x0) 2018/04/20 18:47:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)='F', 0x1}], 0x1, &(0x7f0000000400)}, 0x8801) 2018/04/20 18:47:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x1, 0x0) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0x14, 0x27, 0x331, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 2018/04/20 18:47:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002700000025000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/20 18:47:02 executing program 5: r0 = socket$inet(0x10, 0x3, 0x9) sendmsg(r0, &(0x7f0000005fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000000)="230000002200910307fffd946fa283bc023f050000000000271d68b51ba3a2d103000000000000000182ccbb2dab4570915d118d", 0x34}], 0x1}, 0x0) 2018/04/20 18:47:03 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x10, 0x0, 0x24}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167, 0x41000}, 0x48) 2018/04/20 18:47:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='nfsd\x00', 0x1000021, 0x0) fchown(r0, 0x0, 0x0) 2018/04/20 18:47:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f35000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) writev(r1, &(0x7f0000c03f90)=[{&(0x7f0000c4afa1)="18", 0x1}], 0x1) 2018/04/20 18:47:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020401000200060000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) 2018/04/20 18:47:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:03 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x200000000) pread64(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 2018/04/20 18:47:03 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') read(r0, &(0x7f0000000180)=""/141, 0x8d) 2018/04/20 18:47:03 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="966df86c88ff6c873cf94adacc7f155829a48fffe2bbd6adf31d5aee36841213f02243bd1fc9c9eae86e23ad42f5e356da3124df5515799dcffba1f49f9ab05c4b1a8fee4c1df02a40c99d418458a260a4955b80e37b2962ae46f0cfcbf2bfda2b73f42cdf"], 0x65) 2018/04/20 18:47:03 executing program 2: 2018/04/20 18:47:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000010aff7)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00006d5000)=""/1, 0x1}], 0x1, 0x800) 2018/04/20 18:47:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80}}, 0x14) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(0xffffffffffffffff, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 18:47:04 executing program 5: r0 = socket$inet(0x2, 0x80006, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0x2, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) 2018/04/20 18:47:04 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/20 18:47:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000010ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x9) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8) 2018/04/20 18:47:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000017000)="010000000000000018") 2018/04/20 18:47:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) [ 77.171893] ================================================================== [ 77.179326] BUG: KMSAN: uninit-value in sha256_generic_block_fn+0xb05f/0xb460 [ 77.186603] CPU: 1 PID: 6440 Comm: syz-executor4 Not tainted 4.16.0+ #84 [ 77.193420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.202757] Call Trace: [ 77.205333] dump_stack+0x185/0x1d0 [ 77.208947] ? sha256_generic_block_fn+0xb05f/0xb460 [ 77.214039] kmsan_report+0x142/0x240 [ 77.217825] __msan_warning_32+0x6c/0xb0 [ 77.221870] sha256_generic_block_fn+0xb05f/0xb460 [ 77.226784] ? kmsan_internal_chain_origin+0x12b/0x210 [ 77.232040] ? kmsan_memcpy_origins+0x11d/0x170 [ 77.236691] ? __msan_memcpy+0x19f/0x1f0 [ 77.240738] ? crypto_sha256_finup+0x1d2/0x7e0 [ 77.245303] ? shash_ahash_finup+0x468/0xa30 [ 77.249692] ? shash_ahash_digest+0x5c6/0x600 [ 77.254171] ? shash_async_digest+0x11c/0x1b0 [ 77.258821] ? crypto_ahash_op+0x89a/0xc10 [ 77.263043] ? crypto_ahash_digest+0xe4/0x160 [ 77.267520] ? hash_sendpage+0xb40/0xe10 [ 77.271568] ? sock_sendpage+0x1de/0x2c0 [ 77.275612] ? pipe_to_sendpage+0x31b/0x430 [ 