INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. 2018/04/20 14:20:36 fuzzer started 2018/04/20 14:20:36 dialing manager at 10.128.0.26:40315 2018/04/20 14:20:42 kcov=true, comps=false 2018/04/20 14:20:46 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000000)=""/65, &(0x7f0000000080)=0x41) ioctl$TIOCCBRK(r0, 0x5428) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x0, r1}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000180)={'gre0\x00', 0x8}) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x3, r1}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000200)={0x40, 0x3, 0x0, 0x3, 0x9, 0x694, 0x9, 0x3, 0x4, 0x2, 0x9, 0x43}) bind$netrom(r0, &(0x7f0000000240)=@ax25={0x3, {"632c79d208c846"}, 0x6}, 0x10) bind$nfc_llcp(r0, &(0x7f0000000280)={0x27, 0x1, 0x1, 0x6, 0x101, 0x3, "7c02921bfc195926b136518006ced8975e849c4a870b2e98689ade04400f985519ff034b5239a3e2c4098186d554249c6516d2d39c44dcc0469e466a4fbdd4", 0x25}, 0x60) r4 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0xfb04b2a, 0x400040) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000340)={0x75, 0x7, 0x9, 0x4c, 0x4, 0x4, 0x1000, 0x0, 0x2400000000000, 0x4, 0x2711, 0xe045}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='veth1_to_team\x00', 0x10) ioctl$sock_ipx_SIOCIPXNCPCONN(r4, 0x89e3, &(0x7f00000003c0)=0xfb) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000400)=0xfffffffffffffc00, 0x4) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000440)) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f0000000480)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x5a, "64438ef062b27edb96f9df5fe3ec538fe9f94c739e117f925023f63692a2001319f0692bc6e9788f5e66c428ce44a5482ad5ac7a4a437d8044f83ab6011305ebef374a515b10123e4468c8df9866c63fcccb8237958afc7cf9e0"}, &(0x7f0000000540)=0x62) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000580)=r5, 0x4) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x6, 0x3ff, 0x7fffffff, 0x2, 0x0, 0x88, 0xc002, 0x8, 0x9, 0x8, 0x3, 0x1ff, 0x3e, 0x6, 0x100, 0x5, 0x80, 0x80000000000000, 0x8139, 0x400, 0xf8, 0x9, 0x5, 0x7e12a180, 0x8, 0x2, 0x8, 0xfffffffffffffff8, 0x4, 0x1, 0xaa, 0x7, 0x0, 0x80000001, 0x5, 0xc0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000005c0), 0x2}, 0x4010, 0x5, 0x2, 0x4, 0x5, 0x1}, r1, 0x1, r4, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000680)={0x8, 0x8, 0x200, 0x895, 0x2, 0x99f, 0xb779, 0x9, r5}, 0x20) setfsgid(r3) accept$packet(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0x14) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@multicast1=0xe0000001, 0x4e20, 0x2, 0x4e21, 0x1, 0x2, 0x80, 0x20, 0xe7, r6, r2}, {0x3ff, 0x5, 0x0, 0x7, 0x4fb, 0x3, 0x8, 0x3}, {0x89c, 0x9, 0x2e, 0xc}, 0x80000000, 0x6e6bb8, 0x2, 0x1, 0x3, 0x2}, {{@in=@multicast2=0xe0000002, 0x4d6, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3506, 0x2, 0x1, 0x3ff, 0x3ff, 0x7, 0x7ff}}, 0xe8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000840)={0x4, 0x4}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000008c0)={0x9, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8, 0x2, 0x100, 0x7, 0x5, &(0x7f0000000880)='bpq0\x00', 0x3, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000940)={r5, 0x9, 0x70, 0x7f, 0x9, 0xffffffff00000000}, 0x14) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000980)=0x6, 0x4) setfsgid(r3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000009c0)={r5, 0x3}, &(0x7f0000000a00)=0x8) 2018/04/20 14:20:46 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) getdents(r0, &(0x7f0000000040)=""/212, 0xd4) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000140), 0x10) ioctl(r0, 0x1, &(0x7f0000000180)="68ea568643ece692ddc6e87e30faa349e8dbfaf78bc1294b4d9b9c371a88f56b2bcfd9a4c949bb26d9a8eaed9832cd35d322d5378738c62ae3023d6cd100c33795fbba6dcbeb9774085bdadb7565a01681ad50ad562b74e72f3825ce75cbe0b607ffdd55988fe6cd4a89f31d21d878") getpeername$ax25(r0, &(0x7f0000000200), &(0x7f0000000240)=0x10) getpeername$ax25(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) r1 = accept4$nfc_llcp(r0, 0x0, &(0x7f0000000380), 0x80800) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000003c0)={0x77359400}, 0x10) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000400)={0x55, 0x0, 0xc3ec, {0x6, 0x4}, {0x8, 0x1}, @rumble={0x8a9}}) accept4$bt_l2cap(r0, &(0x7f0000000440), &(0x7f0000000480)=0xe, 0x80000) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0xc000, 0x9) prctl$seccomp(0x16, 0x2, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x8, 0xfaa8, 0x10000, 0x7f}, {0x8738, 0xff, 0x56, 0x8}, {0x80000001, 0x5, 0x4, 0x10001}]}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000580)={0x1, 0x7}, 0x8) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x10}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000640)={'gretap0\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) socketpair$inet6(0xa, 0x1, 0x8, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000006c0)={0x200, 0x8, 0xb1, 0x1, 0x9e, 0xcb73, 0x40}, 0xc) r5 = epoll_create(0x2) sendto$ax25(r0, &(0x7f0000000700)="d48d809259849339633b620ba40a9f458cdda6db7d4e242aa626bd3a9043fc557f8c8af82ec250373d80af28bd66141aa960483a7209e1d967071b6b8ac5af6a6d4bdd83e8fd53c4f82527fc37f680db57e7a43b047000dd8414702d3f0fce491679b09d1afb1d6ffe086f61ec1fc54d36fb66767b3ad9da866c33d84271c061a07729259cb04cca211904cd8349d1c5c275b219f6", 0x95, 0x40000, &(0x7f00000007c0)={0x3, {"b8e3f0f44b3fd0"}, 0x9}, 0x10) accept4$nfc_llcp(r0, &(0x7f0000000800), &(0x7f0000000880)=0x60, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000008c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000900)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000940)={r6, 0xba, 0x30, 0x3ff, 0x5}, &(0x7f0000000980)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f00000009c0)={0x2}, 