[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 29.567134] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.419384] random: sshd: uninitialized urandom read (32 bytes read) [ 31.831885] random: sshd: uninitialized urandom read (32 bytes read) [ 33.122661] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.18' (ECDSA) to the list of known hosts. [ 38.664373] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/24 11:13:56 fuzzer started 2018/05/24 11:13:57 dialing manager at 10.128.0.26:46257 [ 62.457260] can: request_module (can-proto-0) failed. [ 62.468188] can: request_module (can-proto-0) failed. 2018/05/24 11:14:22 kcov=true, comps=false 2018/05/24 11:14:28 executing program 0: socketpair$inet(0x2, 0xf, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x1}, 0x8) r3 = socket$inet_dccp(0x2, 0x6, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext4\x00', 0x800008, &(0x7f00000001c0)="de20165c276f20e83cc96d90ec2d1a4f65720da68f90c2fd63577dbf0507c48a01051eb54f0b486e57814c79ad0e84b4282152d7566b7456452c670c13474fe520ab5490c72a356406e89964e2b70114d30e0c28e6c641d741d53dc18ac2a24da2f6acffa607986a0b7c3460554bfb11d1bf533096aebedcc72c717b76ca6579") msgget$private(0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xc, 0x10, r3, 0x0) r4 = accept4(r3, 0x0, &(0x7f0000000240), 0x80800) r5 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x8, 0x20000) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r6 = request_key(&(0x7f0000000340)='rxrpc\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000003c0)='/dev/admmidi#\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440)='ext4\x00') ioctl$DRM_IOCTL_SET_VERSION(r5, 0xc0106407, &(0x7f0000000480)={0x6ad, 0x7, 0x1}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000500)={'filter\x00', 0xc9, "8f9556f2eea955f92e96a08ae4692dd712eab373b45bf2e967926f2af2bcbf6afa7295c352fb031171bc53ceba1f0562f2d49533b5a8500ebb16c036711ced612835bfc84c00b8b24264aae94d310a0142376c5d1e4dda866edb003a2aa7dc7a3765ede3026f9851f99bd54076d35723f6d46ef50f33c6d51e662eb193314b70fe03f6bd096570418f4e4f21c932fe687b28018140e4a9888a1c5eb6cbb923bd9f31e9804b595a22ca8f843c015f1149cf7d84090d380c8e2dd2150e5ae6d85d300594942e77a30a4e"}, &(0x7f0000000600)=0xed) getsockname$inet(r1, &(0x7f0000000640)={0x0, 0x0, @rand_addr}, &(0x7f0000000680)=0x10) recvfrom$inet6(r7, &(0x7f00000006c0)=""/166, 0xa6, 0x2000, &(0x7f0000000780)={0xa, 0x4e22, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0xd8c}, 0x1c) ioctl$sock_ifreq(r8, 0x8923, &(0x7f0000000800)={'nr0\x00', @ifru_settings={0x80, 0xeda0, @fr=&(0x7f00000007c0)={0xa9, 0x7, 0x6ab0bc7, 0xffffffffffffffff, 0x6, 0x7, 0x8}}}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r5, 0x80605414, &(0x7f0000000840)=""/243) r9 = semget(0x0, 0x6, 0x2) semctl$IPC_STAT(r9, 0x0, 0x2, &(0x7f0000000940)=""/245) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r10, 0xc08c5334, &(0x7f0000000a80)={0xff, 0x1, 0x8, 'queue0\x00', 0x80000001}) semctl$SETVAL(r9, 0x0, 0x10, &(0x7f0000000b40)=0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000b80)={{0xa, 0x4e24, 0x7, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x4}, {0xa, 0x4e23, 0x40, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x7, [0x1, 0x1, 0x2, 0xcef1, 0x1, 0x5, 0x8, 0x1]}, 0x5c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r1, 0x50, &(0x7f0000000c00)}, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r10, 0xc00c642d, &(0x7f0000000cc0)={0x0, 0x0, r10}) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f0000000d00)={0x0, 0x0, 0x9d}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000d40)={r11, r12}) 2018/05/24 11:14:28 executing program 2: r0 = semget$private(0x0, 0x2, 