INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2018/04/20 19:41:54 fuzzer started 2018/04/20 19:41:54 dialing manager at 10.128.0.26:40315 2018/04/20 19:42:00 kcov=true, comps=false 2018/04/20 19:42:03 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000ffdff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) writev(r1, &(0x7f0000644ff0)=[{&(0x7f0000000000)="480000001400257f09004b01fcfc8c560a880000f217e0060000db00000000a2bc56c186e11f94580b0318fe0000000000200028213e146a1ce206000000000000ffff5bf1ff00c7", 0x48}], 0x1) 2018/04/20 19:42:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000013000501000000000000000000000000", @ANYBLOB="0000000000e9ffff0b002b00080001004b000001"], 0x2}, 0x1}, 0x0) 2018/04/20 19:42:03 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) close(r1) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fchown(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x20) lseek(r2, 0x0, 0x3) close(r0) 2018/04/20 19:42:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/20 19:42:03 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x1, &(0x7f0000001980)=[{&(0x7f0000001800), 0x0, 0x3ff}], 0x8000, &(0x7f0000001a80)={[{@nocase='nocase', 0x2c}, {@uid={'uid', 0x3d, [0x34, 0x30]}, 0x2c}, {@nocase='nocase', 0x2c}, {@uid={'uid', 0x3d, [0x31]}, 0x2c}, {@fmask={'fmask', 0x3d, [0x35, 0x33, 0x30, 0x30]}, 0x2c}, {@nfs='nfs', 0x2c}]}) 2018/04/20 19:42:03 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) 2018/04/20 19:42:03 executing program 2: clone(0x0, &(0x7f0000000500), &(0x7f0000000080), &(0x7f00000002c0), &(0x7f00000002c0)) wait4(0x0, &(0x7f0000000140), 0x0, &(0x7f0000000200)) 2018/04/20 19:42:03 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) syzkaller login: [ 42.294242] ip (3677) used greatest stack depth: 54672 bytes left [ 43.061142] ip (3753) used greatest stack depth: 54200 bytes left [ 43.652081] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.658573] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.717932] device bridge_slave_0 entered promiscuous mode [ 43.760933] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.767438] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.799976] device bridge_slave_0 entered promiscuous mode [ 43.824996] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.831503] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.859962] device bridge_slave_0 entered promiscuous mode [ 43.868298] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.874736] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.891978] device bridge_slave_0 entered promiscuous mode [ 43.910417] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.916864] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.947150] device bridge_slave_0 entered promiscuous mode [ 43.958935] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.965399] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.978136] device bridge_slave_0 entered promiscuous mode [ 43.985295] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.991775] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.010587] device bridge_slave_0 entered promiscuous mode [ 44.025954] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.032409] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.042958] device bridge_slave_1 entered promiscuous mode [ 44.049742] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.056208] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.079954] device bridge_slave_0 entered promiscuous mode [ 44.101682] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.108141] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.121673] device bridge_slave_1 entered promiscuous mode [ 44.131192] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.137670] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.149411] device bridge_slave_1 entered promiscuous mode [ 44.163273] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.169767] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.181069] device bridge_slave_1 entered promiscuous mode [ 44.188969] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.195558] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.214078] device bridge_slave_1 entered promiscuous mode [ 44.223148] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.229604] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.246561] device bridge_slave_1 entered promiscuous mode [ 44.259677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.267168] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.273688] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.286955] device bridge_slave_1 entered promiscuous mode [ 44.295662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.305530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.313434] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.319913] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.354328] device bridge_slave_1 entered promiscuous mode [ 44.375751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.430814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.438880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.448931] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.473834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.498660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.512312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.576128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.595628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.631933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.671807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.709127] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.751617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.887433] ip (3885) used greatest stack depth: 53656 bytes left [ 