0x1) getpeername$llc(r2, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a40)=0x10) fcntl$setpipe(r0, 0x407, 0x54ab) sendto$inet6(r0, &(0x7f0000000a80)="3b40603c998613d6669af99e269d6847ae2233ef69f7c4589ccfbb7da4af3b7c7331672963d76c9b5fa028f8de4195d25a390d29c76470f6f80fe07955e7f9fcf9c8721efb8429865b41ea8a378457a54bed33a5be3b291ef6862fc8b0e7f7671d3013f91d7aadc59773", 0x6a, 0x0, &(0x7f0000000b00)={0xa, 0x4e24, 0x2, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r7 = accept4$inet6(r5, &(0x7f0000000b40)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000b80)=0x1c, 0x800) poll(&(0x7f0000000bc0)=[{r4, 0x280}, {r5, 0x200}, {r7, 0x540}], 0x3, 0x8001) socket$alg(0x26, 0x5, 0x0) 2018/04/20 14:20:46 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)=0x3) prctl$setfpexc(0xc, 0x10000) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x5, 0x4) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000100)={0x2, 0xefde, 0xc1d4}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r0, r0, 0xfffffffffffffffd, 0x1, &(0x7f0000000140)="486fb4d31b2bd9459351802fe7f0763788e50c63cabd55e226f9e1ca05c1a4191f4a60df22385b842bd6c9d479a963c7ea578b7f95cc9de2959355c04cbf89bc", 0xef9, 0x3, 0x2, 0x7, 0x0, 0x9cb, 0x800, "da829420354f6f7b96e335063e652f7fc8fb3ea6b1e5cb8f15b56ce89fd61c944016aecd3257d456e802362e2cecc06ee1b9da3ee8cef05e51c1895e646f1cffea31ca41f9f47ee8bb3d8bf3b46379d9721b971c86081539532e0813868a4164a17d6ef37557564e4aed1cb73a07e82164b954aac15caaf8b78b86ca62ce8a3a8e89c6ab3e44034fe6de72eb888f125e9e214b92cc03c8bc77082c16382a9c80683cff633065ffdcff592b8d63c36f83c7cd9b887e052088e40ba47fbbf215098f59d8c167c9db7df5"}) clone(0x2000000, &(0x7f0000000280)="499e41", &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="7449e7") ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000380)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000500)={0x4}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e23, 0x5, @loopback={0x0, 0x1}}}, 0x3, 0x6, 0x7f, 0x81, 0x54}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000640)={r1, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x4, 0xeda3, 0x9b7d, 0x2, 0x50}, &(0x7f0000000700)=0x98) sendmmsg(r0, &(0x7f0000000a00)=[{{&(0x7f0000000740)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x4, 0x200, "eae5d5bb49eba8b89070359de2391da109d44dca546ef44a86083b8cbbd003caef2d11f1fa940de64074764daccbcc0820fd60d1656a188ef5722ce27d9dc6", 0x20}, 0x80, &(0x7f0000000900)=[{&(0x7f00000007c0)="56dfbe32609a3339ea3b9270dd96f09ae92004a964950cfd42d355b4b74ee9bc3378f0c2e94990651fb7fd52d56fa830ccd22c3d", 0x34}, {&(0x7f0000000800)="b79d7e25cc46037822563686a984a02f2656ef8e45f515f0631b32ae36104c762383b2a18031", 0x26}, {&(0x7f0000000840)="b5faacdb1083845e4c0b7255e92c141a028b5bbda1db676d474d4976a3b7b1e0c3bcee582b8467ed636129f0ac78436bbebe69b2bfe9b4af4e75a007417e58cc25d4edc6cd3a1cd302f18a20917d91273580cecbcc55bd198cf8e6ca4568eba02615df455bfe5c947347652cdeca3a32a7e54484249817bcac3939265b55e08ec223539a8ec6cd1f718139e3a2694848dffb03f7af7e35cd2f865ccabebd7b5d21a314bfd4fb6db82b509464f908ce33ba6d", 0xb2}], 0x3, &(0x7f0000000940)=[{0x50, 0x113, 0x30000, "9a0ef9c7ff592f46e4fd49fca603bab3944d43e8c0dcb4326c105d00a73602725e53b3d54c8d1e5212b610753f8d9521806eb700786f7fd8a4"}, {0x60, 0x1ff, 0x2384, "be2539108fd259315ad043eb147f99fed421d4b4204c5fdb71eddb70e66b0a0aa214ced503bbbdb66a433a9dd57ee7121d2e75a2d5f10712ed60ac605477a30c2faa128a379b09e552305a66aa7268b4"}], 0xb0, 0x8000}}], 0x1, 0x20000000) epoll_pwait(r0, &(0x7f0000000a40)=[{}, {}, {}, {}], 0x4, 0x0, &(0x7f0000000a80)={0x3}, 0x8) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000b40)={0x9, 0x10000, 0x9}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000b80)={r1, 0x4, 0x7, [0x2, 0x6, 0x10001, 0xfffffffffffffffc, 0x0, 0x9, 0xeb7]}, &(0x7f0000000bc0)=0x16) ioctl$TIOCSTI(r0, 0x5412, 0x3) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000c00)) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000c40)=0x5, 0x1) accept4$packet(r0, 0x0, &(0x7f0000000c80), 0x80000) ioctl$VT_DISALLOCATE(r0, 0x5608) utimensat(r0, &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={{}, {0x77359400}}, 0x100) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d80)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x28, r2, 0x0, 0x70bd29, 0x25dfdbfb, {0xb}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000e80)={0x6a6, 0xb4a5, 0x3, 0xf9}, 0x6) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000ec0)=0x9, 0x4) 2018/04/20 14:20:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="4ba35221b799a09c18f806742014733694c23ae86360195817af744c085fc78b951192896241f1cf2d254b82ec24e92f781ac2eae45c4252b80b521e4f54a56522c070ffed1cba0f1459a7a4d4e98eb39c7f70d0fcf43f7068cc34a4d0671c8e0b4c83935c14d02cb9b4a375aadd92430216d3a12331dc97a819ff43857a90bac54668073a277000513d101436c519ede3578da6cfb206be612f730528e4103d82", 0xa1, 0x800}], 0x80000, &(0x7f0000000180)={[{@jqfmt_vfsv0='jqfmt=vfsv0', 0x2c}, {@test_dummy_encryption='test_dummy_encryption', 0x2c}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00000001c0)=@sco={0x1f, {0xfffffffffffffffc, 0x9, 0x3, 0x7, 0x7, 0x6}}, 0x80) r1 = socket(0x9, 0x1, 0x4fc) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280)={0x0, &(0x7f0000000240)}, 0x10) fcntl$getflags(r1, 0x1) getrlimit(0x3, &(0x7f00000002c0)) umount2(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x17}, 0x9}}, 0x6, 0x9, 0x3, "74211c9f664c57f322bba8e3ec5a296f4c65a3b2342020ff0b22ab272295a127588094954fc9a7438a87d6e07ad32fcbab54e00aa15923ec5acb18cb61b1462b9ea08b22f921c65299c3afeda30d3dee"}, 0xd8) shutdown(r0, 0x1) r2 = accept$packet(r1, &(0x7f0000003400)={0x0, 0x0, 0x0}, &(0x7f0000003440)=0x14) sendto$packet(r1, &(0x7f0000000440)="b552d2b282b89fc5572d79859d4a33b9f87ff861d9a4ac888165d4fee48e28c10ab0a0ca3ae8eb308c806c1f37e560b2cbade053d2b74e5cc270c46e7268ed445d45dd256bfba8d7c7a7a60ff8f46426d358ee4cd2a21fdfad16293b14638bf98155a6ef831565ad194e4c409b4217b0bf0d5f146a052f05b4a905296db2f28de28c351eba8711ecaa485a7502b3ff020939529977fabc3a7a6945827a7598d66234c3b062d59e9e99", 