0x400) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/185) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0xaf, 0xffffffffffff93d1, 0x7d, "780ae641c208fef31620234b90be2bd1e3e5204d82e0ee34865f10a4bfde6834668f2c074ec11fdb87e97d4cb2a121430eeec2da3d22eafcacacf4a97418091942eae0c6e4530333e585abefe024731b2fff555cbc2f4c02e74d2b505e49ca73a76cd755aaa124f5e402519f7771b5e53a676b527bcf25b2010eaf6ff93d340e394098960c38238ec50aebf8c0bb7befb760b081c7f3fc2d5f44882f314538128585a8fe51e328eef558c4f6aaaa4b"}) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x10) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000240)=""/144) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x0, 0x128, 0x128, 0xffffffff, 0xffffffff, 0x338, 0x338, 0x338, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x8001, 0x5, 0x1}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x20, 0x0, 0x0, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x8, 0x2, 0x7}, {0x82, 0x8, 0x80}, 0x80000000, 0x4}}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x21}, 0x0, 0xffffff00, 'vcan0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x5e, 0x1, 0x2c}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xfffffffffffffffe, [0x6, 0x7, 0x7, 0x60a, 0x9, 0x7ff], 0x6a, 0x7, 0x80}, {0x1, [0x1, 0x9d2, 0x9, 0x0, 0x9, 0xd33], 0x6a83, 0xfffffffffffffffe, 0x1}}}}, {{@ip={@multicast1=0xe0000001, @multicast2=0xe0000002, 0xffffff00, 0x0, 'erspan0\x00', 'veth1_to_bond\x00', {0xff}, {0xff}, 0xfe, 0x1, 0x50}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x10000, [0x100000000, 0x5, 0xa, 0x6, 0x5, 0x9], 0x5, 0xffffffff, 0xffffffffffffdeef}, {0x3, [0x3, 0x4, 0x3f, 0x7], 0x5fe4, 0x3, 0x4}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x430) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000800)={0xc0, r3, 0x8, 0x70bd2b, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x16}}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x149dba1be795969a}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000940)={0x0, 0xd0af, 0x20, 0xfffffffffffffff9, 0x400}, &(0x7f0000000980)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000009c0)={0x1b, 0x200, 0xd1, 0x0, r4}, &(0x7f0000000a00)=0x10) getresuid(&(0x7f0000000a40), &(0x7f0000000a80)=0x0, &(0x7f0000000ac0)) getresgid(&(0x7f0000000b00)=0x0, &(0x7f0000000b40), &(0x7f0000000b80)) r8 = geteuid() r9 = getgid() semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000bc0)={{0x6, r6, r7, r8, r9, 0x180, 0x20}, 0x7, 0xfffffffffffffffc, 0x6}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/zero\x00', 0x400042, 0x0) listen(r1, 0xfffffffffffff9d0) getsockopt$inet_sctp_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000c80)=@assoc_id=r5, &(0x7f0000000cc0)=0x4) getsockopt$inet6_mreq(r10, 0x29, 0x15, &(0x7f0000001180)={@mcast2, 0x0}, &(0x7f00000011c0)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000001200)={@loopback={0x0, 0x1}, r11}, 0x14) sendmsg$alg(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001240)}, {&(0x7f0000001280)="5f0a8dfba49009c14984b19715d0c21022a791d60d4c454a6326fbee881a3b74c12f7b1ff11f78965b1150214f1f1b797438f997d154993f0de9150ceb1efaa3a085366ffe82d1", 0x47}, {&(0x7f0000001300)="df208df5a20a4b1ece99978ca899a341aa129e8a17f011606f26afbe13d1ebb51be9c757e424b009d0bad71ba243559eab52b73a317758cc54b3117617b01ab4292b064e3beb9a0fe449057089c45379858ca2d6ea68d8462b91497898dd7fc135d94b78616f3186b869068f31b181800ff8080f", 0x74}, {&(0x7f0000001380)="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", 0xfc}, {&(0x7f0000001480)="d481c0be0409f0e069085d317a16ae15ca3eb5998dbe4d5016c62f0d9014b13d64192603044d770cb4a969d144129be4fbdd1e2a", 