45.403358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.468742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.504933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.613291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.630928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.640667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.679689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.686823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.699076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.730132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.744050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.821137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.856984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.879414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.890474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.908856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.583558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.707378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.762658] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.788175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.814574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.825429] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.856081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.894157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.937447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.967223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.984882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.002483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.010468] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.040394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.049808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.064517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.102797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.119316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.161835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.170459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.186613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.222257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.235653] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.242791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.255710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.278703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.286159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.313920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.333972] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.349164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.360895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.378348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.385675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.395248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.414170] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.423472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.431130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.438233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.455635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.481493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.507713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.529596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.549732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.558655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.570009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.578268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.589738] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.606592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.617234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.624845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.636830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.668108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.713643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.744875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.765590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.779407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.788400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.796517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.805516] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.812600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.821321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.859089] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.866312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.891872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.804305] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.810800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.817675] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.824125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.864991] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.871531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.883182] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.889632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.896421] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.902859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.911705] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.924531] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.930960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.937801] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.944231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.961923] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.978222] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.984687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.991508] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.997986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.063961] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.073200] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.079649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.086499] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.092954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.133513] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.151951] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.158440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.165305] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.171763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.249424] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.257984] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.264442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.271311] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.277755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.313161] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.321744] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.328213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.335111] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.341559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.353435] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.912168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.924461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.957647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.970362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.977801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.986608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.996173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.988595] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.225353] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.304116] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.333652] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.433598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.564378] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.588080] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.669194] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.774913] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.781235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.790563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.970452] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.976745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.987787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.023268] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.030359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.049725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.096076] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.102323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.113442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.271587] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.277873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.291617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.391702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.398004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.410585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.505762] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.512156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.525658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.577792] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.584364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.596097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 19:42:30 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc}, 0x3b4b9e86287666f0) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) close(r0) 2018/04/20 19:42:30 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x3}, 0x8, 0x800) msgctl$IPC_RMID(r0, 0x0) 2018/04/20 19:42:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0x0, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000340)="8b", 0x1, 0x4004093, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffb, 0x4) sendto$inet(r0, &(0x7f0000000380)="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", 0x1cf, 0x8041, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) sendto$inet(r0, &(0x7f0000000100)="6c0680ec9dc9f3b0ec1594734c544176300efce2c1a7e8179de3fa25471be1f1e82d39a9121cdbd3d84da19403359f53d69fdec85e5d4c73ec20d86469a681f499e361207c6a0978183914", 0x4b, 0x0, &(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/20 19:42:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077c32cf6d22b4c4f8d", 0x0) ftruncate(r1, 0x400003) sendfile(r0, r1, &(0x7f000000a000), 0x7ffff) 2018/04/20 19:42:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/20 19:42:30 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) close(r1) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fchown(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x20) lseek(r2, 0x0, 0x3) close(r0) 2018/04/20 19:42:30 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x12013, r0, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) 2018/04/20 19:42:30 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f01402d1cb2a4a280930a0606757da843cf27d0f869390009402f0021000c000000190005c0fefc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) 2018/04/20 19:42:30 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:30 executing program 2: 2018/04/20 19:42:30 executing program 5: 2018/04/20 19:42:30 executing program 1: 2018/04/20 19:42:31 executing program 1: 2018/04/20 19:42:31 executing program 5: 2018/04/20 19:42:31 executing program 4: 2018/04/20 19:42:31 executing program 2: 2018/04/20 19:42:31 executing program 6: 2018/04/20 19:42:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x28, &(0x7f0000000280)}, 