INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.5' (ECDSA) to the list of known hosts. 2018/04/13 19:45:49 fuzzer started 2018/04/13 19:45:49 dialing manager at 10.128.0.26:33379 2018/04/13 19:45:55 kcov=true, comps=false 2018/04/13 19:45:58 executing program 0: r0 = socket$nl_generic(0x11, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x107, 0x7, &(0x7f0000000000), 0x4) 2018/04/13 19:45:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000005380)='net/ip_vs_stats_percpu\x00') perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000c43f70)=[{&(0x7f0000ea5000)=""/4096, 0x1000}], 0x1) 2018/04/13 19:45:58 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6f, &(0x7f0000564000), &(0x7f0000991000)=0x8) 2018/04/13 19:45:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x2279, &(0x7f0000000000)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2}}) 2018/04/13 19:45:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000380)=0x4) close(0xffffffffffffffff) 2018/04/13 19:45:58 executing program 5: r0 = socket$inet(0x2, 0x803, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x0, &(0x7f0000000900), &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x3, 0x0, 0x0, 'gre0\x00', 'bcsf0\x00', 'ip6tnl0\x00', 'bcsf0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0x108, 0x138}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x3, 0x0, 0x0, 'bcsh0\x00', 'ip6gre0\x00', 'gretap0\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @random="ee067bca9f8d", [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"364c0eb3bb262ad19cd13b05ba6ef2182ea1e01a5d5910d480e2dc4b87cd"}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2f8) 2018/04/13 19:45:58 executing program 6: clone(0x4000000000200, &(0x7f00000006c0), &(0x7f0000c53000), &(0x7f0000f8b000), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f0000000040)) open(&(0x7f0000000000)='./file0\x00', 0x44800, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 2018/04/13 19:45:58 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe7fe, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000300)='./file0/fil.0\x00', 0x800000000002040, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0/file0/file0\x00') syzkaller login: [ 42.373511] ip (3808) used greatest stack depth: 54672 bytes left [ 43.171538] ip (3888) used greatest stack depth: 53960 bytes left [ 43.486658] ip (3915) used greatest stack depth: 53656 bytes left [ 43.562061] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.568554] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.620985] device bridge_slave_0 entered promiscuous mode [ 43.824710] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.831266] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.869988] device bridge_slave_0 entered promiscuous mode [ 43.889449] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.895960] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.903566] device bridge_slave_1 entered promiscuous mode [ 43.913575] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.920096] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.937374] device bridge_slave_0 entered promiscuous mode [ 43.966210] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.972661] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.010540] device bridge_slave_0 entered promiscuous mode [ 44.029186] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.035686] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.047576] device bridge_slave_0 entered promiscuous mode [ 44.068100] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.074580] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.092559] device bridge_slave_0 entered promiscuous mode [ 44.103130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.114944] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.121415] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.148494] device bridge_slave_1 entered promiscuous mode [ 44.157225] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.163686] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.184573] device bridge_slave_0 entered promiscuous mode [ 44.202357] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.208878] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.227207] device bridge_slave_1 entered promiscuous mode [ 44.246767] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.253296] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.272978] device bridge_slave_1 entered promiscuous mode [ 44.288803] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.295331] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.306919] device bridge_slave_0 entered promiscuous mode [ 44.316951] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.323432] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.347942] device bridge_slave_1 entered promiscuous mode [ 44.357682] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.364161] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.375280] device bridge_slave_1 entered promiscuous mode [ 44.384551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.394514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.402267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.411442] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.417917] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.460606] device bridge_slave_1 entered promiscuous mode [ 44.467609] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.474135] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.506800] device bridge_slave_1 entered promiscuous mode [ 