INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.45' (ECDSA) to the list of known hosts. 2018/04/13 19:46:54 fuzzer started 2018/04/13 19:46:55 dialing manager at 10.128.0.26:33379 2018/04/13 19:47:01 kcov=true, comps=false 2018/04/13 19:47:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xffffffff00000001, 0x8, 0x4}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x7}, 0xc) 2018/04/13 19:47:04 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040), 0xc) 2018/04/13 19:47:04 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x4}, 0x2f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f0000000300)=""/4096}, 0x18) 2018/04/13 19:47:04 executing program 1: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x4022000001) 2018/04/13 19:47:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000001cffb)='.\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x21}, 0x20}, 0x1}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x20000000802) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000041f74)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000e50)=[{}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @queue={0x0, {0x0, 0x2a}}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x90) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x52}) 2018/04/13 19:47:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xffffffff00000001, 0x8, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0), 0x2}, 0x20) 2018/04/13 19:47:04 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xffffffff00000001, 0x8, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)}, 0x20) 2018/04/13 19:47:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) umount2(&(0x7f00000000c0)='./file0/bus\x00', 0x0) syzkaller login: [ 45.516640] ip (3821) used greatest stack depth: 54408 bytes left [ 46.342188] ip (3902) used greatest stack depth: 54200 bytes left [ 46.640518] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.647085] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.690111] device bridge_slave_0 entered promiscuous mode [ 46.723299] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.729883] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.753234] device bridge_slave_0 entered promiscuous mode [ 46.813342] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.819952] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.848238] device bridge_slave_0 entered promiscuous mode [ 46.871581] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.878160] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.897119] device bridge_slave_0 entered promiscuous mode [ 46.918748] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.925349] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.941181] device bridge_slave_1 entered promiscuous mode [ 46.955589] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.962114] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.985783] device bridge_slave_0 entered promiscuous mode [ 47.003753] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.010265] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.038180] device bridge_slave_0 entered promiscuous mode [ 47.057663] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.064182] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.078346] device bridge_slave_0 entered promiscuous mode [ 47.086340] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.092832] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.101242] device bridge_slave_1 entered promiscuous mode [ 47.111565] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.118142] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.143839] device bridge_slave_1 entered promiscuous mode [ 47.153401] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.159884] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.167907] device bridge_slave_0 entered promiscuous mode [ 47.181796] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.188314] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.217103] device bridge_slave_1 entered promiscuous mode [ 47.229771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.241201] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.247676] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.270396] device bridge_slave_1 entered promiscuous mode [ 47.279809] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.286266] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.315917] device bridge_slave_1 entered promiscuous mode [ 47.322718] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.329274] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.352977] device bridge_slave_1 entered promiscuous mode [ 47.372299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.384802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.394982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.402677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.410186] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.416636] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.461590] device bridge_slave_1 entered promiscuous mode [ 47.471177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.485593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.570139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.606665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.616185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.631949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.651861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.674830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.708120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.794265] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.903926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.386969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.615180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.624112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.631678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.647929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.658799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.727705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.805791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.818943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.838157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.873965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.881515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.895070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.918113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.007189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.065952] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.137565] ip (4104) used greatest stack depth: 53656 bytes left [ 49.618463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.841666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.868880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.876147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.883721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.898958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.964109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.015968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.077818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.086120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.101357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.120424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.131426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.145889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.163795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.171402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.198870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.223929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.285472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.296250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.315020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.356490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.366344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.375071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.400821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.408561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.416164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.423361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.440666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.462163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.481426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.504708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.518354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.542832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.555417] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.565255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.573343] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.586368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.596385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.610673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.629077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.651662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.666766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.675994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.683995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.691216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.700399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.710812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.718982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.731882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.749233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.766210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.789700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.797829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.805509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.821521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.872850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.892744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.918794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.943875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.951936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.962344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.969597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.978007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.883621] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.890143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.897180] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.903645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.965988] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.972560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.010723] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.017237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.024168] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.030634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.099061] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.105919] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.112474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.120680] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.127196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.138016] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.153778] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.160268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.167202] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.173763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.213850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.227109] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.233605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.240491] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.246980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.264291] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.276152] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.282656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.289660] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.296164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.308639] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.315829] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.322305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.329212] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.335673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.357990] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.380580] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.387123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.394016] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.400538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.479622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.984450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.999935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.030726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.061745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.095308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.110760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.118174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.350954] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.404206] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.458016] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.498916] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.616445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.653544] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.733301] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.886841] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.165291] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.171682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.185147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.216836] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.223224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.240667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.271720] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.284613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.298606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.324612] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.330860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.359757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.416519] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.423450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.452688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.520528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.526793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.537882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.633008] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.639352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.650752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.882957] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.889553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.898215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 19:47:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0xffffffff00000001, 0xb, 0x4, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)}, 0x20) 2018/04/13 19:47:31 executing program 1: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x4022000001) 2018/04/13 19:47:31 executing program 4: msgrcv(0x0, &(0x7f0000000140)={0x0, ""/79}, 0x57, 0x0, 0x0) 2018/04/13 19:47:31 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='loginuid\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8) 2018/04/13 19:47:31 executing program 0: msgrcv(0x0, &(0x7f0000000140)={0x0, ""/79}, 0x57, 0x1, 0xa4a3ad41a879dde0) 2018/04/13 19:47:31 executing program 1: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x4022000001) 2018/04/13 19:47:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000001cffb)='.\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x21}, 0x20}, 0x1}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x20000000802) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000041f74)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000e50)=[{}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @queue={0x0, {0x0, 0x2a}}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x90) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x52}) 2018/04/13 19:47:31 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000004, 0x6c073, 0xffffffffffffffff, 0x0) 2018/04/13 19:47:31 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000040), 0xc) 2018/04/13 19:47:31 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) umount2(&(0x7f00000000c0)='./file0/bus\x00', 0x0) 2018/04/13 19:47:31 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) close(r0) 2018/04/13 19:47:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xffffffff00000001, 0x8, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0), 0x2}, 0x20) 2018/04/13 19:47:31 executing program 6: 2018/04/13 19:47:31 executing program 1: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x4022000001) 2018/04/13 19:47:31 executing program 0: 2018/04/13 19:47:31 executing program 7: 2018/04/13 19:47:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x4}, 0x2f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)}, 0x20) 2018/04/13 19:47:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='loginuid\x00') write$cgroup_int(r0, &(0x7f0000000040)={[0x31]}, 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8) 2018/04/13 19:47:32 executing program 2: 2018/04/13 19:47:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f00000000c0)='./file0/.us\x00', 0x0) 2018/04/13 19:47:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) 2018/04/13 19:47:32 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x20004021fffffd) 2018/04/13 19:47:32 executing program 1: 2018/04/13 19:47:32 executing program 3: 2018/04/13 19:47:32 executing program 5: 2018/04/13 19:47:32 executing program 4: 2018/04/13 19:47:32 executing program 2: 2018/04/13 19:47:32 executing program 1: 2018/04/13 19:47:32 executing program 4: 2018/04/13 19:47:32 executing program 5: 2018/04/13 19:47:32 executing program 3: 2018/04/13 19:47:32 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x20004021fffffd) 2018/04/13 19:47:32 executing program 0: 2018/04/13 19:47:32 executing program 6: 2018/04/13 19:47:32 executing program 1: 2018/04/13 19:47:32 executing program 4: 2018/04/13 19:47:32 executing program 2: 2018/04/13 19:47:32 executing program 0: 2018/04/13 