0x10) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000280), &(0x7f0000001440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r1, &(0x7f0000001480)="cf", &(0x7f0000000180)=""/160}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000000c0)="01"}, 0x10) 2018/04/20 19:42:31 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:31 executing program 5: 2018/04/20 19:42:31 executing program 1: 2018/04/20 19:42:31 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)={[{@check_relaxed='check=relaxed', 0x2c}, {@overriderock='overriderockperm', 0x2c}, {@mode={'mode', 0x3d, [0x39]}, 0x2c}]}) 2018/04/20 19:42:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000989000)=0x100) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000002380)=[{{&(0x7f0000002000)=@vsock={0x0, 0x0, 0x0, @my}, 0x80, &(0x7f0000002240), 0x0, &(0x7f0000002280)=""/194, 0xc2}}], 0x1, 0x0, &(0x7f0000002480)={0x0, 0x1c9c380}) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) 2018/04/20 19:42:31 executing program 7: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f000000b000)={&(0x7f000000bfe4)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x10, &(0x7f0000016fa0), 0x0, &(0x7f000000d000)}, 0x0) 2018/04/20 19:42:31 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000240)=[{0x28, 0x29, 0x2, "2b07df2fd0846bc0964f4ffde3d917e308"}], 0x28}}], 0x2, 0x0) 2018/04/20 19:42:31 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0}) 2018/04/20 19:42:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x20000000005, 0x2, 0x914, 0x4000000005, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x7, 0x2, &(0x7f0000000280)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}], &(0x7f00000002c0)='GPL\x00', 0x6, 0xea, &(0x7f0000000300)=""/234}, 0x48) 2018/04/20 19:42:32 executing program 7: syz_emit_ethernet(0x76, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0x10, 0x6, 0x3, 0x0, [{}, {[@multicast1=0xe0000001]}]}]}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}, &(0x7f0000000040)) 2018/04/20 19:42:32 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:32 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000500)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000040)='ubifs\x00', 0x1004, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[]) mount(&(0x7f0000000580)='./file0/file0\x00', &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000753000)='proc\x00', 0x5010, &(0x7f0000000200)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)) 2018/04/20 19:42:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)={[{@check_relaxed='check=relaxed', 0x2c}, {@overriderock='overriderockperm', 0x2c}, {@mode={'mode', 0x3d, [0x39]}, 0x2c}]}) 2018/04/20 19:42:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='rdma.max\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='Ehreaded\x00', 0x1) 2018/04/20 19:42:32 executing program 2: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f}, 0xa) 2018/04/20 19:42:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x2}, 0x20) 2018/04/20 19:42:32 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 19:42:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="390000001100094701bb61e1c30500ff0700000002000000d7efffff08009b0019001a000f00000073544ec00000000004e9f50006000d0005", 0x39}], 0x1) 2018/04/20 19:42:32 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x442, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000001c0)) 2018/04/20 19:42:32 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=""/8, 0x8}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000180)=""/196, 0xc4}, 0x0) recvmsg(r0, &(0x7f0000364fc8)={&(0x7f0000e2b000)=@can, 0x10, &(0x7f0000001180)}, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="1b0000005200030f07fffd946fa283bc04eee6d87986c497271d85", 0x1b}], 0x1}, 0x0) 2018/04/20 19:42:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:32 executing program 6: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x4, 0x468, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000140), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x11, 0x0, 0x0, 'syzkaller1\x00', 'vlan0\x00', 'dummy0\x00', 'ifb0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @random="bfea4ea355c2", [], 0xe8, 0xe8, 0x118, [@ip={'ip\x00', 0x20, {{@multicast2=0xe0000002, @rand_addr}}}, @pkttype={'pkttype\x00', 0x8}]}}, @common=@STANDARD={'\x00', 0x8}}, {{{0x19, 0x0, 0x0, 'ip_vti0\x00', 'bridge0\x00', 'ip_vti0\x00', 'irlan0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'nr0\x00', 'ip_vti0\x00', 'vlan0\x00', 'bridge0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xa8, 0xf8}, [@common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}, {{{0x19, 0x0, 0x0, 'ip6tnl0\x00', 'ip6gre0\x00', 'gre0\x00', 'bond0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0xb0, 0xe0, 0x128, [@devgroup={'devgroup\x00', 0x18}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x4e0) 2018/04/20 19:42:32 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:32 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r2 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r2, &(0x7f0000000300)="d8", 0x1) sendfile(r2, r2, &(0x7f0000000040), 0x7527fb3200000000) sendfile(r2, r1, &(0x7f0000000180), 0x12000) 2018/04/20 19:42:33 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000500)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000040)='ubifs\x00', 0x1004, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[]) mount(&(0x7f0000000580)='./file0/file0\x00', &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000753000)='proc\x00', 0x5010, &(0x7f0000000200)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)) 2018/04/20 19:42:33 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:33 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x80ffffff, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) 2018/04/20 19:42:33 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() process_vm_writev(r0, &(0x7f0000c60ff0)=[{&(0x7f0000a09000)=""/1, 0x1}], 0x1, &(0x7f0000964000)=[{&(0x7f0000937000)=""/88, 0x58}], 