0xa9, 0x0, &(0x7f0000003480)={0x11, 0x0, r3, 0x1, 0x28000000000, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x21}}, 0x14) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000034c0)=0x9, 0x4) fsetxattr(r2, &(0x7f0000003500)=@known='security.evm\x00', &(0x7f0000003540)='jqfmt=vfsv0', 0xb, 0x1) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) fstat(r2, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() r8 = getegid() r9 = gettid() fcntl$getownex(r0, 0x10, &(0x7f00000036c0)={0x0, 0x0}) shmctl$IPC_SET(r4, 0x1, &(0x7f0000003700)={{0x401, r5, r6, r7, r8, 0x1, 0xffffffff}, 0x2, 0xd8, 0xfff, 0xffffffffffff6a6c, r9, r10, 0x7}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000003780)={@local={0xfe, 0x80, [], 0xaa}, 0x97f, 0x2, 0x2, 0xf, 0x3, 0x4, 0xffffffffffffffe0}, &(0x7f00000037c0)=0x20) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000003800)=""/205, &(0x7f0000003900)=0xcd) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000003940)={0x1, 0x101}, 0x8) mount(&(0x7f0000003980)='./file1\x00', &(0x7f00000039c0)='./file0\x00', &(0x7f0000003a00)='omfs\x00', 0x400, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003a80)={&(0x7f0000003a40)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000003ac0)={'filter\x00'}, &(0x7f0000003b40)=0x78) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000003b80)=0x1f, 0x4) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000003bc0)=""/238) 2018/04/20 14:20:46 executing program 3: set_thread_area(&(0x7f0000000000)={0x91b, 0x20001000, 0x400, 0x8, 0x0, 0x200, 0x1, 0x9, 0x6, 0x5}) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3ff, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x6, 0x89}, 0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000200)='sched\x00') ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000240)={0xfffffffffffffffc, 0x7, 0x3, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}, 'nr0\x00'}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000280)={r1, 0xa7, "703fb57834e2d1c28f11fa290b37d42fc3c500b2fcfa70d34e234442ea11d9bb290b6b902db8398ffe23039cd6cd1ec97401a8a03e2d6ab9cd0e867d7da1f23ba6e7ac6c29866ffa58ee933d8cf546c538e1c996c787f3b1581f02132958a1709c8c5b6093d680eb759bbd8d70f6aa7465a476f4eab9b44fc813e15daad785a706a9ddf081911d2eb0aa9578b1450dfe2a6995e431f76b9d866f6bd99276f5bef5ac14c840eedd"}, &(0x7f0000000340)=0xaf) readahead(r3, 0x8, 0xfffffffffffff710) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000380)={'filter\x00', 0x4}, 0x68) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000400)) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@dev={0xfe, 0x80, [], 0x21}, 0x45, r4}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000580)=0x1000, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0, r3}) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000600)={r1, 0x8, 0x2, [0x3, 0x9]}, 0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000640)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r6, 0x84, 0x79, &(0x7f00000006c0)=0x7fffffff, 0x4) setitimer(0x2, &(0x7f0000000700)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000740)=0x6, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x200, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x8202, 0x0) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000800)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0xc}, 0x20, 0x101, 0x9, 0x400, 0x9c3, 0x1200014, r4}) accept$unix(r3, &(0x7f0000000880), &(0x7f0000000900)=0x6e) openat$dir(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', 0xa0041, 0x950148e0be5f2189) r7 = msgget(0x1, 0x346) msgsnd(r7, &(0x7f0000000980)={0x3, "2f0808d24144cb85a982b6e62ca7c08bc8ef95cc2a16049e9d0b10ed4b3d2b1b1966c6a9caa2b3c732c6c410d851033f9f735db27f7fce002157fd2f951da39f3a3e1040a34266006c62b3fa64fe8a4504d17e83a83f14f60bdb138b22bd33ffa505b8797277867cc4df8195085fc3c0fe3117dae5b1aa2b343a2560696cb96e6b99344bcad78e16a40f252cfa99a653aade292b0955a59436f30ff12d1d93492a4194"}, 0xab, 0x800) 2018/04/20 14:20:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000400), &(0x7f0000000440)=0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000480)={0x0, 0x1, 0xfffffffffffffffe, 0x1000, 0x400}, 0xc) r1 = accept4$unix(r0, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e, 0x800) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000580)) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f00000005c0)=0x5, 0x4) ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f0000000600)) ioctl$TIOCNXCL(r0, 0x540d) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000640)=0xffffffffffffffff, 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)=0x0) r3 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000006c0)={@mcast2}, &(0x7f0000000700)=0x14) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000740)=0x10000, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000780)={0x0, 0x7636, 0x6}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000800)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000840)=0x20) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000880)={r4, @in6={{0xa, 0x4e24, 0x100, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffb85c}}}, 0x84) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000940)=r2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000980)={0xa3d, 0x7fff, 0x4}) ioctl$sock_ifreq(r1, 0x89b0, &(0x7f00000009c0)={'team0\x00', @ifru_map={0x9, 0xffff, 0x10001, 0x2, 0x8, 0xb0e}}) lseek(r3, 0x2, 0x3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f0000000a00)={0x10}) preadv(r3, &(0x7f0000000dc0)=[{&(0x7f0000000a40)=""/4, 0x4}, {&(0x7f0000000a80)=""/223, 