44.539674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.549899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.577617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.585450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.594972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.707289] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.728985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.743103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.756894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.812705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.883980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.915589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.360099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.494158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.548822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.652808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.712176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.723018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.781331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.830650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.860288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.912210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.923091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.939912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.009156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.045111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.129515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.143940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.463100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.687586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.792744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.875012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.908646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.915872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.928376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.959163] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.984888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.001073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.017755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.111967] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.135298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.145286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.160768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.187333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.198555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.209422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.227999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.236864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.266176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.273394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.293574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.334299] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.341505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.353790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.381260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.444931] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.452433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.464159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.491351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.499618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.506805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.524851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.551850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.561852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.578774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.604455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.611665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.629778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.660831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.671554] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.679992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.707821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.723606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.738777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.750076] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.759426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.768768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.793705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.803596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.813883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.833530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.844170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.857967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.882008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.891749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.911708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.940117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.951923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.970191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.998887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.008549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.022862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.576555] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.583113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.589983] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.596457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.639478] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.654589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.026364] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.032883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.039777] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.046265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.065314] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.086769] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.093273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.100191] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.106659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.173645] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.186598] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.193149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.200006] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.206505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.230617] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.241163] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.247605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.254412] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.260827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.294447] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.309406] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.315895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.322723] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.329187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.366241] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