0x1, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 2018/04/20 19:42:33 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f00006bcff0)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x14, 0x201, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1}]}, 0x2c}, 0x1}, 0x0) 2018/04/20 19:42:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:34 executing program 2: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x2001, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000000c0)) 2018/04/20 19:42:34 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:34 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x2, 0x18, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xb}, @sadb_ident={0x2, 0xb}]}, 0x30}, 0x1}, 0x0) 2018/04/20 19:42:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00004a0000)='schedstat\x00') pread64(r0, &(0x7f0000f9f000)=""/223, 0xdf, 0x0) 2018/04/20 19:42:34 executing program 5: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req3, 0x1c) 2018/04/20 19:42:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fea000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x1) sendfile(r1, r2, &(0x7f00009caff8), 0x1000000008) 2018/04/20 19:42:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() process_vm_writev(r0, &(0x7f0000c60ff0)=[{&(0x7f0000a09000)=""/1, 0x1}], 0x1, &(0x7f0000964000)=[{&(0x7f0000937000)=""/88, 0x58}], 0x1, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 2018/04/20 19:42:34 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') creat(&(0x7f00000000c0)='./file1\x00', 0x0) mknod(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) dup2(r1, r2) 2018/04/20 19:42:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe6ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) 2018/04/20 19:42:34 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:34 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:34 executing program 6: io_setup(0x6, &(0x7f00000012c0)=0x0) io_getevents(r0, 0x2, 0x8f, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) r1 = memfd_create(&(0x7f0000000000)=':+lo#\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)}]) io_destroy(r0) 2018/04/20 19:42:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:34 executing program 7: r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x8, &(0x7f0000000740)={{{@in6=@empty={[0x0, 0x2]}, @in6=@dev={0xfe, 0x80}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0x4) 2018/04/20 19:42:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = gettid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) r2 = dup(r0) listen$netrom(r2, 0x1) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 2018/04/20 19:42:35 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:35 executing program 5: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x318, [0x200009c0, 0x0, 0x0, 0x20000dc0, 0x20000df0], 0x0, &(0x7f0000000100), &(0x7f00000009c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x13, 0x0, 0x0, '\x00', 'gre0\x00', 'bridge0\x00', 'bcsh0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xe0, 0x1a8, 0x1e0, [@rateest={'rateest\x00', 0x48, {{'teql0\x00', 'teql0\x00'}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "cc24deab127f13bb3892ab9e85da536553410034aa3749278678e8aa6757f5c27194ec8f8aedb79edc7368f471d1f0c728935126572a6d37f15117b1d59932b2"}}}]}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'ifb0\x00', 'erspan0\x00', 'tunl0\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="da11d7a88acc"}}}}]}]}, 0x390) 2018/04/20 19:42:35 executing program 7: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) io_setup(0x800000020, &(0x7f0000000040)=0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000000c0), 0x2) r2 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000ddc000), 0x0, 0x0, 0x0, 0x1, r0}]) 2018/04/20 19:42:35 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:35 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') creat(&(0x7f00000000c0)='./file1\x00', 0x0) mknod(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) dup2(r1, r2) 2018/04/20 19:42:35 executing program 6: io_setup(0x6, &(0x7f00000012c0)=0x0) io_getevents(r0, 0x2, 0x8f, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) r1 = memfd_create(&(0x7f0000000000)=':+lo#\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)}]) io_destroy(r0) 2018/04/20 19:42:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:35 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/64, 0x40}], 0x1) 2018/04/20 19:42:35 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:35 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-sse2\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0), 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) read(r1, &(0x7f0000000540)=""/4096, 0x1000) 2018/04/20 19:42:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:36 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:36 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:36 executing program 5: mkdir(&(0x7f0000b8f000)='./file0\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000b99e7d)='./file0\x00', 0x8) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_rm_watch(r0, r1) 2018/04/20 19:42:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = gettid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) r2 = dup(r0) listen$netrom(r2, 0x1) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 2018/04/20 19:42:36 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000ad9000)='attr/current\x00') sendfile(0xffffffffffffffff, r0, &(0x7f00005a6000), 0xffff88002a759025) 2018/04/20 19:42:36 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x100000001, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000040), 0xf}]) 2018/04/20 19:42:36 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:36 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000001480)=[{&(0x7f0000000000)="480000001400257d09004b01fcfc8c560a04002e6900000600000000000000a2bc560300200000390000000028213ee206000000000000ffff5bf1ff00c7e5edab49fc8d00000000", 