0xdf}, {&(0x7f0000000b80)=""/65, 0x41}, {&(0x7f0000000c00)=""/115, 0x73}, {&(0x7f0000000c80)=""/11, 0xb}, {&(0x7f0000000cc0)=""/27, 0x1b}, {&(0x7f0000000d00)=""/152, 0x98}], 0x7, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000e40)={'ip6tnl0\x00', 0x1000}) r5 = semget(0x3, 0x3, 0x10) semctl$SEM_STAT(r5, 0x1, 0x12, &(0x7f0000000e80)=""/174) getpeername(r1, &(0x7f0000000f40)=@pppoe={0x0, 0x0, {0x0, @remote}}, &(0x7f0000000fc0)=0x80) socket$inet6(0xa, 0x5, 0x5) seccomp(0x0, 0x0, &(0x7f0000001040)={0x3, &(0x7f0000001000)=[{0x3, 0x10001, 0x8001, 0xff}, {0x50, 0x8000, 0xffffffffffffffff, 0x1ff}, {0x7, 0x0, 0x20, 0x7}]}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000001080)={'filter\x00'}, &(0x7f0000001100)=0x78) prctl$getname(0x10, &(0x7f0000001140)=""/131) 2018/04/20 14:20:46 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x1, 0xffffffffffffff22}, 0x50}, 0x10) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000180)="b30453e61421b5ecdc0df4036425a11aee112c6f8821e041155628efa749bc1e34757a6e5e37df69e8b446167b80c01eaf805abba92c4c6e7d1c9dce6aa4a9c63f", 0x41, 0xfffffffffffffff8) keyctl$negate(0xd, r1, 0x1, r2) read(r0, &(0x7f0000000200)=""/154, 0x9a) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000340)='keyring\x00', r3) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000400)={'filter\x00', 0x1000, "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"}, &(0x7f0000001440)=0x1024) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000001480)=0x30) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000001500)=&(0x7f00000014c0)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001540), &(0x7f0000001580)=0x4) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xd5b1) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000015c0)=""/218, &(0x7f00000016c0)=0xda) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001700)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000001740)=r4) sync() ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000001780)=""/157) getsockopt$sock_int(r0, 0x1, 0x1f, &(0x7f0000001840), &(0x7f0000001880)=0x4) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000018c0)=0x1, 0x4) get_thread_area(&(0x7f0000001900)={0x9, 0x0, 0x1000, 0x5, 0x8, 0x101, 0x0, 0xdb6b, 0x7f, 0xbb81}) get_thread_area(&(0x7f0000001940)={0x0, 0x0, 0x0, 0x7, 0x6, 0x4, 0xd6, 0x3, 0x7}) r5 = accept4$inet(r0, &(0x7f0000001980)={0x0, 0x0, @local}, &(0x7f00000019c0)=0x10, 0x800) listen(r5, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000001a00)={0x80, @tick=0x9f8, 0x5, {0x1, 0x8}, 0x3ff, 0x2, 0x401}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000001a80), &(0x7f0000001ac0)=0x4) sendmsg$nl_generic(r0, &(0x7f0000001cc0)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b40)={0x138, 0x35, 0x120, 0x70bd28, 0x25dfdbfc, {}, [@generic="123c9fe9f48914eb35ec97d410f0412bff32e312c2621c4605a65c5685f091f8e1b51ad73f8428c7e969595b23", @nested={0xc, 0x70, [@typed={0x8, 0x16, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}]}, @typed={0x4, 0x6b}, @nested={0xe4, 0x69, [@generic="5e6c7092e52dfe1c2996744a095036885927c8f7b1dcb496b8f9b63cbfd0e9c9d635776fc1380b1e597e7a4e24f99c29f4bdcd779058a3478c46e729313923d6a0611e0daf15c00dea73da41bd18cebdd8805f52dc6157716cb3c80ee7f764755ba9c5a24bc59cf68829767dc64f677d45299bf39b11f1b3081f9ef1b422df4c99d82d882115635b48ea2ff03749deef64bd5e7f9a2222a480c87de1a4e3887083782412efea9a390567b6ee40fb05f0cbebd8b9f76f389e3bcd377f6629e9f3f10352afb380f3a46bd78650de5eb21116efe518d35200bebf7d497bfc9f4f"]}]}, 0x138}, 0x1, 0x0, 0x0, 0x4}, 0x4000080) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001dc0)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001ec0)=0xe8) setreuid(r6, r7) 2018/04/20 14:20:46 executing program 5: syz_emit_ethernet(0xfa, &(0x7f0000000000)={@random="b71295854eca", @random="45a2a6991192", [], {@x25={0x805, {0x2, 0x400, 0xb, "f5ac5bc4062e082884e43c635982a0a3ed71f6908464ac48988e64de19f3000b78d320de60bbd91944266f9b01588275f2da0bd9dcdac08dc69d129c32645db2987f9df300bd08375fa8bf18ee14458b66216404d8a48f5d6289b92bb9b9f9f77c87a8a66771ad6bfda9c61bcc4a2e07cf95153a151171eb5d4e4aa580fbdd9ef0f6afc9063317f72bb784afa51c6f172c05e97408e420ea5ed2b0f51235b46931305633c4386b3087d416cf26d6e05e632ac282e8261a3df8d960be906a2ce1da1cae481177c1a79a952a7178f3a917b55f23ae85634fd517606e1aea5df7a265266f1e1769995765"}}}}, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r1, &(0x7f00000001c0)=@random={'trusted.', '/proc/sys/net/ipv4/vs/sloppy_tcp\x00'}) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000200)=0x7f, 0x7, 0x2) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000240)=0x5) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000280), 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x10001}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={r3, 0x9, 0x10}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e24, 0xaf, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}, 0x1ff, 0x9, 0x10000, 0xffffffff, 0x1}, 0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000480)={r3, 0x1}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x963, 0xe2d, 0x4, 0xffff, 0x9, 0x8, 0x50ae0114, 0x2, r3}, &(0x7f0000000540)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000580)={r5, @in={{0x2, 0x4e21, @rand_addr=0x2f}}, 0x8, 0x80000000000000}, &(0x7f0000000640)=0x90) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000680)={0x20, 0x1f, 0x4, 0x7f, 0x1, 0x6}) socket$inet_sctp(0x2, 0x5, 0x84) renameat(r0, &(0x7f00000006c0)='./file0\x00', r0, &(0x7f0000000700)='./file0\x00') ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000740)={'veth0_to_bridge\x00', {0x2, 0x4e24, @multicast1=0xe0000001}}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000780)=[@in6={0xa, 0x4e20, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x800000000000}, @in6={0xa, 