.373368] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.379847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.386701] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.393179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.420815] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.446233] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.452695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.459552] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.466020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.559018] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.655837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.673684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.711696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.753973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.782698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.790093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.797737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.933816] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.500912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.518634] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.608813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.643227] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.700239] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.724234] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.768299] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.774571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.787918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.874443] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.270709] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.277011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.291655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.348600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.354855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.366731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.395439] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.401667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.409612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.451016] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.457655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.491924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.530967] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.539547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.550389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.570428] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.608195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.616151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.743870] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.750521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.764640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 19:46:24 executing program 2: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) syz_emit_ethernet(0x7ffff, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x0, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) 2018/04/13 19:46:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) close(r0) 2018/04/13 19:46:25 executing program 4: ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f00000001c0)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000440)=[{&(0x7f00000003c0), 0xfffffcec}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000480)}], 0x1, 0x0) 2018/04/13 19:46:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) 2018/04/13 19:46:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x20, 0x20, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0xc, 0x0, @fd}]}, 0x20}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x26, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/226, 0xe2}, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) 2018/04/13 19:46:25 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xa0007, &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000340)) 2018/04/13 19:46:26 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5d00fe01b2a4a280930a060a0000a8430891000000390009000a000c00060000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 2018/04/13 19:46:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom(r3, &(0x7f0000000200)=""/165, 0xa5, 0x0, &(0x7f00000002c0)=@un=@file={0x0, './file0\x00'}, 0x80) dup2(r0, r1) 2018/04/13 19:46:26 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xa0007, &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000340)) 2018/04/13 19:46:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x20, 0x20, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0xc, 0x0, @fd}]}, 0x20}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x26, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/226, 0xe2}, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) 2018/04/13 19:46:26 executing program 2: rmdir(&(0x7f0000000280)='//file0\x00') mkdir(&(0x7f0000000040)='//file0\x00', 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000140)=0x7fffffff, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={0x0, 0xc9, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x0, 0x0, 0x0, 0x20}}, &(0x7f0000000240)=0xb0) 2018/04/13 19:46:26 executing program 5: mlockall(0x3) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/13 19:46:26 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f000001bc78)=@raw={"05000000020002000000000000000000180000000303efffffff00", 0x9, 0x3, 0xffffffffffffff22, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f000002cfd0), {[{{@uncond, 0x0, 0xa8, 0x52}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x4, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x2e) 2018/04/13 19:46:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='tracefs\x00', 0x0, &(0x7f0000000600)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0xffffffa0}], 0x1, 0x0) 2018/04/13 19:46:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@codepage={'codepage', 0x3d, '866'}, 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000080)="2e2f66696c65302f2f696c6530f0", 0x0) 2018/04/13 19:46:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)={[{@quota_quantum={'quota_quantum', 0x3d, [0x2d, 0x0]}, 0x2c}]}) 2018/04/13 19:46:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f7, &(0x7f0000000100)={'ip6_vti0\x00', @ifru_names='ip6gre0\x00'}) 2018/04/13 