0x48}], 0x1) 2018/04/20 19:42:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001}, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, {@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}}, {{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x9}, [@tmpl={0x44, 0x5, [{{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x33}, 0x0, @in=@multicast1=0xe0000001}]}]}, 0x16c}, 0x1}, 0x0) 2018/04/20 19:42:36 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:36 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:36 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 2018/04/20 19:42:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = gettid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) r2 = dup(r0) listen$netrom(r2, 0x1) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 2018/04/20 19:42:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f0000000580)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1006, 0x0) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/20 19:42:36 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:36 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:36 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/04/20 19:42:36 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x1, 0x1a0, [0x0, 0x20000180, 0x200002c0, 0x200002f0], 0x0, &(0x7f0000000000), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'teql0\x00', 'ip6gre0\x00', 'ip6gretap0\x00', 'erspan0\x00', @random="69deb5f27362", [], @random="3e2be3aa79af", [], 0xe0, 0xe0, 0x110, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @random="6cf4e2b151a1", [], 0x0, 0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x20}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x218) 2018/04/20 19:42:37 executing program 7: r0 = inotify_init() flock(0xffffffffffffffff, 0x0) flock(r0, 0x5) 2018/04/20 19:42:37 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:37 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:37 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=0x1000890000001) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:37 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(0xffffffffffffffff, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000b7aff8)='gid_map\x00') sendfile(r0, r0, &(0x7f00009fdff8)=0x401, 0xed) 2018/04/20 19:42:37 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f000037c000)="170000001a001bed0000132100f404fffffffffffffff7", 0x17) recvmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000300)=@nl, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/28, 0x1c}}, {{&(0x7f0000004b80)=@nfc, 0x80, &(0x7f0000005c80), 0x0, &(0x7f0000005cc0)=""/4096, 0x1000}}, {{&(0x7f0000006cc0)=@pppol2tpv3in6, 0x80, &(0x7f0000006dc0), 0x0, &(0x7f0000006e00)=""/215, 0xd7}}], 0x3, 0x0, &(0x7f00000070c0)={0x77359400}) 2018/04/20 19:42:37 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:41 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:41 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f0000000580)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1006, 0x0) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/20 19:42:41 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f000037c000)="170000001a001bed0000132100f404fffffffffffffff7", 0x17) recvmmsg(r0, &(0x7f0000006f00)=[{{&(0x7f0000000300)=@nl, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/28, 0x1c}}, {{&(0x7f0000004b80)=@nfc, 0x80, &(0x7f0000005c80), 0x0, &(0x7f0000005cc0)=""/4096, 0x1000}}, {{&(0x7f0000006cc0)=@pppol2tpv3in6, 0x80, &(0x7f0000006dc0), 0x0, &(0x7f0000006e00)=""/215, 0xd7}}], 0x3, 0x0, &(0x7f00000070c0)={0x77359400}) 2018/04/20 19:42:41 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:41 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = gettid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) r2 = dup(r0) listen$netrom(r2, 0x1) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 2018/04/20 19:42:41 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f0000000580)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1006, 0x0) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/20 19:42:41 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:41 executing program 7: unshare(0x60000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') 2018/04/20 19:42:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040005}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000a0bff0)={0x0, 0xebe, 0x1, [0x8000]}, 0xa) 2018/04/20 19:42:41 executing program 6: bind$rds(0xffffffffffffffff, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:41 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:41 executing program 6: bind$rds(0xffffffffffffffff, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:41 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000006fc8)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f00000005c0)}, 0xc100) write$binfmt_elf32(r0, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 2018/04/20 19:42:41 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:41 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:42 executing program 6: bind$rds(0xffffffffffffffff, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:43 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:43 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x2, 0xeff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/171}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/29}, 0x18) 2018/04/20 19:42:43 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) gettid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) r1 = dup(r0) listen$netrom(r1, 0x1) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/20 19:42:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x404e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) read(r0, &(0x7f0000000080)=""/218, 