19:47:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x40087602, &(0x7f00000011c0)) 2018/04/13 19:47:32 executing program 6: 2018/04/13 19:47:32 executing program 1: 2018/04/13 19:47:33 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x20004021fffffd) 2018/04/13 19:47:33 executing program 3: 2018/04/13 19:47:33 executing program 4: 2018/04/13 19:47:33 executing program 2: 2018/04/13 19:47:33 executing program 6: 2018/04/13 19:47:33 executing program 0: 2018/04/13 19:47:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000622ffc)=0x3) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/196, 0xc4}], 0x1) 2018/04/13 19:47:34 executing program 1: 2018/04/13 19:47:34 executing program 3: 2018/04/13 19:47:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 19:47:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000e6f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/13 19:47:34 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x20004021fffffd) 2018/04/13 19:47:34 executing program 5: r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x0, 0x0, &(0x7f0000001000), 0xc5) 2018/04/13 19:47:34 executing program 6: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000040)='./file0\x00') link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') dup2(r0, r1) 2018/04/13 19:47:34 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) fchmod(r3, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') dup2(r1, r2) 2018/04/13 19:47:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x9) r1 = fcntl$dupfd(r0, 0x0, r0) bind$ax25(r1, &(0x7f0000000040)={0x3, {"4fb26a74bf06aa"}}, 0x10) 2018/04/13 19:47:34 executing program 7: futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x20004021fffffd) 2018/04/13 19:47:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x80000000002, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x18, &(0x7f00000000c0)={@loopback}, &(0x7f0000000080)=0x15c) 2018/04/13 19:47:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8) 2018/04/13 19:47:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000380)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000140)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 19:47:34 executing program 3: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x4c}}) 2018/04/13 19:47:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x541d, &(0x7f0000000000)) 2018/04/13 19:47:35 executing program 3: unshare(0x60000000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000540)="4da1", 0x2, 0x0, &(0x7f00000002c0)={0x2}, 0x10) 2018/04/13 19:47:35 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0xb, &(0x7f0000d79000), 0x4) 2018/04/13 19:47:35 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x0) 2018/04/13 19:47:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)) 2018/04/13 19:47:35 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000080)=""/123) 2018/04/13 19:47:35 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2", 0x19}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000b7aff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/13 19:47:35 executing program 0: clock_gettime(0x0, &(0x7f0000728000)={0x0}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x0, &(0x7f0000599ff0)={{0x0, r1/1000+30000}, {r0}}, &(0x7f000002afe0)) alarm(0x0) 2018/04/13 19:47:35 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x0) 2018/04/13 19:47:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400021001000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f0000000080)="2e2f66696c65302f66696c6530fe", 0x0) link(&(0x7f0000000300)="2e2f66696c65302f66696c6530fe00", &(0x7f00000003c0)="2e2f66696c65302f66696c6530fe00") 2018/04/13 19:47:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000223ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x227e, &(0x7f00004a2000)) 2018/04/13 19:47:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f000081c000)='net/softnet_stat\x00') preadv(r0, &(0x7f00009bff60)=[{&(0x7f0000000000)=""/72, 0x48}, {&(0x7f0000520000)=""/109, 0x397}, {&(0x7f00000a3f7d)=""/131, 0x83}, {&(0x7f0000a28000)=""/122, 0x7a}], 0x4, 0x0) 2018/04/13 19:47:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4, 0x10, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x13]}, 0x2c) 2018/04/13 19:47:35 executing program 6: r0 = socket(0x1e, 0x2000000000000005, 0x0) setsockopt$sock_int(r0, 0x1, 0x1a, &(0x7f0000000000), 0x4) 2018/04/13 19:47:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, 0x0, 0x2, [{{0x2, 0x0, @broadcast=0xffffffff}}, {{0x2}}]}, 0x190) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x108) 2018/04/13 19:47:35 executing program 3: unshare(0x60000000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000540)="4da1", 0x2, 0x0, &(0x7f00000002c0)={0x2}, 0x10) 2018/04/13 19:47:36 executing program 4: 2018/04/13 19:47:36 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwrite64(r0, &(0x7f0000000300)="b388ed", 0x3, 0x1ffffe) sendfile(r0, r0, 0x0, 0x7ffffffc) 2018/04/13 19:47:36 executing program 6: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) clock_gettime(0x0, &(0x7f000000df80)={0x0, 0x0}) recvmmsg(r1, &(0x7f000000f000)=[{{&(0x7f000000a600)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f000000a6c0)=[{&(0x7f000000a680)=""/10, 0xa}], 0x1, &(0x7f000000a700)=""/90, 0x5a}}, {{&(0x7f000000da00)=@sco, 0x80, &(0x7f000000de40)=[{&(0x7f000000dd80)=""/160, 0xa0}], 0x1, &(0x7f000000dec0)=""/159, 0x9f}}], 0x2, 0x10141, &(0x7f000000f240)={0x0, r2+30000000}) 2018/04/13 19:47:36 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 2018/04/13 19:47:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x14, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0xb, 0x100000000000000}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:47:36 executing program 7: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x0) 2018/04/13 19:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x80081272, &(0x7f0000000000)) 2018/04/13 19:47:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/92, &(0x7f0000000080)=0x5c) 2018/04/13 19:47:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/13 19:47:36 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)) 2018/04/13 