19:46:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f00000016c0)={[{@overriderock='overriderockperm', 0x2c}, {@map_off='map=off', 0x2c}]}) 2018/04/13 19:46:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='tracefs\x00', 0x0, &(0x7f0000000600)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0xffffffa0}], 0x1, 0x0) 2018/04/13 19:46:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f0000830000)=""/4096, 0x1000}], 0x1, 0x2000) 2018/04/13 19:46:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f00007e6000), 0x4) 2018/04/13 19:46:27 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f000049e000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000db7000), &(0x7f0000a59000)=0x3) 2018/04/13 19:46:27 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"d202b999cf85000000000088f301e710"}) 2018/04/13 19:46:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000200)=""/187, &(0x7f0000000080)=0xbb) 2018/04/13 19:46:27 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000280)={0x1, {&(0x7f0000000080)=""/229, 0xe5, &(0x7f0000000180)=""/247}}, 0x68) 2018/04/13 19:46:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x0, 0x9, &(0x7f0000000040)="da8291b2093a88b2ef"}) 2018/04/13 19:46:27 executing program 0: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x200000000114, 0x0, &(0x7f0000001000)=""/4, &(0x7f0000000000)=0x4) 2018/04/13 19:46:27 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) exit(0x0) rt_sigsuspend(&(0x7f00000000c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)="7461736b7300a4e2895f70fb9c65372f91de08cde1b7ad489a4cc7004b448c27073d774459994bb7f0e358df33ed3e5a89259cc95e6a75b5bf2172b4b3015b47fba72ac5c7d62dac3ffdbc76b10119071d73b8e25917c5b04d670a8237639b6ada2330eb", 0x2, 0x0) pread64(r1, &(0x7f0000000100)=""/225, 0xe1, 0x9) 2018/04/13 19:46:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000d93ff1)='statm\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x0) 2018/04/13 19:46:28 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000b28000)={0x1, {&(0x7f00005bc000)=""/207, 0xffffffd1, &(0x7f000072bfce)=""/50, 0x0, 0x2}}, 0x68) write$vnet(r0, &(0x7f0000a8d000)={0x1, {&(0x7f0000c91000)=""/24, 0x1e9, &(0x7f0000b4cf9b)=""/101, 0x0, 0x2}}, 0x68) write$vnet(r0, &(0x7f000046df98)={0x1, {&(0x7f0000c7f000)=""/28, 0x1, &(0x7f0000e9afb7)=""/73, 0x0, 0x3}}, 0x68) 2018/04/13 19:46:28 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f00007a9000)=""/1, 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) close(r0) 2018/04/13 19:46:28 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x3}, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 2018/04/13 19:46:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd0, &(0x7f0000000200)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x4) 2018/04/13 19:46:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000eccfa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a), 0x0) mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x0, 0x10000032, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 19:46:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x7ff) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) 2018/04/13 19:46:28 executing program 6: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/13 19:46:28 executing program 4: r0 = socket(0x1f, 0x2000000000000005, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x6, 0x4, &(0x7f00000000c0), 0xfffffffffffffd16) 2018/04/13 19:46:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r2) keyctl$update(0x2, r4, &(0x7f0000000480)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crc32c-generic\x00'}}) [ 69.512108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 19:46:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@loopback={0x0, 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/13 19:46:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="00010000000000000000000007020000ec00000001000002000000000000000000200000002000000001000000000000dcd6e4a861d516b353ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}, 0x2c}]}) 2018/04/13 19:46:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x6, 0x1e, &(0x7f0000000000)={{{@in, @in6=@local={0xfe, 0x80, [], 0xaa}}}, {{@in=@dev={0xac, 0x14, 0x14}}, 0x0, @in=@broadcast=0xffffffff}}, 0xe8) 2018/04/13 19:46:28 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x1d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 2018/04/13 19:46:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x20, 0x1, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:46:28 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="0f519e34865c", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0xffffff88, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, [], "f601929f106531aa"}}}}}}}, 0x0) 2018/04/13 19:46:28 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/13 19:46:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) 2018/04/13 19:46:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0xc09, 0x0, 0x0, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 19:46:29 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r1, 0x801, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 2018/04/13 19:46:29 executing program 4: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001440)=@broute={'broute\x00', 0x20, 0x2, 0x2a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001180], 0x0, &(0x7f00000000c0), &(0x7f0000001180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'ipddp0\x00', 'vcan0\x00', 'ip_vti0\x00', 'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xf0, 0x140}, [@common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffc}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x5d}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {{{0x5, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'ifb0\x00', 'dummy0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xa0, 0xd8}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x320) 2018/04/13 19:46:29 executing program 2: unshare(0x20000400) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000200)}}) 2018/04/13 19:46:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) getpeername$netrom(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10) 2018/04/13 19:46:29 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/04/13 19:46:29 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) write(r0, &(0x7f00007b3f7e)='q', 0x1) close(r0) 2018/04/13 19:46:29 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x3c1, 0x2, 0x300, [0x20000680], 