77.279918] ? __splice_from_pipe+0x49a/0xf30 [ 77.284397] ? generic_splice_sendpage+0x1c6/0x2a0 [ 77.289310] ? direct_splice_actor+0x19b/0x200 [ 77.293876] ? splice_direct_to_actor+0x764/0x1040 [ 77.298791] ? do_splice_direct+0x335/0x540 [ 77.303093] ? do_sendfile+0x1067/0x1e40 [ 77.307137] ? SYSC_sendfile64+0x1b3/0x300 [ 77.311353] ? SyS_sendfile64+0x64/0x90 [ 77.315308] ? do_syscall_64+0x309/0x430 [ 77.319352] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.324703] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 77.330140] ? __save_stack_trace+0x893/0xa80 [ 77.334621] ? kmsan_memcpy_origins+0x11d/0x170 [ 77.339280] crypto_sha256_finup+0x35e/0x7e0 [ 77.343676] ? sha256_generic_block_fn+0xb460/0xb460 [ 77.348760] shash_ahash_finup+0x468/0xa30 [ 77.352984] shash_ahash_digest+0x5c6/0x600 [ 77.357294] shash_async_digest+0x11c/0x1b0 [ 77.361599] crypto_ahash_op+0x89a/0xc10 [ 77.365645] ? __kmalloc+0x23c/0x350 [ 77.369340] ? shash_async_finup+0x1b0/0x1b0 [ 77.373730] ? shash_async_finup+0x1b0/0x1b0 [ 77.378127] crypto_ahash_digest+0xe4/0x160 [ 77.382434] hash_sendpage+0xb40/0xe10 [ 77.386305] ? hash_recvmsg+0xd50/0xd50 [ 77.390266] sock_sendpage+0x1de/0x2c0 [ 77.394145] pipe_to_sendpage+0x31b/0x430 [ 77.398280] ? sock_fasync+0x2b0/0x2b0 [ 77.402157] ? propagate_umount+0x3a30/0x3a30 [ 77.406635] __splice_from_pipe+0x49a/0xf30 [ 77.410940] ? generic_splice_sendpage+0x2a0/0x2a0 [ 77.415853] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 77.421201] generic_splice_sendpage+0x1c6/0x2a0 [ 77.425944] ? iter_file_splice_write+0x1710/0x1710 [ 77.430942] ? iter_file_splice_write+0x1710/0x1710 [ 77.435942] direct_splice_actor+0x19b/0x200 [ 77.440341] splice_direct_to_actor+0x764/0x1040 [ 77.445080] ? do_splice_direct+0x540/0x540 [ 77.449385] ? security_file_permission+0x28f/0x4b0 [ 77.454390] ? rw_verify_area+0x35e/0x580 [ 77.458522] do_splice_direct+0x335/0x540 [ 77.462656] do_sendfile+0x1067/0x1e40 [ 77.466538] SYSC_sendfile64+0x1b3/0x300 [ 77.470584] SyS_sendfile64+0x64/0x90 [ 77.474365] do_syscall_64+0x309/0x430 [ 77.478240] ? SYSC_sendfile+0x320/0x320 [ 77.482288] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.487468] RIP: 0033:0x455379 [ 77.490642] RSP: 002b:00007f43f0759c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 77.498333] RAX: ffffffffffffffda RBX: 00007f43f075a6d4 RCX: 0000000000455379 [ 77.505582] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 77.512830] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 77.520078] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 77.527327] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 77.534596] [ 77.536202] Uninit was stored to memory at: [ 77.540510] kmsan_internal_chain_origin+0x12b/0x210 [ 77.545591] kmsan_memcpy_origins+0x11d/0x170 [ 77.550066] __msan_memcpy+0x19f/0x1f0 [ 77.553935] crypto_sha256_finup+0x1d2/0x7e0 [ 77.558325] shash_ahash_finup+0x468/0xa30 [ 77.562538] shash_ahash_digest+0x5c6/0x600 [ 77.566838] shash_async_digest+0x11c/0x1b0 [ 77.571141] crypto_ahash_op+0x89a/0xc10 [ 77.575183] crypto_ahash_digest+0xe4/0x160 [ 77.579483] hash_sendpage+0xb40/0xe10 [ 77.583352] sock_sendpage+0x1de/0x2c0 [ 77.587225] pipe_to_sendpage+0x31b/0x430 [ 77.591356] __splice_from_pipe+0x49a/0xf30 [ 77.595659] generic_splice_sendpage+0x1c6/0x2a0 [ 77.600397] direct_splice_actor+0x19b/0x200 [ 77.604791] splice_direct_to_actor+0x764/0x1040 [ 77.609526] do_splice_direct+0x335/0x540 [ 77.613654] do_sendfile+0x1067/0x1e40 [ 77.617526] SYSC_sendfile64+0x1b3/0x300 [ 77.621569] SyS_sendfile64+0x64/0x90 [ 77.625347] do_syscall_64+0x309/0x430 [ 77.629217] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.634383] Uninit was created at: [ 77.637904] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 77.642899] kmsan_alloc_page+0x82/0xe0 [ 77.646855] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 77.651589] alloc_pages_vma+0xcc8/0x1800 [ 77.655717] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 77.660715] shmem_getpage_gfp+0x35db/0x5770 [ 77.665103] shmem_fallocate+0xde2/0x1610 [ 77.669231] vfs_fallocate+0x9dc/0xde0 [ 77.673099] SYSC_fallocate+0x119/0x1d0 [ 77.677054] SyS_fallocate+0x64/0x90 [ 77.680745] do_syscall_64+0x309/0x430 [ 77.684615] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.689867] ================================================================== [ 77.697200] Disabling lock debugging due to kernel taint [ 77.702627] Kernel panic - not syncing: panic_on_warn set ... [ 77.702627] [ 77.709976] CPU: 1 PID: 6440 Comm: syz-executor4 Tainted: G B 4.16.0+ #84 [ 77.718096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.727438] Call Trace: [ 77.730192] dump_stack+0x185/0x1d0 [ 77.733812] panic+0x39d/0x940 [ 77.737012] ? sha256_generic_block_fn+0xb05f/0xb460 [ 77.742102] kmsan_report+0x238/0x240 [ 77.745885] __msan_warning_32+0x6c/0xb0 [ 77.749931] sha256_generic_block_fn+0xb05f/0xb460 [ 77.754844] ? kmsan_internal_chain_origin+0x12b/0x210 [ 77.760098] ? kmsan_memcpy_origins+0x11d/0x170 [ 77.764747] ? __msan_memcpy+0x19f/0x1f0 [ 77.768798] ? crypto_sha256_finup+0x1d2/0x7e0 [ 77.773363] ? shash_ahash_finup+0x468/0xa30 [ 77.777750] ? shash_ahash_digest+0x5c6/0x600 [ 77.782225] ? shash_async_digest+0x11c/0x1b0 [ 77.786703] ? crypto_ahash_op+0x89a/0xc10 [ 77.790919] ? crypto_ahash_digest+0xe4/0x160 [ 77.795398] ? hash_sendpage+0xb40/0xe10 [ 77.799443] ? sock_sendpage+0x1de/0x2c0 [ 77.803488] ? pipe_to_sendpage+0x31b/0x430 [ 77.807792] ? __splice_from_pipe+0x49a/0xf30 [ 77.812269] ? generic_splice_sendpage+0x1c6/0x2a0 [ 77.817183] ? direct_splice_actor+0x19b/0x200 [ 77.821747] ? splice_direct_to_actor+0x764/0x1040 [ 77.826662] ? do_splice_direct+0x335/0x540 [ 77.830966] ? do_sendfile+0x1067/0x1e40 [ 77.835019] ? SYSC_sendfile64+0x1b3/0x300 [ 77.839240] ? SyS_sendfile64+0x64/0x90 [ 77.843194] ? do_syscall_64+0x309/0x430 [ 77.847251] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.852606] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 77.858045] ? __save_stack_trace+0x893/0xa80 [ 77.862523] ? kmsan_memcpy_origins+0x11d/0x170 [ 77.867178] crypto_sha256_finup+0x35e/0x7e0 [ 77.871577] ? sha256_generic_block_fn+0xb460/0xb460 [ 77.876659] shash_ahash_finup+0x468/0xa30 [ 77.880880] shash_ahash_digest+0x5c6/0x600 [ 77.885184] shash_async_digest+0x11c/0x1b0 [ 77.889492] crypto_ahash_op+0x89a/0xc10 [ 77.893536] ? __kmalloc+0x23c/0x350 [ 77.897231] ? shash_async_finup+0x1b0/0x1b0 [ 77.901618] ? shash_async_finup+0x1b0/0x1b0 [ 77.906013] crypto_ahash_digest+0xe4/0x160 [ 77.910324] hash_sendpage+0xb40/0xe10 [ 77.914199] ? hash_recvmsg+0xd50/0xd50 [ 77.918166] sock_sendpage+0x1de/0x2c0 [ 77.922042] pipe_to_sendpage+0x31b/0x430 [ 77.926171] ? sock_fasync+0x2b0/0x2b0 [ 77.930045] ? propagate_umount+0x3a30/0x3a30 [ 77.934522] __splice_from_pipe+0x49a/0xf30 [ 77.938829] ? generic_splice_sendpage+0x2a0/0x2a0 [ 77.943743] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 77.949089] generic_splice_sendpage+0x1c6/0x2a0 [ 77.953831] ? iter_file_splice_write+0x1710/0x1710 [ 77.958830] ? iter_file_splice_write+0x1710/0x1710 [ 77.963831] direct_splice_actor+0x19b/0x200 [ 77.968225] splice_direct_to_actor+0x764/0x1040 [ 77.972965] ? do_splice_direct+0x540/0x540 [ 77.977275] ? security_file_permission+0x28f/0x4b0 [ 77.982276] ? rw_verify_area+0x35e/0x580 [ 77.986408] do_splice_direct+0x335/0x540 [ 77.990542] do_sendfile+0x1067/0x1e40 [ 77.994419] SYSC_sendfile64+0x1b3/0x300 [ 77.998465] SyS_sendfile64+0x64/0x90 [ 78.002246] do_syscall_64+0x309/0x430 [ 78.006128] ? SYSC_sendfile+0x320/0x320 [ 78.010177] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.015345] RIP: 0033:0x455379 [ 78.018513] RSP: 002b:00007f43f0759c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 78.026203] RAX: ffffffffffffffda RBX: 00007f43f075a6d4 RCX: 0000000000455379 [ 78.033456] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 78.040707] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 78.047957] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 78.055208] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 78.062939] Dumping ftrace buffer: [ 78.066551] (ftrace buffer empty) [ 78.070235] Kernel Offset: disabled [ 78.073834] Rebooting in 86400 seconds..