0x4e21, 0x2000200000, @dev={0xfe, 0x80, [], 0x1c}, 0x200}, @in6={0xa, 0x4e21, 0xff, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e23, 0xe1, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x7f}, @in6={0xa, 0x4e21, 0x7, @empty, 0xa6}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x11}}, 0x3}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in={0x2, 0x4e24, @rand_addr=0x9}], 0xd8) connect$ipx(r1, &(0x7f0000000880)={0x4, 0xfff, 0xffff, "41fa6c4da2b7", 0x4}, 0x10) bind$inet6(r0, &(0x7f00000008c0)={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0xc}, 0xf2}, 0x1c) r6 = accept4$llc(r0, 0x0, &(0x7f0000000900), 0x80000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000c00)={0x4, &(0x7f0000000980)=[{}, {}, {}, {}]}) setsockopt$inet_dccp_buf(r7, 0x21, 0x0, &(0x7f0000000c40)="3d1fef1a4d82558aae533cd58e29592e91532f330c7813c99037eba7abefd0cda937fc9d5f7b6bf797830a683335c42dc7a86369864c73246692b0e6daca6bc9ec1537505b43792b97a69844caffaab3c0e75a92625d1c56362379cbe0c6cedf8cd3c05476225f586e5842a27b15804fc475963786eea213afc28a418bf7c914f5ecbfe46774f5b235e9c2002711eb82613fc6a83626bdf6924cb284f2523c65a205acf56c9e9bfbcf49d8354f6d74b4b9f41fb59aa9c56bcccbd3995344e343ac0e951d4b8377bbb4495fbcabe37dbbd4b1e50a776fdb5bb8a7306ca166bfd48712d3406f8fdb4e500becfbce50188407a7aa7466a3", 0xf6) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000d40)=0x0) r9 = fcntl$getown(r6, 0x9) tgkill(r8, r9, 0xd) utimes(&(0x7f0000000d80)='./file0/file0\x00', &(0x7f0000000dc0)={{0x0, 0x2710}, {0x77359400}}) syzkaller login: [ 43.971686] ip (3770) used greatest stack depth: 54656 bytes left [ 44.445864] ip (3815) used greatest stack depth: 54408 bytes left [ 45.374922] ip (3905) used greatest stack depth: 54200 bytes left [ 45.663089] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.669652] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.705509] device bridge_slave_0 entered promiscuous mode [ 45.877127] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.883701] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.936086] device bridge_slave_1 entered promiscuous mode [ 45.945863] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.952360] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.970977] device bridge_slave_0 entered promiscuous mode [ 45.979393] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.985990] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.005371] device bridge_slave_0 entered promiscuous mode [ 46.030746] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.037254] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.059746] device bridge_slave_0 entered promiscuous mode [ 46.079358] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.085876] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.106979] device bridge_slave_0 entered promiscuous mode [ 46.123081] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.129583] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.142930] device bridge_slave_1 entered promiscuous mode [ 46.159357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.166612] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.173159] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.200982] device bridge_slave_0 entered promiscuous mode [ 46.215416] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.221967] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.243336] device bridge_slave_0 entered promiscuous mode [ 46.254820] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.261343] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.279150] device bridge_slave_1 entered promiscuous mode [ 46.299080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.307166] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.313649] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.340498] device bridge_slave_1 entered promiscuous mode [ 46.347653] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.354177] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.377986] device bridge_slave_1 entered promiscuous mode [ 46.392310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.399536] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.406115] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.429754] device bridge_slave_0 entered promiscuous mode [ 46.440919] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.447421] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.481478] device bridge_slave_1 entered promiscuous mode [ 46.497294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.507401] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.513944] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.523684] device bridge_slave_1 entered promiscuous mode [ 46.532514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.554958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.562721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.582158] ip (3977) used greatest stack depth: 53960 bytes left [ 46.671464] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.678120] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.712540] device bridge_slave_1 entered promiscuous mode [ 