0x0, &(0x7f0000000340), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'bond_slave\x00', 'syz_tun\x00', 'ipddp0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x120, 0x120, 0x158, [@connbytes={'connbytes\x00', 0x18, {{0x0, 0x0, 0x0, 0x3}}}, @stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x0, 0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}, {{{0xb, 0x0, 0x0, 'ip_vti0\x00', 'bpq0\x00', 'ip6gre0\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @random="7b8b72d3b511", [], 0xe8, 0xe8, 0x118, [@ip6={'ip6\x00', 0x50, {{@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @remote={0xfe, 0x80, [], 0xbb}}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x378) 2018/04/13 19:46:29 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1263, &(0x7f0000beaf68)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "000000000100000001001bf3ffff0000006500000001000a007db0e6f10efbf9a219d8f6aa6bd58d1c43473100e85026e7ff60f9b55bd1b3335d5bffff0001f3", "e9a40005000000f7ffffffff00000000000000ffb833220182ab867d00"}) 2018/04/13 19:46:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 2018/04/13 19:46:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f000082eff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000def000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000c6bfe0)={0x0, 0x0, 0x0, 0x10001}) fcntl$lock(r0, 0x7, &(0x7f0000003fe0)) 2018/04/13 19:46:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/04/13 19:46:30 executing program 5: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000003e80)={&(0x7f0000002ac0)={0x10}, 0xc, &(0x7f0000003e40)={&(0x7f0000002b00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x912695bdda8cbb2f) 2018/04/13 19:46:30 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x800000000000000c, &(0x7f0000013000), &(0x7f0000012000)=0x4) 2018/04/13 19:46:30 executing program 4: getpid() pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r2, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) dup2(r0, r1) 2018/04/13 19:46:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x2f, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @local={0xfe, 0x80, [], 0xffffffffffffffff}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/13 19:46:30 executing program 6: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="4244d6e42a80d6d2d187f8fff1d4a40520e6754e367c0b", 0x17, 0x400}], 0x0, &(0x7f0000011700)) 2018/04/13 19:46:30 executing program 1: nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000457000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x0, 0x0) 2018/04/13 19:46:30 executing program 7: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000001effd)='/', r0, &(0x7f0000d06ff8)='./file0\x00') chroot(&(0x7f0000157000)='./file0\x00') umount2(&(0x7f0000000140)='./file0/file0/file0/file0\x00', 0x0) [ 72.244233] mmap: syz-executor1 (6060) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/13 19:46:31 executing program 0: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x803, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}], 0x1, 0x0) 2018/04/13 19:46:31 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open$dir(&(0x7f0000000880)='./file0/file1\x00', 0x10240, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 2018/04/13 19:46:31 executing program 2: r0 = socket$inet(0xa, 0x80005, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x9, 0x0, 0x0) 2018/04/13 19:46:31 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000e80000/0x13000)=nil, 0x13000, 0x0, &(0x7f0000000000), 0x7, 0x0) 2018/04/13 19:46:31 executing program 6: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000897ff4)={0x10}, 0xc9, &(0x7f0000023000)={&(0x7f0000010dfc)={0x14, 0x2, 0x1, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 19:46:31 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x27}}) 2018/04/13 19:46:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002080)={'bond_slave\x00'}) 2018/04/13 19:46:31 executing program 4: getpid() pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r2, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) dup2(r0, r1) 2018/04/13 19:46:31 executing program 7: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) 2018/04/13 19:46:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0/file0\x00', 0x0, r1) 2018/04/13 19:46:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x10, 0x8000000000004, 0x4, 0x3}, 0x2c) 2018/04/13 19:46:31 executing program 0: r0 = socket$netlink(0xa, 0x5, 0x0) r1 = dup2(r0, r0) getsockopt$sock_buf(r1, 0x1, 0x2, &(0x7f0000000000)=""/68, &(0x7f0000000080)=0x44) 2018/04/13 19:46:31 executing program 6: setrlimit(0x0, &(0x7f0000cd4ff0)) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000100000), &(0x7f0000001000)) 2018/04/13 19:46:31 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000001380)='cpuset.memory_spread_slab\x00', 0x2, 0x0) dup3(r0, r2, 0x0) 2018/04/13 19:46:31 executing program 1: clone(0x200, &(0x7f0000000640), &(0x7f0000c53000), &(0x7f0000000600), &(0x7f000025e000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f00006fcff0)) r0 = getpgrp(0x0) process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/117, 0x75}], 0x1, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/133, 0x85}], 0x1, 0x0) process_vm_writev(r0, &(0x7f0000000580)=[{&(0x7f0000000740)=""/107, 0x6b}], 0x1, &(0x7f0000000940)=[{&(0x7f0000000840)=""/211, 0xd3}], 0x1, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x0) 2018/04/13 19:46:32 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/13 19:46:32 executing program 0: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='\x00', 0x0) 2018/04/13 19:46:32 executing program 3: timer_create(0x9, &(0x7f0000044000)={0x0, 0x1000000000000017}, &(0x7f00008ec000)) timer_delete(0x0) 2018/04/13 19:46:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0/file0\x00', 0x0, r1) 2018/04/13 19:46:32 executing program 5: r0 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000200)="e9", 0x1, 0xfffffffffffffffb) keyctl$clear(0x7, r0) 2018/04/13 19:46:32 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(r1, r1, r1) setuid(r1) 2018/04/13 19:46:32 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) 2018/04/13 19:46:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 2018/04/13 19:46:32 executing program 4: getpid() pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r2, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) dup2(r0, r1) 2018/04/13 19:46:32 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000380)=@updpolicy={0xb8, 