19:47:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000002f00000027000000000022009500000000000000"], &(0x7f0000000000)="f4206cd55d3174fccd51d063ca3dda5cbf5a01cc7ea92c43b604ffc53727d2d60f55ddeb757cf36a8457125ab48bcbcce4011a423df186cc8d8e6e9a66b1a0a6035a2fc0578cf5aad8b3a24a9c646a37eb26c6212ffc9658f152194b880765d169d550beb059984a10c2", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, r1, 0x5}, 0x10) 2018/04/13 19:47:36 executing program 2: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {}, 0x2617}, 0xa) 2018/04/13 19:47:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x40086610, &(0x7f00000011c0)=ANY=[@ANYBLOB='\x00\x00\b']) 2018/04/13 19:47:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x177a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) dup3(r0, r1, 0x0) 2018/04/13 19:47:36 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000320ff8)='/dev/sg#\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x2276, 0x7fffffffefff) 2018/04/13 19:47:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2003e3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7af1) lseek(r0, 0x0, 0x4) 2018/04/13 19:47:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x40086610, &(0x7f00000011c0)=ANY=[@ANYBLOB='\x00\x00\b']) 2018/04/13 19:47:37 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000020000)={0xaa}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000004fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000022000)={{&(0x7f0000007000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000005000/0x2000)=nil, 0x2000}, 0x1}) 2018/04/13 19:47:37 executing program 2: socketpair$inet_smc(0x2b, 0x1, 0x4, &(0x7f00000000c0)) 2018/04/13 19:47:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000102fffffd3b54c007110000f30501000b000500000010d10b00cf", 0x1f) 2018/04/13 19:47:37 executing program 0: r0 = socket$kcm(0x2, 0x4000000005, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='A', 0x1}], 0x1, &(0x7f0000000400)=[{0x10}], 0x10}, 0x0) 2018/04/13 19:47:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xfffffffffffffffb, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, "d6fd1a54e0a25ff2761081dbec1e4d7d607d05c7aaa2ae243875c00e1471388c"}) 2018/04/13 19:47:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:37 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 19:47:37 executing program 6: mkdir(&(0x7f00007b4ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000268000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, &(0x7f0000bd9fff)) mount(&(0x7f0000771000)='./file0\x00', &(0x7f0000976000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000613000)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x4fffc, &(0x7f0000000280)) [ 75.596541] netlink: 'syz-executor3': attribute type 5 has an invalid length. [ 75.638205] netlink: 'syz-executor3': attribute type 5 has an invalid length. 2018/04/13 19:47:37 executing program 4: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000002000)="0d08008c8a830200000000000000135e", 0xfd896c24) r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x3a) 2018/04/13 19:47:37 executing program 6: r0 = memfd_create(&(0x7f0000000100)='cpusetsystem\x00', 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000180)={0x0, 0x200000001}) 2018/04/13 19:47:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x420d, r1, 0x800000, &(0x7f0000000000)={&(0x7f00000033c0)=""/4096, 0xfffffffffffffd2c}) 2018/04/13 19:47:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/74) 2018/04/13 19:47:37 executing program 7: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getpeername(r0, &(0x7f0000000040)=@pppoe, &(0x7f0000000080)=0x1e) 2018/04/13 19:47:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="10000000000001000c0005000003008b23efb77f200000005a4d", 0x1a, 0x400}], 0x0, 0x0) 2018/04/13 19:47:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000102fffffd3b54c007110000f30501000b000500000010d10b00cf", 0x1f) 2018/04/13 19:47:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) [ 76.047390] netlink: 'syz-executor3': attribute type 5 has an invalid length. 2018/04/13 19:47:38 executing program 6: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffeb) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) dup3(r0, r1, 0x0) 2018/04/13 19:47:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:38 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x12}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/13 19:47:38 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) read(r0, &(0x7f00000001c0)=""/4096, 0x1000) 2018/04/13 19:47:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/74) 2018/04/13 19:47:38 executing program 3: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000200)) r0 = socket$inet(0x10, 0x3, 0x9) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f000001e000)=[{&(0x7f0000000000)="24000000000b07031dff1f946fa2830020200a00090001004003ffffffeca3a20400ff7e", 0x24}], 0x1}, 0x0) 2018/04/13 19:47:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00005ed000)='maps\x00') r1 = syz_open_procfs(0x0, &(0x7f0000426000)="636f6d6d0007008dc600000000007100006c03ad635018290105000000caab6161f7") sendfile(r1, r0, &(0x7f0000b4b000), 0x7ffff000) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/125, 0x7d}], 0x1) [ 76.317402] capability: warning: `syz-executor6' uses 32-bit capabilities (legacy support in use) 2018/04/13 19:47:38 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) read(r0, &(0x7f00000001c0)=""/4096, 0x1000) 2018/04/13 19:47:38 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000040)=@ethtool_coalesce={0xf}}) 2018/04/13 19:47:38 executing program 7: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x20000003) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x4, 0xfffffffffffffffd, 0x0, 0xa4}) 2018/04/13 19:47:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001600)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, 0x7fff}, 0x98) 2018/04/13 19:47:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000002780)="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", 0x290}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 19:47:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x19, &(0x7f0000000180)={@loopback={0x0, 0x1}}, 0x20) 2018/04/13 19:47:38 executing program 0: r0 = epoll_create1(0x0) close(r0) r1 = memfd_create(&(0x7f0000002000)="6d696d655f747970655e5c76626f780565743028255b73656375726974796370757365742d262727a0255b7070703000", 