46.723694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.735095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.746701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.766903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.788514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.918109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.928581] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.994665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.094627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.361930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.562735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.572805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.678878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.734843] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.840811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.895340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.949078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.956388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.969066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.023798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.077376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.181561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.191074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.199261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.399115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.582090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.722650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.794512] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.936759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.969849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.020706] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.029010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.042790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.120249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.145860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.167117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.175166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.193658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.237249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.245659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.266490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.273832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.284085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.329089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.351413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.376728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.430465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.437703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.451859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.493556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.506374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.515691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.526269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.533508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.542383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.573854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.583556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.598830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.648484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.655917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.663835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.693773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.726272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.745718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.772318] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.786958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.805268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.824889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.832959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.842434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.859898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.880430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.888610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.901214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.938375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.950721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.965802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.979185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.986398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.005276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.039568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.056811] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.070503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.126840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.159645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.197790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.248517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.255771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.266738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.089863] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.096437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.103419] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.109982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.155101] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.161756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.181166] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.187668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.194524] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.201080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.231263] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.241222] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.247735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.254544] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.261718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.270547] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.293917] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.300450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.307364] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.313864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.393669] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.464724] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.471272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.478224] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.484756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.556249] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.566203] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.572728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.579774] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.586262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.595133] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.624775] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.631307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.638228] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.644740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.725966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.735844] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.742365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.749301] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.755809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.782312] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.216157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.226802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.277545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.310308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.342632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.360666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.369954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.692580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.734381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.874932] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.951934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.254445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.400869] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.491931] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.498259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.513703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.564170] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.578504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.606667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.652124] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.699671] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.705963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.722725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.775517] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.783433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.790417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.801646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.167943] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.174304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.183721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.304787] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.311157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.328729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.462400] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.468781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.479896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.618960] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.625472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.642837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 14:21:13 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x1}, 0x10) 2018/04/20 14:21:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x6e6bbf, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@dev={0xac, 0x14, 0x14}, @in6=@remote={0xfe, 0x80, [], 0xbb}}}]}, 0x50}, 0x1}, 0x0) 2018/04/20 14:21:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000001640)=""/176, 0xb0}], 0x3, 0x0) 2018/04/20 14:21:14 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000280)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f00000002c0)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8001}], 0x0, &(0x7f0000000580)=ANY=[]) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './bus', [], 0xa}, 0x9) 2018/04/20 14:21:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f2060000000000000008a230e7a657f9cc6e", 0x14) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001480)="097ad7932fdcf79034fae8f23a5b6b36", 0x10}], 0x1, &(0x7f0000000100)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/20 14:21:14 executing program 1: r0 = mq_open(&(0x7f0000000100)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/154, 0x9a) 2018/04/20 14:21:14 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x80000000000ff}}) 2018/04/20 14:21:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000033816)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000034000)={0x77359400}) 2018/04/20 14:21:14 executing program 2: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b80)}, 0x20004040) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d4028611b26bdc4d928dcbf3943431978d4c7055a6fa9883853c9751f881f516ea9220ff6894bd5fe5aedc36a99327c26bf555153014a529e20214fe210154"}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000018c0)}, 0x0) 2018/04/20 14:21:14 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/20 14:21:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) write(r2, &(0x7f0000000280)="e0773d61bfe5d25f67704bee", 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r3, &(0x7f0000000440), 0x0, 0x44000, &(0x7f00000004c0)=@abs, 