0xda) recvfrom$inet(r0, &(0x7f0000000200)=""/160, 0xa0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/20 19:42:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000500)=ANY=[@ANYBLOB='8:0\r1'], 0x5) 2018/04/20 19:42:43 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:43 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000480)=0x2, 0x4) 2018/04/20 19:42:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:43 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:43 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:43 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:43 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(\x00') 2018/04/20 19:42:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000039cfe4)={0xa, 0x2}, 0x3b) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x1a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000c7a000), 0x0, 0x20000004, &(0x7f0000b23000)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 19:42:43 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 79.540353] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/20 19:42:43 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:43 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000082eff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000def000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000c6bfe0)={0x0, 0x0, 0x4000000080000d8}) fcntl$lock(r0, 0x7, &(0x7f0000003fe0)) 2018/04/20 19:42:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:43 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:44 executing program 7: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x4, 0x4e8, [0x20001580, 0x0, 0x0, 0x20001820, 0x20001a38], 0x0, &(0x7f0000001200), &(0x7f0000001580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x0, 0x8035, 'ipddp0\x00', 'eql\x00', 'bond0\x00', 'sit0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @empty, [], 0x118, 0x118, 0x150, [@arp={'arp\x00', 0x38, {{0x0, 0x0, 0x0, @broadcast=0xffffffff, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @limit={'limit\x00', 0x20}]}}, @arpreply={'arpreply\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}}, {{{0x5, 0x0, 0x0, 'vlan0\x00', 'eql\x00', 'bcsf0\x00', "736974300000000000001300", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xd8, 0x120}, [@common=@AUDIT={'AUDIT\x00', 0x8}, @snat={'snat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'ip6_vti0\x00', '\x00', 'ipddp0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x108, 0x108, 0x140, [@physdev={'physdev\x00', 0x70, {{'teql0\x00', {}, 'ip6gre0\x00'}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}, {{{0x5, 0x0, 0x0, 'bcsh0\x00', 'vlan0\x00', 'ifb0\x00', 'nr0\x00', @random="4e2947e4bf98", [], @random="4d807555966a", [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc}]}, 0x560) 2018/04/20 19:42:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) gettid() setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) r1 = dup(r0) listen$netrom(r1, 0x1) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/20 19:42:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/70}, 0x18) 2018/04/20 19:42:44 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) 2018/04/20 19:42:44 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000276000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f0000e64ff8), 0x44) 2018/04/20 19:42:44 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:44 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000100)='/vmnet0\x00', 0x11f, 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.syz\x00', &(0x7f0000000200)='/dev/sequencer\x00', 0x6, 0x0) 2018/04/20 19:42:44 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000082eff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000def000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000c6bfe0)={0x0, 0x0, 0x4000000080000d8}) fcntl$lock(r0, 0x7, &(0x7f0000003fe0)) [ 80.255447] ================================================================== [ 80.262879] BUG: KMSAN: uninit-value in sha_transform+0x58ec/0x6320 [ 80.269282] CPU: 1 PID: 6215 Comm: syz-executor7 Not tainted 4.16.0+ #84 [ 80.276111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.285460] Call Trace: [ 80.288060] dump_stack+0x185/0x1d0 [ 80.291691] ? sha_transform+0x58ec/0x6320 [ 80.295929] kmsan_report+0x142/0x240 [ 80.299741] __msan_warning_32+0x6c/0xb0 [ 80.303807] sha_transform+0x58ec/0x6320 [ 80.307888] ? kernel_text_address+0x34d/0x3a0 [ 80.312507] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 80.317967] ? __msan_poison_alloca+0x15c/0x1d0 [ 80.322636] ? shash_ahash_finup+0x468/0xa30 [ 80.327070] crypto_sha1_finup+0x51c/0x600 [ 80.331314] ? crypto_hash_walk_first+0x210/0x380 [ 80.336162] ? shash_ahash_finup+0x5e/0xa30 [ 80.340504] ? shash_ahash_finup+0x3e8/0xa30 [ 80.344927] ? crypto_sha1_update+0x5b0/0x5b0 [ 80.349425] ? crypto_sha1_update+0x5b0/0x5b0 [ 80.353917] shash_ahash_finup+0x468/0xa30 [ 80.358154] shash_ahash_digest+0x5c6/0x600 [ 80.362483] shash_async_digest+0x11c/0x1b0 [ 80.366829] crypto_ahash_op+0x89a/0xc10 [ 80.370896] ? __kmalloc+0x23c/0x350 [ 80.374613] ? shash_async_finup+0x1b0/0x1b0 [ 80.379026] ? shash_async_finup+0x1b0/0x1b0 [ 80.383441] crypto_ahash_digest+0xe4/0x160 [ 80.387761] hash_sendpage+0xb40/0xe10 [ 80.391650] ? hash_recvmsg+0xd50/0xd50 [ 80.395628] sock_sendpage+0x1de/0x2c0 [ 80.399526] pipe_to_sendpage+0x31b/0x430 [ 80.403678] ? sock_fasync+0x2b0/0x2b0 [ 80.407570] ? propagate_umount+0x3a30/0x3a30 [ 80.412069] __splice_from_pipe+0x49a/0xf30 [ 80.416388] ? generic_splice_sendpage+0x2a0/0x2a0 [ 80.421321] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 80.426688] generic_splice_sendpage+0x1c6/0x2a0 [ 80.431453] ? iter_file_splice_write+0x1710/0x1710 [ 80.436487] ? iter_file_splice_write+0x1710/0x1710 [ 80.441511] direct_splice_actor+0x19b/0x200 [ 80.445925] splice_direct_to_actor+0x764/0x1040 [ 80.450677] ? do_splice_direct+0x540/0x540 [ 