0x2) fcntl$addseals(r0, 0x409, 0x2) write$vnet(r1, &(0x7f0000000f98)={0x1, {&(0x7f0000002f8b)=""/117, 0x75, &(0x7f0000002000)=""/234}}, 0x68) ftruncate(r0, 0x0) 2018/04/13 19:47:38 executing program 5: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000140), &(0x7f0000c2fffc), 0x401ffffffe) 2018/04/13 19:47:38 executing program 6: r0 = socket(0x1f, 0x80003, 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d2, &(0x7f0000000000)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "7990a4de6087540a9607bc4824a6c092446d824b0e8aa2ccdc87f3087cabb58d0067d56aadcb07474e69b06c2ecf7d502abd7ee719f192401d2aa97594e5da4e65d80c87154ac67ae41db63fac2976ef8fb4654b85c9d4f767bd2e8f8d9717e3086b20aac067a8d49cc86d12ece53d1745653efa6d3fd57f8d057702f475fc93"}) 2018/04/13 19:47:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:38 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 2018/04/13 19:47:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={'nouuid,', {[{@logbufs={'logbufs', 0x3d, [0x31]}, 0x2c}]}}) 2018/04/13 19:47:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000002780)="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", 0x290}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 19:47:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000000140)={[{@fmask={'fmask', 0x3d, [0x34]}, 0x2c}]}) 2018/04/13 19:47:39 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x6, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0xc) 2018/04/13 19:47:39 executing program 7: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f0000002440)={'nouuid,', {[{@allocsize={'allocsize', 0x3d, [0x36]}, 0x2c}]}}) 2018/04/13 19:47:39 executing program 3: r0 = socket$netlink(0xa, 0x5, 0x0) r1 = dup2(r0, r0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000100)=0x24) 2018/04/13 19:47:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:39 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000ffc)=0xfffffffffffffffe, 0x4) r0 = gettid() r1 = perf_event_open(&(0x7f0000940000)={0x7, 0x78, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_getsetattr(r1, &(0x7f0000000000)={0x5982a8af, 0x3, 0x7fff, 0x7fffffff, 0x1, 0xff, 0x3, 0x3}, &(0x7f0000009000)) r2 = creat(&(0x7f0000b89ff8)='./file0\x00', 0x80) r3 = socket(0x8000000200010, 0x8000a, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xfff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x3f}, &(0x7f0000000100)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f000036f000)=0xfff) r5 = mq_open(&(0x7f0000000ffb)='eth0\x00', 0x42, 0xfffffffffffffffc, &(0x7f0000213000)={0x0, 0x4, 0x4, 0x9, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x3}) fchmod(r1, 0xfffeffffff7ffffa) mq_notify(r5, &(0x7f00006cbfb0)={0x0, 0x1c, 0x8000000000000}) open_by_handle_at(r3, &(0x7f0000fa7000)={0xd0, 0x8, "fb535eaee6c85c3341974edccd722a5f355e30fe661bd4df71dee17e2258b178a4411aee12242c53ab83c8b72b6cc02406b641a60e1e0bb80594f23e68a0e6d3d9dd0c2390d0921c2c6a656d6674e7fa20b9bcc320e1ca915f058d40d55e6739b4bd7a3b1104b805d8f6b36841ea0213cf47f8a4da28937564ec84d86b9922764e045220674a06fe1eb5aabd44e4ec9ce613f105ce9e68b2e8d09dc14ba80994b48a34cba5d3683148cc2cb3523b5750fc4ecf9ee259ffa7b7166c3a78470bbeb71948d0286ad4da"}, 0x40) poll(&(0x7f0000ae2ff0)=[{0xffffffffffffffff, 0x5000}, {r5, 0x220}], 0x2, 0x1000) ftruncate(r5, 0x8000) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000d59fe8)={0x80000001, 0x9, 0x8, 0x3, 0xb, 0x88cc}) sched_rr_get_interval(r0, &(0x7f00007d6ff0)) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000924ffc)=r0) ioprio_get$pid(0x2, r0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, r0, 0x3, &(0x7f0000b54ff0)={0x1, 0xfffffffffffffff7, 0x101, 0x200}) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x6) ioctl$sock_netrom_TIOCOUTQ(r2, 0x5411, &(0x7f00005c7000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000b87000)) clock_gettime(0x4, &(0x7f000028dff0)) mq_timedsend(r5, &(0x7f0000ba3ffe)="6c10", 0x2, 0x0, &(0x7f0000d9a000)={0x77359400}) 2018/04/13 19:47:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000002000)) fcntl$lock(r0, 0x7, &(0x7f000052b000)={0x2, 0x0, 0x0, 0x10000000001}) 2018/04/13 19:47:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000023000)={&(0x7f0000197000)={0x14, 0x0, 0x1, 0xfffbfffffffffffd}, 0x14}, 0x1}, 0x0) 2018/04/13 19:47:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:39 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getpeername$netrom(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 2018/04/13 19:47:39 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000480)={[{@resize={'resize', 0x3d, [0x7f]}, 0x2c}]}) 2018/04/13 19:47:39 executing program 4: r0 = socket$inet(0x2, 0x3, 0x17) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x29, &(0x7f00000037c0)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0x1bb) 2018/04/13 19:47:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010a000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5429, &(0x7f0000001000)) 2018/04/13 19:47:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:40 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) close(r0) 2018/04/13 19:47:40 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000200), 0x8, 0x0, &(0x7f0000000ff0)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) 2018/04/13 19:47:40 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl$EVIOCREVOKE(r0, 0x31e, &(0x7f0000000080)=0x8929) 2018/04/13 19:47:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x17) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x29, &(0x7f00000037c0)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0x1bb) 2018/04/13 19:47:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000001e80)={&(0x7f0000000100)=@proc={0x10}, 0xc, &(0x7f0000001880), 0x0, &(0x7f0000001d40)=[@rights={0x10, 0x1, 0x1}], 0x10}, 0x0) 2018/04/13 19:47:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:40 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000ffc)=0xfffffffffffffffe, 0x4) r0 = gettid() r1 = perf_event_open(&(0x7f0000940000)={0x7, 0x78, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_getsetattr(r1, &(0x7f0000000000)={0x5982a8af, 0x3, 0x7fff, 0x7fffffff, 0x1, 0xff, 0x3, 0x3}, &(0x7f0000009000)) r2 = creat(&(0x7f0000b89ff8)='./file0\x00', 0x80) r3 = socket(0x8000000200010, 