0x1d, 0x11, 0x0, 0x0, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xb8}, 0x1}, 0x0) 2018/04/13 19:46:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001300ff10fffefd956fa283b702a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 2018/04/13 19:46:32 executing program 2: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x20000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ae4000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000600000/0x3000)=nil, 0x3000}, 0x1}) 2018/04/13 19:46:32 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)={0x4000}) 2018/04/13 19:46:32 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) 2018/04/13 19:46:32 executing program 6: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x10d, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xc) 2018/04/13 19:46:32 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x0, 0x3}}, 0x10) 2018/04/13 19:46:33 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x0, 0x3}}, 0x10) [ 74.002259] netlink: 168 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 19:46:33 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 19:46:33 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000b54ff4), &(0x7f00002f9ffb)=""/5, 0x5, &(0x7f000083d000)={&(0x7f00003b2000)={'poly1305-simd\x00'}, 0x0, 0x40, [0x2]}) [ 74.069318] netlink: 168 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 19:46:33 executing program 6: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff9000/0x1000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x408000dffc) 2018/04/13 19:46:33 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3da, &(0x7f00000024c0), 0x0, &(0x7f0000000200)={[{@creator={'creator', 0x3d, "6800efd5"}, 0x2c}]}) 2018/04/13 19:46:33 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[], 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="eb", 0x1}], 0x1}, 0x5) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000700)=""/70, 0x46}, 0x51b) 2018/04/13 19:46:33 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000580)={'filter\x00'}, &(0x7f0000000200)=0x78) 2018/04/13 19:46:33 executing program 0: request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffe) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 2018/04/13 19:46:33 executing program 6: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:33 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@ax25={0x3, {"8fad5f5dc95a99"}}, {&(0x7f0000000180)=""/226, 0xe2}, &(0x7f0000000280)}, 0xa0) 2018/04/13 19:46:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0xc3) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100", 0x1b}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f", 0x1}], 0x1) 2018/04/13 19:46:33 executing program 7: r0 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000080)) 2018/04/13 19:46:33 executing program 4: getpid() pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r2, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) dup2(r0, r1) 2018/04/13 19:46:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:33 executing program 5: waitid(0x3, 0x0, &(0x7f0000000300), 0x8, &(0x7f0000000340)) 2018/04/13 19:46:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[]], 0x1, &(0x7f0000000000), 0x0, &(0x7f0000000180)=""/3, 0x3}, 0x0) sendmmsg(r0, &(0x7f0000000140), 0x1f8aeba99eb8fd7, 0x0) 2018/04/13 19:46:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000072cff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000025ffc), 0x4) write(r1, &(0x7f0000019f97), 0x0) recvmsg(r0, &(0x7f0000019fc8)={0x0, 0x0, &(0x7f000001e000), 0x0, &(0x7f0000fae000)}, 0x1ffe) 2018/04/13 19:46:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)=@delneigh={0x1c, 0x1d, 0x517, 0x0, 0x0, {0x2}}, 0x1c}, 0x1}, 0x0) 2018/04/13 19:46:34 executing program 1: r0 = memfd_create(&(0x7f0000000180)='procsystemsecurityvmnet1\x00', 0x0) fallocate(r0, 0x3, 0x1000, 0x9ef) 2018/04/13 19:46:34 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x223, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 75.133104] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/13 19:46:34 executing program 6: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:34 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)={[{@nls={'nls', 0x3d, 'none'}, 0x2c}]}) 2018/04/13 19:46:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f000000efcc)=@mpls_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfffffffe}}, 0x1c}, 0x1}, 0x0) 2018/04/13 19:46:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x20, 0x20, 0x2ff, 0x0, 0x0, {}, [@typed={0xc, 0x0, @fd}]}, 0x20}, 0x1}, 0x0) 2018/04/13 19:46:34 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0xc05c5340, &(0x7f00000002c0)) 2018/04/13 19:46:34 executing program 4: getpid() pipe2(&(0x7f0000989000), 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r1, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) 2018/04/13 19:46:34 executing program 7: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f00000001c0)={[{@map_normal='map=normal', 0x2c}, {@dmode={'dmode', 0x3d, [0x38]}, 0x2c}]}) 2018/04/13 19:46:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0xff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(r0, &(0x7f0000779fc8)={0x0, 0x0, &(0x7f0000001180)}, 0x20008854) 2018/04/13 19:46:35 executing program 4: getpid() pipe2(&(0x7f0000989000), 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r1, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) 2018/04/13 19:46:35 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000c44000)={0x77359400}, &(0x7f0000048000), 0x0) 2018/04/13 19:46:35 executing program 6: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:35 executing program 7: syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@uid={'uid', 0x3d, [0x34]}, 0x2c}]}) 2018/04/13 19:46:35 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000300)='eth1lo\x00', 0x7, 0x0) dup2(r1, r2) 2018/04/13 19:46:35 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0xc05c5340, &(0x7f00000002c0)) 2018/04/13 19:46:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000009fc8)={0x0, 0x0, &(0x7f000001d000), 0x0, &(0x7f000001c000)}, 0xc100) r1 = dup2(r0, r0) sendmsg$key(r1, &(0x7f000000b000)={0x0, 0x0, &(0x7f000001fff0)={&(0x7f0000003fd0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/13 19:46:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:36 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000009fc8)={0x0, 0x0, &(0x7f000001d000), 