80.455002] ? security_file_permission+0x28f/0x4b0 [ 80.460026] ? rw_verify_area+0x35e/0x580 [ 80.464185] do_splice_direct+0x335/0x540 [ 80.468347] do_sendfile+0x1067/0x1e40 [ 80.472250] SYSC_sendfile64+0x1b3/0x300 [ 80.476317] SyS_sendfile64+0x64/0x90 [ 80.480117] do_syscall_64+0x309/0x430 [ 80.484010] ? SYSC_sendfile+0x320/0x320 [ 80.488086] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.493277] RIP: 0033:0x455379 [ 80.496460] RSP: 002b:00007f745ec43c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 2018/04/20 19:42:44 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 19:42:44 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)=0x1000890000001) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={"623d015b814000", 0x4003}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000874000)={0x80001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/20 19:42:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000500)="63512d1c00", &(0x7f00000004c0)='/\x00', 0x0, 0x0, &(0x7f00000004c0), 0x28020, &(0x7f0000000540)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, [0x34]}, 0x2c}]}) 2018/04/20 19:42:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f000067d000)=0x19, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000932000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/20 19:42:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000082eff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000def000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000c6bfe0)={0x0, 0x0, 0x4000000080000d8}) fcntl$lock(r0, 0x7, &(0x7f0000003fe0)) 2018/04/20 19:42:44 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f000001ef90)=[{&(0x7f000001f000)=""/4096, 0x1000}], 0x2}}], 0x48}, 0x0) [ 80.504175] RAX: ffffffffffffffda RBX: 00007f745ec446d4 RCX: 0000000000455379 [ 80.511445] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 80.518724] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 80.525994] R10: 0000000000000044 R11: 0000000000000246 R12: 00000000ffffffff [ 80.533267] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 80.540543] [ 80.542165] Uninit was created at: [ 80.545710] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 80.550726] kmsan_alloc_page+0x82/0xe0 [ 80.554704] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 80.559461] alloc_pages_vma+0xcc8/0x1800 [ 80.563622] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 80.568642] shmem_getpage_gfp+0x35db/0x5770 [ 80.573055] shmem_fallocate+0xde2/0x1610 [ 80.577202] vfs_fallocate+0x9dc/0xde0 [ 80.581094] SYSC_fallocate+0x119/0x1d0 [ 80.585067] SyS_fallocate+0x64/0x90 [ 80.588778] do_syscall_64+0x309/0x430 [ 80.592669] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.597848] ================================================================== [ 80.605200] Disabling lock debugging due to kernel taint [ 80.610647] Kernel panic - not syncing: panic_on_warn set ... [ 80.610647] [ 80.618031] CPU: 1 PID: 6215 Comm: syz-executor7 Tainted: G B 4.16.0+ #84 [ 80.626166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.635518] Call Trace: [ 80.638116] dump_stack+0x185/0x1d0 [ 80.641750] panic+0x39d/0x940 [ 80.644964] ? sha_transform+0x58ec/0x6320 [ 80.649201] kmsan_report+0x238/0x240 [ 80.653005] __msan_warning_32+0x6c/0xb0 2018/04/20 19:42:44 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 80.657067] sha_transform+0x58ec/0x6320 [ 80.661133] ? kernel_text_address+0x34d/0x3a0 [ 80.665725] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 80.671182] ? __msan_poison_alloca+0x15c/0x1d0 [ 80.675853] ? shash_ahash_finup+0x468/0xa30 [ 80.680274] crypto_sha1_finup+0x51c/0x600 [ 80.684522] ? crypto_hash_walk_first+0x210/0x380 [ 80.689365] ? shash_ahash_finup+0x5e/0xa30 [ 80.693687] ? shash_ahash_finup+0x3e8/0xa30 [ 80.698104] ? crypto_sha1_update+0x5b0/0x5b0 [ 80.702601] ? crypto_sha1_update+0x5b0/0x5b0 [ 80.707096] shash_ahash_finup+0x468/0xa30 [ 80.711339] shash_ahash_digest+0x5c6/0x600 [ 80.715665] shash_async_digest+0x11c/0x1b0 [ 80.719998] crypto_ahash_op+0x89a/0xc10 [ 80.724071] ? __kmalloc+0x23c/0x350 [ 80.727789] ? shash_async_finup+0x1b0/0x1b0 [ 80.732204] ? shash_async_finup+0x1b0/0x1b0 [ 80.736619] crypto_ahash_digest+0xe4/0x160 [ 80.740946] hash_sendpage+0xb40/0xe10 [ 80.744838] ? hash_recvmsg+0xd50/0xd50 [ 80.748815] sock_sendpage+0x1de/0x2c0 [ 80.752712] pipe_to_sendpage+0x31b/0x430 [ 80.756865] ? sock_fasync+0x2b0/0x2b0 [ 80.760765] ? propagate_umount+0x3a30/0x3a30 [ 80.765264] __splice_from_pipe+0x49a/0xf30 [ 80.769588] ? generic_splice_sendpage+0x2a0/0x2a0 [ 80.774525] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 80.779894] generic_splice_sendpage+0x1c6/0x2a0 [ 80.784660] ? iter_file_splice_write+0x1710/0x1710 [ 80.789685] ? iter_file_splice_write+0x1710/0x1710 [ 80.794705] direct_splice_actor+0x19b/0x200 [ 80.799121] splice_direct_to_actor+0x764/0x1040 [ 80.803882] ? do_splice_direct+0x540/0x540 [ 80.808208] ? security_file_permission+0x28f/0x4b0 [ 80.813231] ? rw_verify_area+0x35e/0x580 [ 80.817394] do_splice_direct+0x335/0x540 [ 80.821553] do_sendfile+0x1067/0x1e40 [ 80.825454] SYSC_sendfile64+0x1b3/0x300 [ 80.829525] SyS_sendfile64+0x64/0x90 [ 80.833328] do_syscall_64+0x309/0x430 [ 80.837220] ? SYSC_sendfile+0x320/0x320 [ 80.841288] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 80.846479] RIP: 0033:0x455379 [ 80.849749] RSP: 002b:00007f745ec43c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 80.857457] RAX: ffffffffffffffda RBX: 00007f745ec446d4 RCX: 0000000000455379 [ 80.864729] RDX: 0000000020e64ff8 RSI: 0000000000000015 RDI: 0000000000000014 [ 80.872000] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 80.879269] R10: 0000000000000044 R11: 0000000000000246 R12: 00000000ffffffff [ 80.886538] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 80.894264] Dumping ftrace buffer: [ 80.897786] (ftrace buffer empty) [ 80.901468] Kernel Offset: disabled [ 80.905072] Rebooting in 86400 seconds..