0x8000a, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xfff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x3f}, &(0x7f0000000100)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f000036f000)=0xfff) r5 = mq_open(&(0x7f0000000ffb)='eth0\x00', 0x42, 0xfffffffffffffffc, &(0x7f0000213000)={0x0, 0x4, 0x4, 0x9, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x3}) fchmod(r1, 0xfffeffffff7ffffa) mq_notify(r5, &(0x7f00006cbfb0)={0x0, 0x1c, 0x8000000000000}) open_by_handle_at(r3, &(0x7f0000fa7000)={0xd0, 0x8, "fb535eaee6c85c3341974edccd722a5f355e30fe661bd4df71dee17e2258b178a4411aee12242c53ab83c8b72b6cc02406b641a60e1e0bb80594f23e68a0e6d3d9dd0c2390d0921c2c6a656d6674e7fa20b9bcc320e1ca915f058d40d55e6739b4bd7a3b1104b805d8f6b36841ea0213cf47f8a4da28937564ec84d86b9922764e045220674a06fe1eb5aabd44e4ec9ce613f105ce9e68b2e8d09dc14ba80994b48a34cba5d3683148cc2cb3523b5750fc4ecf9ee259ffa7b7166c3a78470bbeb71948d0286ad4da"}, 0x40) poll(&(0x7f0000ae2ff0)=[{0xffffffffffffffff, 0x5000}, {r5, 0x220}], 0x2, 0x1000) ftruncate(r5, 0x8000) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000d59fe8)={0x80000001, 0x9, 0x8, 0x3, 0xb, 0x88cc}) sched_rr_get_interval(r0, &(0x7f00007d6ff0)) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000924ffc)=r0) ioprio_get$pid(0x2, r0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, r0, 0x3, &(0x7f0000b54ff0)={0x1, 0xfffffffffffffff7, 0x101, 0x200}) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x6) ioctl$sock_netrom_TIOCOUTQ(r2, 0x5411, &(0x7f00005c7000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000b87000)) clock_gettime(0x4, &(0x7f000028dff0)) mq_timedsend(r5, &(0x7f0000ba3ffe)="6c10", 0x2, 0x0, &(0x7f0000d9a000)={0x77359400}) 2018/04/13 19:47:40 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:40 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) inotify_init() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/13 19:47:40 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cipher_null))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="46dea4", 0x3}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x5c, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/13 19:47:40 executing program 0: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setpipe(r0, 0x407, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) 2018/04/13 19:47:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000200), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/13 19:47:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x10000001, 0xb2, &(0x7f0000000200)=""/178}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1}, 0x10) 2018/04/13 19:47:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:40 executing program 3: syz_open_dev$usbmon(&(0x7f0000859000)='/dev/usbmon#\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f000000af4b), &(0x7f0000570fff)="16"}, 0x20) 2018/04/13 19:47:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 2018/04/13 19:47:40 executing program 3: r0 = socket$inet(0xa, 0x80005, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x13, 0x0, 0x0) 2018/04/13 19:47:40 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x40085112) 2018/04/13 19:47:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x20000000006}]}, 0x10) 2018/04/13 19:47:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:41 executing program 0: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setpipe(r0, 0x407, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) 2018/04/13 19:47:41 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x5, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x24, 0x25, 0x7a}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000020f88)="24000000100007031dfffd946fa2830020200a0009000300001d85687f0000000400ff7e28000000080a43ba16a0aa1ca10bb356da5d8060000000060000000029ec2400020cd37ed01cc073", 0x4c}], 0x1}, 0x0) 2018/04/13 19:47:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x27, 0xd, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:47:41 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000056ff8)='./file0\x00', 0x0) 2018/04/13 19:47:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x1, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./bus\x00') 2018/04/13 19:47:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x27, 0x331, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:47:41 executing program 3: r0 = socket$inet(0x2, 0x80005, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000001fbc)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4, {0x2, 0x0, @dev={0xac, 0x14}}}) 2018/04/13 19:47:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:41 executing program 6: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000), 0x0) 2018/04/13 19:47:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x10}, &(0x7f0000000100)) timer_delete(0x0) 2018/04/13 19:47:41 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000002440), &(0x7f0000002480)=""/117, 0x75, &(0x7f0000003540)={&(0x7f0000002500)={'digest_null\x00'}, &(0x7f0000002540)="6e22c7acb619e759f1709d3b4059352758f34a52d7d8d41cdb36f845f355e0d29ff5b90870976e05046d1fed8b94538ff50520bcb0dcafbbdbb62b840cac6b9504", 0x41}) 2018/04/13 19:47:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write(r0, &(0x7f0000000000), 0x0) 2018/04/13 19:47:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) 2018/04/13 19:47:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) sendfile(r1, r2, &(0x7f0000ccb000), 0x400) 2018/04/13 19:47:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) shutdown(r0, 0x1) read(r0, &(0x7f00000001c0)=""/252, 0xfc) recvfrom$inet(r0, &(0x7f0000000000)=""/149, 0x95, 0x40000001, 0x0, 0x0) 2018/04/13 19:47:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000002, 0x0) shutdown(r0, 0x0) shutdown(r0, 0x1) poll(&(0x7f0000457000)=[{r0}], 0x1, 0x0) 2018/04/13 19:47:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000100)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 19:47:42 executing program 6: r0 = socket$netlink(0xa, 0x5, 0x0) r1 = dup2(r0, r0) getsockopt$sock_buf(r1, 0x1, 0x30, &(0x7f0000000000)=""/68, &(0x7f0000000080)=0x44) 2018/04/13 19:47:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="cc1373fc000000000000000000000000000000000000000000000000000000003030b86e0d5f4090902c6457136cf04d000001", 0x33, 0x10000}], 0x0, &(0x7f0000016000)) 