0x0, &(0x7f000001c000)}, 0xc100) r1 = dup2(r0, r0) sendmsg$key(r1, &(0x7f000000b000)={0x0, 0x0, &(0x7f000001fff0)={&(0x7f0000003fd0)={0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/13 19:46:36 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000040)=0x9, 0x4) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1f2, &(0x7f000001ef08)}, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/89, 0x59}, 0x40002042) 2018/04/13 19:46:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x17, 0x25}, [], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x431, &(0x7f0000000180)=""/195}, 0x48) 2018/04/13 19:46:36 executing program 6: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:36 executing program 7: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x82, &(0x7f0000b89fe4)=@req3, 0x8) 2018/04/13 19:46:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 2018/04/13 19:46:36 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setreuid(r1, 0x0) 2018/04/13 19:46:36 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:36 executing program 6: r0 = socket(0x10, 0x803, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:36 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000c44000)={0x77359400}, &(0x7f0000048000), 0x0) 2018/04/13 19:46:36 executing program 4: getpid() pipe2(&(0x7f0000989000), 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') fremovexattr(r1, &(0x7f0000000100)=@random={'user.', 'eql\x00'}) 2018/04/13 19:46:36 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000300)='eth1lo\x00', 0x7, 0x0) dup2(r1, r2) 2018/04/13 19:46:37 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000000c0), 0x4) dup2(r0, r1) 2018/04/13 19:46:37 executing program 6: sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:37 executing program 0: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0x800452d3, &(0x7f00000002c0)) 2018/04/13 19:46:37 executing program 7: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)={[{@fmask={'fmask', 0x3d}, 0x2c}]}) 2018/04/13 19:46:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x14, 0xb, 0x0, 0x0, {0x2}, [@IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14}}]}, 0x20}, 0x1}, 0x0) 2018/04/13 19:46:37 executing program 6: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:37 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0), 0x2) 2018/04/13 19:46:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:37 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2=0xe0000002, @multicast1=0xe0000001}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000005ffc)=0x2d) 2018/04/13 19:46:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:37 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[], 0x0, &(0x7f0000000400)=[{&(0x7f0000002940)='u', 0x1}], 0x1, &(0x7f0000000500)}, 0x0) sendmsg(r0, &(0x7f0000002900)={&(0x7f0000000080)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x80, &(0x7f0000000180)=[{&(0x7f0000001740)="8c74c16b436602cfad06275e7bd6539acd46a97728be21dbcd7728665def15031070997017", 0x25}], 0x1}, 0x0) close(r0) 2018/04/13 19:46:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x6, &(0x7f0000000040)=0x10000e0, 0x4) 2018/04/13 19:46:38 executing program 4: getpid() pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.ima\x00') dup2(r0, r1) 2018/04/13 19:46:38 executing program 6: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(0xffffffffffffffff, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='t', 0x1}], 0x1, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:38 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)='+', 0x1}], 0x1) 2018/04/13 19:46:38 executing program 0: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000100008000000000", 0x4, 0x0) 2018/04/13 19:46:38 executing program 2: r0 = perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)) 2018/04/13 19:46:38 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0xfffffffffffffeff, &(0x7f0000ffd000/0x3000)=nil, 0x2) 2018/04/13 19:46:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x1, 0x0) 2018/04/13 19:46:38 executing program 6: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/62, 0x3e}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/237, 0xed}, {&(0x7f00000019c0)=""/111, 0x6f}, {&(0x7f0000001a40)=""/149, 0x95}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/233, 0xe9}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x5}}], 0x2, 0x0, &(0x7f0000fd0000)={0x77359400}) 2018/04/13 19:46:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d137e637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000928f74)={0x0, 0x0, 0x0, "717565756531000000000000000000001f00"}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f000006ff44)={0x0, 0x0, 'client0\x00', 0x0, "6318ca4c372bbf06", "99f3c2e1541fe1bfdf54840c086e666dec2aef8735f8bc6ae79d506a1f00f7b8"}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 19:46:38 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x1004, &(0x7f0000000140)=ANY=[]) r0 = open(&(0x7f0000002b40)='./file0\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000400), 0x0, 0x7445}], 0x0, &(0x7f00000002c0)=ANY=[]) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6, 0xa012, r0, 0x0) 2018/04/13 19:46:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) capset(&(0x7f0000000240)={0x20080522, r0}, &(0x7f0000000280)={0x7, 0x1}) 2018/04/13 19:46:38 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000015e15)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x29, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "c5771e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f], 0x1}}}}}}}}, 0x0) 2018/04/13 19:46:38 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000016c0)=[{&(0x7f00000015c0), 0x0, 0x0, 0x100}], 0x0) 2018/04/13 19:46:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000a00)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="b000000000000000000000000900000002576f1ffd0cf2ba9a6f53c23a78c256fc19ff56d634b21d837bed011d293fdbdfd3a00b994a8ebdca8f2f94c5a7ce1b91019c3202ff4e3da0f7bd1c0ed32ec25e93432e1d73b1e8761ae6895d7f572e26c2e5651a673c340647deaccd8bd8979daa34def226aa50710c7a615f8aab4a3c48db79fcb4b29ebaa9371e5b1539840de33e9d3cb9d97e3590a5d5f9230000280000000000000017010000ffffffffaa8fdde1725b230a3d0f89dbf5c1a125"], 0xc0}}], 0x2, 0x0) 2018/04/13 19:46:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0xa, 0x0) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000040), 0x0, &(0x7f0000000380)}, 0x0) [ 80.031061] ================================================================== [ 