0x6e) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000240)=0x5, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 2018/04/20 14:21:14 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000200)=@l2={0x1f}, 0x80, &(0x7f0000000080)=[{&(0x7f0000001340)}], 0x1, &(0x7f00000014c0)=[{0xbc, 0x11f, 0xd48a, "dd09e7a8d97191f62b58b8bffa5a37703a962f5972b9aeb46e5992da67dbfe29828214d185bc3ca7082f9f2e46ce50ce71ec7b99915d44ad4a40d107e60837947e8a14da8b9bd63e8f3c430f7f478f72c109ac47391df4d50ac305176cd41406144afdde08f910fdab21723b936b23a363c187c1a418839cfefe5aa35b940f4e6531133dda9fbf86e9467c68a5c61b298eb45e7813b75a39f2077ce0dcb12d134c3f8c34c8c81bb7fccdd2c99178c93e"}], 0xbc, 0x4008810}, 0x1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6c6f0000ffffff9f0000ddff00"}) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x1) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000180)=@srh={0x8f, 0x6, 0x4, 0x3, 0x0, 0x200, 0x5, [@mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @remote={0xfe, 0x80, [], 0xbb}]}, 0x38) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/20 14:21:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) [ 69.956067] ================================================================== [ 69.963521] BUG: KMSAN: uninit-value in gcmaes_decrypt+0x2ec/0xea0 [ 69.969855] CPU: 0 PID: 5821 Comm: syz-executor3 Not tainted 4.16.0+ #84 [ 69.976701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.986067] Call Trace: [ 69.988673] dump_stack+0x185/0x1d0 [ 69.992403] ? gcmaes_decrypt+0x2ec/0xea0 [ 69.996564] kmsan_report+0x142/0x240 [ 70.000389] __msan_warning_32+0x6c/0xb0 [ 70.004456] gcmaes_decrypt+0x2ec/0xea0 [ 70.008431] generic_gcmaes_decrypt+0x181/0x1e0 [ 70.013094] ? generic_gcmaes_encrypt+0x1e0/0x1e0 [ 70.017926] gcmaes_wrapper_decrypt+0x2f5/0x340 [ 70.022592] ? gcmaes_wrapper_encrypt+0x2d0/0x2d0 [ 70.027427] crypto_rfc4543_crypt+0xaec/0xb40 [ 70.031915] ? crypto_has_alg+0x280/0x280 [ 70.036062] crypto_rfc4543_decrypt+0x47/0x50 [ 70.040550] ? crypto_rfc4543_encrypt+0x60/0x60 [ 70.045211] aead_recvmsg+0x25b5/0x2960 [ 70.049210] sock_recvmsg+0x1d0/0x230 [ 70.053000] ? aead_sendmsg+0x1b0/0x1b0 [ 70.056968] ___sys_recvmsg+0x3fb/0x810 [ 70.060941] ? __fget_light+0x56/0x710 [ 70.064818] ? __fdget+0x4e/0x60 [ 70.068181] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 70.073549] ? __fget_light+0x6b9/0x710 [ 70.077528] SYSC_recvmsg+0x298/0x3c0 [ 70.081333] SyS_recvmsg+0x54/0x80 [ 70.084863] do_syscall_64+0x309/0x430 [ 70.088751] ? ___sys_recvmsg+0x810/0x810 [ 70.092900] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 70.098087] RIP: 0033:0x455379 [ 70.101268] RSP: 002b:00007f88509fac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 70.108970] RAX: ffffffffffffffda RBX: 00007f88509fb6d4 RCX: 0000000000455379 [ 70.116233] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000014 [ 70.123495] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 70.130759] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 70.138025] R13: 000000000000049f R14: 00000000006f9f88 R15: 0000000000000000 [ 70.145299] [ 70.146912] Uninit was created at: [ 70.150450] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 70.155546] kmsan_kmalloc+0x94/0x100 [ 70.159336] __kmalloc+0x23c/0x350 [ 70.162866] sock_kmalloc+0x14e/0x270 [ 70.166661] af_alg_alloc_areq+0x85/0x320 [ 70.170803] aead_recvmsg+0x65a/0x2960 [ 70.174686] sock_recvmsg+0x1d0/0x230 [ 70.178485] ___sys_recvmsg+0x3fb/0x810 [ 70.182461] SYSC_recvmsg+0x298/0x3c0 [ 70.186264] SyS_recvmsg+0x54/0x80 [ 70.190229] do_syscall_64+0x309/0x430 [ 70.194110] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 70.199282] ================================================================== [ 70.206627] Disabling lock debugging due to kernel taint [ 70.212066] Kernel panic - not syncing: panic_on_warn set ... [ 70.212066] [ 70.219445] CPU: 0 PID: 5821 Comm: syz-executor3 Tainted: G B 4.16.0+ #84 [ 70.227577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.236923] Call Trace: [ 70.239515] dump_stack+0x185/0x1d0 [ 70.243134] panic+0x39d/0x940 [ 70.246333] ? gcmaes_decrypt+0x2ec/0xea0 [ 70.250472] kmsan_report+0x238/0x240 [ 70.254270] __msan_warning_32+0x6c/0xb0 [ 70.259114] gcmaes_decrypt+0x2ec/0xea0 [ 70.263095] generic_gcmaes_decrypt+0x181/0x1e0 [ 70.267755] ? generic_gcmaes_encrypt+0x1e0/0x1e0 [ 70.272590] gcmaes_wrapper_decrypt+0x2f5/0x340 [ 70.277261] ? gcmaes_wrapper_encrypt+0x2d0/0x2d0 [ 70.282115] crypto_rfc4543_crypt+0xaec/0xb40 [ 70.286612] ? crypto_has_alg+0x280/0x280 [ 70.290756] crypto_rfc4543_decrypt+0x47/0x50 [ 70.295254] ? crypto_rfc4543_encrypt+0x60/0x60 [ 70.299920] aead_recvmsg+0x25b5/0x2960 [ 70.303900] sock_recvmsg+0x1d0/0x230 [ 70.307697] ? aead_sendmsg+0x1b0/0x1b0 [ 70.311667] ___sys_recvmsg+0x3fb/0x810 [ 70.315638] ? __fget_light+0x56/0x710 [ 70.319517] ? __fdget+0x4e/0x60 [ 70.322876] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 70.328231] ? __fget_light+0x6b9/0x710 [ 70.332206] SYSC_recvmsg+0x298/0x3c0 [ 70.336006] SyS_recvmsg+0x54/0x80 [ 70.339544] do_syscall_64+0x309/0x430 [ 70.343422] ? ___sys_recvmsg+0x810/0x810 [ 70.347565] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 70.352749] RIP: 0033:0x455379 [ 70.355926] RSP: 002b:00007f88509fac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 70.363624] RAX: ffffffffffffffda RBX: 00007f88509fb6d4 RCX: 0000000000455379 [ 70.370886] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000014 [ 70.378146] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 70.385405] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 70.392661] R13: 000000000000049f R14: 00000000006f9f88 R15: 0000000000000000 [ 70.400439] Dumping ftrace buffer: [ 70.403969] (ftrace buffer empty) [ 70.407655] Kernel Offset: disabled [ 70.411260] Rebooting in 86400 seconds..