0x34}, {&(0x7f00000014c0)="89fa5ebb2f5f928c0d3c73fb34c61aeaae2d5501a4b54dcfb59bb67de57ca653ab596dbec8437e48ab9a65901d37d6a6358a6fb81286732f184f7b9bf235f72c967e932b5e7051f88b794bc9f24c10dd1f0096f3af896684e7549b410b653c723ac43aa98e05f858d511c5647e10c86004a6dc42a780ecfc399544d04d90ddb6757d030212d49a8a869b5c7afa64c4b2925d46414068adb7320558abf8c10d501a", 0xa1}, {&(0x7f0000001580)="f373386c943bbdff7fc92185152744c13b96b9fab971a4bf8a43ad50e98ba7d4a976d888d2f260ab5e922810bc81fc79c3e9e51034545d58848a9079dc259323bfa609833151df8d230a094d9f356501307b59399763ed28ff280b4d0abd01d10822ef5de7e9864cd42449bcc51a21d8de7d6438de046faba581ed302179dfded6", 0x81}, {&(0x7f0000001640)="ad56ded897f4571d59ed7c8271c13fd45d207fdaebe81d1ff256d8a845d8824115a070a160241aee3c3c13a7d2fc463c056aa50cbcd555aacc50df00b61d99b85906e801e685e3e3980a31a1e715b1c97d6f83ef5c82d3c39ff592c4cab53154b72631ca3c1f31f0a5359f1e8ce32fc4663d45bb7138ca0098c4abd27187263e400fb0e7615f4801c6d3b532b1a7b45ec67d4558db05ba2e809be8a8a2bd76fcddbf3c31cfa8d7231582a74456824712d609f4", 0xb3}, {&(0x7f0000001700)="e0a826c94f8a2ce0d0207fc8f67186e1e19743d94fc4d9f972162e5822362e092972b0310f8f2087da0aa8d53b4ba21208b67a0a4c45c236ff7f5758a6a137b806be310ca56df255a205ea60b012d8f06c6486f62001e3e73c07fbca5c6ba9164c8de5dba63e9348a0cfcfe90f5de4f312ec216c6a628d52afaac753b0846b7f7f4e978fc5377163015bd9c813a71908f09b6f947a7d34015b", 0x99}, {&(0x7f00000017c0)="870fa19e7fcb01893744649f60af583012290ae97f7abaaa6ad47f017ddd3ca484d076ac662e54281c3cb4324aea5381bdf1b690856485dbdeb7c542c621108cc327634b296dc484740197f0db40adadb79c8e0bbc5a16828e8441c5ea4a3e62f9175481011c38b4da8a00ab476857e19d5da4507293446cd95cadd06e2038ce37fafbca32d9a2a493f47a45cd6dab83c393df35aed24af7c65854515c1e94046147df0a2c55b6076496f4196cacd808294b064c954b2ecfee8ea1e7b63e88151fb40e6a5d7bfcdd631cb425a28d458b2c1c3cf9cd2055da84110b3fc3c4f908664dfd86e41b", 0xe6}], 0xa, &(0x7f0000001980)=[@assoc={0x18, 0x117, 0x4, 0xe9e1}, @op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4, 0x1ff}, @iv={0x80, 0x117, 0x2, 0x66, "94b8cd8253bf8adecb910e5a5c0a820f803d66e83993d7e85a76b3c6d5619f84b5509203f5d19c99ac00437dc5daff1e5144f472d6d1801d916530e4862f912658eb63fe7365da0e512bbdb87b5f5fd96a93ab294ad00c515d8fa6a37f058d0a2a1c3a8bea8e"}, @assoc={0x18, 0x117, 0x4, 0xb}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x8000}, @assoc={0x18, 0x117, 0x4}], 0x140, 0x4000}, 0x40000) close(r2) r12 = creat(&(0x7f0000001b00)='./file0\x00', 0x80) ioctl$TIOCSSOFTCAR(r12, 0x541a, &(0x7f0000001b40)=0x2a5de4b3) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000001b80)={{{@in, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001c80)=0xe8) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001cc0)='/dev/ptmx\x00', 0x20200, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r12, 0x29, 0x20, &(0x7f0000001d00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0xffffffff, 0x2, 0xff, 0x8, 0xcd7, 0xe4, 0x40}, 0x20) r14 = fcntl$getown(r12, 0x9) fcntl$setown(r13, 0x8, r14) 2018/05/24 11:14:28 executing program 7: r0 = gettid() ptrace$getsig(0x4202, r0, 0xff, &(0x7f0000000000)) msgget(0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x140, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x1, @loopback={0x0, 0x1}, 0xc4}}, [0x9d04, 0x6, 0x433, 0x9, 0x0, 0x352e84e0, 0x4, 0x7fff, 0x30, 0xfffffffffffff599, 0x97, 0xffffffffffff248e, 0x60e, 0x4, 0x8000000000000]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x7fff, 0x1, [0x1]}, 0xa) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000200)=""/17, 0x11}, &(0x7f0000000240), 0x40}, 0x20) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000002c0)={0x7, 0x1000}, 0x2) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000300)=0x2) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x103000, 0x0) ioctl$fiemap(r3, 