80.038440] BUG: KMSAN: uninit-value in ipv6_skip_exthdr+0x135/0x900 [ 80.044915] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.16.0+ #83 [ 80.051133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.060506] Call Trace: [ 80.063077] [ 80.065210] dump_stack+0x185/0x1d0 [ 80.068818] ? ipv6_skip_exthdr+0x135/0x900 [ 80.073121] kmsan_report+0x142/0x240 [ 80.076903] __msan_warning_32+0x6c/0xb0 [ 80.080953] ipv6_skip_exthdr+0x135/0x900 [ 80.085092] icmp6_send+0xec1/0x3460 [ 80.088876] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 80.094218] ? update_cfs_rq_load_avg+0x1460/0x1aa0 [ 80.099222] ? ndisc_error_report+0x40/0x1a0 [ 80.103608] ? icmpv6_param_prob+0xc0/0xc0 [ 80.107824] icmpv6_send+0xe0/0x110 [ 80.111430] ? ndisc_error_report+0x101/0x1a0 [ 80.115905] ip6_link_failure+0x8f/0x580 [ 80.119946] ? ip6_negative_advice+0x350/0x350 [ 80.124514] ndisc_error_report+0x101/0x1a0 [ 80.128821] ? ndisc_solicit+0x5c0/0x5c0 [ 80.132860] neigh_invalidate+0x385/0x930 [ 80.137000] neigh_timer_handler+0xd85/0x12d0 [ 80.141485] call_timer_fn+0x26a/0x5a0 [ 80.145351] ? neigh_blackhole+0x60/0x60 [ 80.149388] __run_timers+0xda7/0x11c0 [ 80.153253] ? neigh_blackhole+0x60/0x60 [ 80.157307] ? irq_exit+0x202/0x240 [ 80.160919] ? run_timer_softirq+0x14/0x70 [ 80.165175] ? timers_dead_cpu+0x1010/0x1010 [ 80.169559] run_timer_softirq+0x43/0x70 [ 80.173601] __do_softirq+0x56d/0x93d [ 80.177392] irq_exit+0x202/0x240 [ 80.180826] exiting_irq+0xe/0x10 [ 80.184258] smp_apic_timer_interrupt+0x64/0x90 [ 80.188907] apic_timer_interrupt+0xf/0x20 [ 80.193118] [ 80.195344] RIP: 0010:default_idle+0x1fb/0x3c0 [ 80.199916] RSP: 0018:ffff8801df67fdf0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff12 [ 80.207607] RAX: ffff880203eb5440 RBX: 0000000000000000 RCX: ffff880000000000 [ 80.214856] RDX: ffff880203ab5440 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 80.222106] RBP: ffff8801df67fe28 R08: 0000000001080020 R09: 0000000000000002 [ 80.229354] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 80.236606] R13: ffff8801df5f3b00 R14: ffff8801df67fe8c R15: ffff8801df5f4418 [ 80.243876] ? __sched_text_end+0x1/0x1 [ 80.247831] arch_cpu_idle+0x20/0x30 [ 80.251523] do_idle+0x349/0x790 [ 80.254871] cpu_startup_entry+0x45/0x50 [ 80.258910] ? setup_APIC_timer+0x220/0x220 [ 80.263225] start_secondary+0x39d/0x470 [ 80.267287] secondary_startup_64+0xa5/0xb0 [ 80.271584] [ 80.273184] Uninit was stored to memory at: [ 80.277482] kmsan_internal_chain_origin+0x12b/0x210 [ 80.282561] kmsan_memcpy_origins+0x11d/0x170 [ 80.287037] __msan_memcpy+0x19f/0x1f0 [ 80.290907] skb_copy_bits+0x63a/0xdb0 [ 80.294771] ipv6_skip_exthdr+0x297/0x900 [ 80.298901] icmp6_send+0xec1/0x3460 [ 80.302591] icmpv6_send+0xe0/0x110 [ 80.306195] ip6_link_failure+0x8f/0x580 [ 80.310232] ndisc_error_report+0x101/0x1a0 [ 80.314530] neigh_invalidate+0x385/0x930 [ 80.318652] neigh_timer_handler+0xd85/0x12d0 [ 80.324250] call_timer_fn+0x26a/0x5a0 [ 80.328110] __run_timers+0xda7/0x11c0 [ 80.331972] run_timer_softirq+0x43/0x70 [ 80.336017] __do_softirq+0x56d/0x93d [ 80.339795] Uninit was created at: [ 80.343309] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 80.348299] kmsan_alloc_page+0x82/0xe0 [ 80.352248] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 80.356984] alloc_pages_current+0x6b5/0x970 [ 80.361368] skb_page_frag_refill+0x3ba/0x5e0 [ 80.365835] sk_page_frag_refill+0xa4/0x340 [ 80.370133] __ip6_append_data+0x1a20/0x4bb0 [ 80.374518] ip6_append_data+0x40e/0x6b0 [ 80.378552] rawv6_sendmsg+0x2787/0x4cc0 [ 80.382590] inet_sendmsg+0x48d/0x740 [ 80.386366] ___sys_sendmsg+0xec0/0x1310 [ 80.390400] SYSC_sendmsg+0x2a3/0x3d0 [ 80.394177] SyS_sendmsg+0x54/0x80 [ 80.397690] do_syscall_64+0x309/0x430 [ 80.401552] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.406724] ================================================================== [ 80.414057] Disabling lock debugging due to kernel taint [ 80.419489] Kernel panic - not syncing: panic_on_warn set ... [ 80.419489] [ 80.426838] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 4.16.0+ #83 [ 80.434341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.443668] Call Trace: [ 80.446224] [ 80.448351] dump_stack+0x185/0x1d0 [ 80.451956] panic+0x39d/0x940 [ 80.455133] ? ipv6_skip_exthdr+0x135/0x900 [ 80.459429] kmsan_report+0x238/0x240 [ 80.463205] __msan_warning_32+0x6c/0xb0 [ 80.467249] ipv6_skip_exthdr+0x135/0x900 [ 80.471376] icmp6_send+0xec1/0x3460 [ 80.475064] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 80.480408] ? update_cfs_rq_load_avg+0x1460/0x1aa0 [ 80.485410] ? ndisc_error_report+0x40/0x1a0 [ 80.489799] ? icmpv6_param_prob+0xc0/0xc0 [ 80.494014] icmpv6_send+0xe0/0x110 [ 80.497628] ? ndisc_error_report+0x101/0x1a0 [ 80.502100] ip6_link_failure+0x8f/0x580 [ 80.506146] ? ip6_negative_advice+0x350/0x350 [ 80.510704] ndisc_error_report+0x101/0x1a0 [ 80.515008] ? ndisc_solicit+0x5c0/0x5c0 [ 80.519058] neigh_invalidate+0x385/0x930 [ 80.523187] neigh_timer_handler+0xd85/0x12d0 [ 80.527662] call_timer_fn+0x26a/0x5a0 [ 80.531528] ? neigh_blackhole+0x60/0x60 [ 80.535563] __run_timers+0xda7/0x11c0 [ 80.539424] ? neigh_blackhole+0x60/0x60 [ 80.543464] ? irq_exit+0x202/0x240 [ 80.547067] ? run_timer_softirq+0x14/0x70 [ 80.551286] ? timers_dead_cpu+0x1010/0x1010 [ 80.555674] run_timer_softirq+0x43/0x70 [ 80.559714] __do_softirq+0x56d/0x93d [ 80.563503] irq_exit+0x202/0x240 [ 80.566935] exiting_irq+0xe/0x10 [ 80.570363] smp_apic_timer_interrupt+0x64/0x90 [ 80.575013] apic_timer_interrupt+0xf/0x20 [ 80.579230] [ 80.581444] RIP: 0010:default_idle+0x1fb/0x3c0 [ 80.586004] RSP: 0018:ffff8801df67fdf0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff12 [ 80.593703] RAX: ffff880203eb5440 RBX: 0000000000000000 RCX: ffff880000000000 [ 80.600960] RDX: ffff880203ab5440 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 80.608208] RBP: ffff8801df67fe28 R08: 0000000001080020 R09: 0000000000000002 [ 80.615453] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 80.622698] R13: ffff8801df5f3b00 R14: ffff8801df67fe8c R15: ffff8801df5f4418 [ 80.629962] ? __sched_text_end+0x1/0x1 [ 80.633914] arch_cpu_idle+0x20/0x30 [ 80.637603] do_idle+0x349/0x790 [ 80.640955] cpu_startup_entry+0x45/0x50 [ 80.644993] ? setup_APIC_timer+0x220/0x220 [ 80.649300] start_secondary+0x39d/0x470 [ 80.653338] secondary_startup_64+0xa5/0xb0 [ 80.658075] Dumping ftrace buffer: [ 80.661593] (ftrace buffer empty) [ 80.665283] Kernel Offset: disabled [ 80.668883] Rebooting in 86400 seconds..