2018/04/13 19:47:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000299000)}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80002}, 0x8) [ 80.526362] ================================================================== [ 80.533795] BUG: KMSAN: uninit-value in sha512_generic_block_fn+0x237f/0x2b90 [ 80.541087] CPU: 1 PID: 6464 Comm: syz-executor0 Not tainted 4.16.0+ #83 [ 80.547927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.557287] Call Trace: [ 80.559889] dump_stack+0x185/0x1d0 [ 80.563532] ? sha512_generic_block_fn+0x237f/0x2b90 [ 80.568653] kmsan_report+0x142/0x240 [ 80.572465] __msan_warning_32+0x6c/0xb0 [ 80.576536] sha512_generic_block_fn+0x237f/0x2b90 [ 80.581495] ? __kernel_text_address+0x34/0xe0 [ 80.586097] ? hash_walk_new_entry+0x615/0x720 [ 80.590689] crypto_sha512_finup+0x571/0x610 [ 80.595114] ? sha512_generic_block_fn+0x2b90/0x2b90 [ 80.600224] shash_ahash_finup+0x468/0xa30 [ 80.604472] shash_ahash_digest+0x5c6/0x600 [ 80.608805] shash_async_digest+0x11c/0x1b0 [ 80.613142] crypto_ahash_op+0x89a/0xc10 [ 80.617218] ? __kmalloc+0x23c/0x350 [ 80.620963] ? shash_async_finup+0x1b0/0x1b0 [ 80.625379] ? shash_async_finup+0x1b0/0x1b0 [ 80.629798] crypto_ahash_digest+0xe4/0x160 [ 80.634141] hash_sendpage+0xb40/0xe10 [ 80.638045] ? hash_recvmsg+0xd50/0xd50 [ 80.642031] sock_sendpage+0x1de/0x2c0 [ 80.645934] pipe_to_sendpage+0x31b/0x430 [ 80.650085] ? sock_fasync+0x2b0/0x2b0 [ 80.653969] ? propagate_umount+0x3a30/0x3a30 [ 80.658452] __splice_from_pipe+0x49a/0xf30 [ 80.662764] ? generic_splice_sendpage+0x2a0/0x2a0 [ 80.667683] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 80.673039] generic_splice_sendpage+0x1c6/0x2a0 [ 80.677788] ? iter_file_splice_write+0x1710/0x1710 [ 80.682785] ? iter_file_splice_write+0x1710/0x1710 [ 80.687785] direct_splice_actor+0x19b/0x200 [ 80.692178] splice_direct_to_actor+0x764/0x1040 [ 80.696916] ? do_splice_direct+0x540/0x540 [ 80.701222] ? security_file_permission+0x28f/0x4b0 [ 80.706226] ? rw_verify_area+0x35e/0x580 [ 80.710632] do_splice_direct+0x335/0x540 [ 80.714765] do_sendfile+0x1067/0x1e40 [ 80.718645] SYSC_sendfile64+0x1b3/0x300 [ 80.722692] SyS_sendfile64+0x64/0x90 [ 80.726475] do_syscall_64+0x309/0x430 [ 80.730523] ? SYSC_sendfile+0x320/0x320 [ 80.734570] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.739749] RIP: 0033:0x455319 [ 80.742919] RSP: 002b:00007f108f51fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 80.750627] RAX: ffffffffffffffda RBX: 00007f108f5206d4 RCX: 0000000000455319 [ 80.757879] RDX: 0000000020ccb000 RSI: 0000000000000015 RDI: 0000000000000014 [ 80.765130] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 80.772557] R10: 0000000000000400 R11: 0000000000000246 R12: 00000000ffffffff [ 80.779809] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 80.787063] [ 80.788667] Uninit was created at: [ 80.792196] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 80.797277] kmsan_alloc_page+0x82/0xe0 [ 80.801233] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 80.805972] alloc_pages_vma+0xcc8/0x1800 [ 80.810101] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 80.815098] shmem_getpage_gfp+0x35db/0x5770 [ 80.819488] shmem_fallocate+0xde2/0x1610 [ 80.823616] vfs_fallocate+0x9dc/0xde0 [ 80.827484] SYSC_fallocate+0x119/0x1d0 [ 80.831440] SyS_fallocate+0x64/0x90 [ 80.835133] do_syscall_64+0x309/0x430 [ 80.839009] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.844179] ================================================================== [ 80.851516] Disabling lock debugging due to kernel taint [ 80.856947] Kernel panic - not syncing: panic_on_warn set ... [ 80.856947] [ 80.864300] CPU: 1 PID: 6464 Comm: syz-executor0 Tainted: G B 4.16.0+ #83 [ 80.872420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.881752] Call Trace: [ 80.884335] dump_stack+0x185/0x1d0 [ 80.887948] panic+0x39d/0x940 [ 80.891140] ? sha512_generic_block_fn+0x237f/0x2b90 [ 80.896223] kmsan_report+0x238/0x240 [ 80.900008] __msan_warning_32+0x6c/0xb0 [ 80.904063] sha512_generic_block_fn+0x237f/0x2b90 [ 80.908997] ? __kernel_text_address+0x34/0xe0 [ 80.913581] ? hash_walk_new_entry+0x615/0x720 [ 80.918150] crypto_sha512_finup+0x571/0x610 [ 80.922563] ? sha512_generic_block_fn+0x2b90/0x2b90 [ 80.927650] shash_ahash_finup+0x468/0xa30 [ 80.931877] shash_ahash_digest+0x5c6/0x600 [ 80.936188] shash_async_digest+0x11c/0x1b0 [ 80.940667] crypto_ahash_op+0x89a/0xc10 [ 80.944714] ? __kmalloc+0x23c/0x350 [ 80.948409] ? shash_async_finup+0x1b0/0x1b0 [ 80.952797] ? shash_async_finup+0x1b0/0x1b0 [ 80.957193] crypto_ahash_digest+0xe4/0x160 [ 80.961516] hash_sendpage+0xb40/0xe10 [ 80.965386] ? hash_recvmsg+0xd50/0xd50 [ 80.969349] sock_sendpage+0x1de/0x2c0 [ 80.973227] pipe_to_sendpage+0x31b/0x430 [ 80.977537] ? sock_fasync+0x2b0/0x2b0 [ 80.981421] ? propagate_umount+0x3a30/0x3a30 [ 80.985901] __splice_from_pipe+0x49a/0xf30 [ 80.990213] ? generic_splice_sendpage+0x2a0/0x2a0 [ 80.995131] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 81.000482] generic_splice_sendpage+0x1c6/0x2a0 [ 81.005225] ? iter_file_splice_write+0x1710/0x1710 [ 81.010224] ? iter_file_splice_write+0x1710/0x1710 [ 81.015223] direct_splice_actor+0x19b/0x200 [ 81.019639] splice_direct_to_actor+0x764/0x1040 [ 81.024378] ? do_splice_direct+0x540/0x540 [ 81.028701] ? security_file_permission+0x28f/0x4b0 [ 81.033704] ? rw_verify_area+0x35e/0x580 [ 81.037842] do_splice_direct+0x335/0x540 [ 81.041975] do_sendfile+0x1067/0x1e40 [ 81.045858] SYSC_sendfile64+0x1b3/0x300 [ 81.049907] SyS_sendfile64+0x64/0x90 [ 81.053699] do_syscall_64+0x309/0x430 [ 81.057572] ? SYSC_sendfile+0x320/0x320 [ 81.061621] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 81.066791] RIP: 0033:0x455319 [ 81.069960] RSP: 002b:00007f108f51fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 81.077650] RAX: ffffffffffffffda RBX: 00007f108f5206d4 RCX: 0000000000455319 [ 81.084899] RDX: 0000000020ccb000 RSI: 0000000000000015 RDI: 0000000000000014 [ 81.092151] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 81.099400] R10: 0000000000000400 R11: 0000000000000246 R12: 00000000ffffffff [ 81.106826] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 81.114600] Dumping ftrace buffer: [ 81.118124] (ftrace buffer empty) [ 81.121812] Kernel Offset: disabled [ 81.125416] Rebooting in 86400 seconds..