0xc020660b, &(0x7f0000000380)={0x2, 0x7, 0x1, 0xfc3, 0x8, [{0xe8, 0x80000000, 0x7ff, 0x0, 0x0, 0x1000}, {0x7, 0x4, 0x0, 0x0, 0x0, 0x800}, {0x100000000, 0x7407, 0x8, 0x0, 0x0, 0x408}, {0x4, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x0, 0x0, 0x200}, {0x7, 0x4000, 0xfffffffffffffffb, 0x0, 0x0, 0x1}, {0xb2, 0x200, 0x7, 0x0, 0x0, 0x8}, {0x0, 0x1ff, 0x101, 0x0, 0x0, 0x2001}, {0x7fffffff, 0xc4, 0x9, 0x0, 0x0, 0x806}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000580), &(0x7f00000005c0)=0x14) accept4$llc(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000640)=0x10, 0x80000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f0000000680)=""/137) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000740)='/dev/snapshot\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000780)='/dev/null\x00', 0x42203, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000007c0)={r2, 0x439}, &(0x7f0000000800)=0x8) r5 = semget(0x2, 0x2, 0x0) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000840)=""/165) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000900)=0x8, 0x4) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000940)={r2, 0x5}, 0x8) r6 = accept4$unix(r3, &(0x7f0000000980)=@abs, &(0x7f0000000a00)=0x6e, 0x80000) getpeername(r6, &(0x7f0000000a40)=@hci, &(0x7f0000000ac0)=0x80) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000b00)={{0xa, 0x4e23, 0x2, @loopback={0x0, 0x1}, 0xfffffffffffffffa}, {0xa, 0x4e21, 0x2}, 0x7, [0x10001, 0x7, 0x3, 0x81, 0x3f, 0x3, 0x7, 0x401]}, 0x5c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000b80)={0x3, 0xffffffff, 0x8, 0xf545, 0x9, 0x6, 0x2, 0x6, r2}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000bc0)={0x6, 0x3, 0x0, 0x9, 0x7, 0xffffffffffffff8a}) syz_open_dev$random(&(0x7f0000000c00)='/dev/random\x00', 0x0, 0x200) write$fuse(r3, &(0x7f0000000c40)={0x28, 0x1, 0x9, @fuse_notify_inval_inode_out={0x80, 0x1, 0x4}}, 0x28) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000c80)={0x1400003f, 0x6, 0x11}) 2018/05/24 11:14:28 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8002, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) r1 = socket$inet6(0xa, 0xe, 0xcae) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x1, 0x0, 0x1ff, 0x40, 0x3ff}, 0x14) setsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f0000000080)=0x6, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r0}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x516, 0x70bd26, 0x25dfdbfd, {0x7}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6927}]}, 0x38}, 0x1, 0x0, 0x0, 0x24004010}, 0x10) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x81) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)={0x4}) setsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000002c0)=0x5, 0x4) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000300)={'team_slave_0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}}) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x10) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000003c0)={&(0x7f0000fff000/0x1000)=nil, 0xffffffff, 0x0, 0xe0, &(0x7f0000ffc000/0x4000)=nil, 0x8}) r3 = getgid() r4 = getgid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() getgroups(0xa, &(0x7f00000008c0)=[r3, r4, r5, r6, r7, r8, r9, r10, r11, r12]) getpeername$packet(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000940)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000980)={r13, 0x1, 0x6, @random="c157bc8460d5"}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000a00)) 2018/05/24 11:14:28 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x757a, 0x200000) ioctl$TIOCNXCL(r0, 0x540d) bind(r0, &(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x80, 0x100000001, "301a6c14269bc84526b9e334b437fb2c967ac92d8a827a3836a7520094e7d9934f82e513a8a4cf66147b8d42d32c390c6ab54bd619c86ab0c364bf11e0483a", 0x10}, 0x80) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0xffffffff80000000, &(0x7f0000000100)=0x4) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f00000001c0)=0x4, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e21}, @in6={0xa, 0x4e22, 0x14d04000000, @empty, 0x5}, @in6={0xa, 0x4e21, 0xffffffffffff0000, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0xfff}, @in6={0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x101}, @in={0x2, 0x4e24}], 0x84) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x10800, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000300)={'security\x00'}, &(0x7f0000000340)=0x24) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000380)={&(0x7f0000e00000/0x200000)=nil, 0x5, 0x7, 0x40, &(0x7f0000e30000/0x2000)=nil, 0x9}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000003c0)={0x7, 0x8, 0x3, 0x81, 0x0}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000440)={r2, 0x2}, &(0x7f0000000480)=0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r0, 0xb, 0x1}, 0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000500)={@remote, 0x0}, &(0x7f0000000540)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000580)={r2, 0x5}, &(0x7f00000005c0)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000600)='highspeed\x00', 0xa) getcwd(&(0x7f0000000640)=""/201, 0xc9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000740)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000780)=0x10) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000007c0)={@empty, r3}, 0x14) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000800)) fcntl$setstatus(r1, 0x4, 0x2000) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000840)) setsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000880)=0x9000, 0x4) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000900)={0x7, &(0x7f00000008c0)=[0x2, 0x8, 0x4, 0x100000000, 0xd875, 0xbe, 0xee]}) sendto$inet(r0, &(0x7f0000000940)="25665aceaae986bcaecffa9abcec9bfbb7db6735ae2ef2f91b23aa16a31510ae18f9afdb27d7db2195c148192b846f5ba770458888", 0x35, 0x48010, &(0x7f0000000980)={0x2, 0x4e24, @loopback=0x7f000001}, 0x10) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000a80)={{&(0x7f00000009c0)=""/114, 0x72}, &(0x7f0000000a40)}, 0x20) accept4$packet(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000b00)=0x14, 0x0) write$sndseq(r0, &(0x7f0000000b80)=[{0x40, 0x5, 0x0, 0xffffffffffff8000, @tick=0x3, {0x7ff, 0x7}, {0x101, 0x4}, @raw8={"26733b2f9fc5eb3af301cc18"}}, {0x5, 0x8, 0x34, 0x2, @tick=0x71, {0x2, 0x8}, {0x80}, @quote={{0x200, 0x9}, 0x2}}, {0x0, 0x81, 0x3, 0x9, @time={0x77359400}, {0x51, 0x5}, {0xfffffffffffffffc}, @addr={0xdf, 0x6}}, {0xffffffff, 0x6, 0x0, 0x8, @tick=0x2, {0x40000000000000, 0xea23}, {0x0, 0x7}, @ext={0x1e, &(0x7f0000000b40)="2c5c8d7b4f0db7c76fe738c25c636165194896e3e034681a7bbe420d11fd"}}], 0xc0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000c40)=[@in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xc}, 0x200}, @in6={0xa, 0x4e20, 0x3, @empty, 0x7}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x5a0}, @in6={0xa, 0x4e20, 0x6, @remote={0xfe, 0x80, [], 0xbb}, 0x8}], 0x80) 2018/05/24 11:14:28 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4040, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/112) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) modify_ldt$write(0x1, &(0x7f0000000100)={0x1, 0x20000800, 0x1000, 0xffffffffffff8875, 0x90, 0x9, 0x5, 0x9, 0x10000, 0x5c2c424b}, 0x10) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000140)={0x6, 0x8, 0x60, 0x101, 0x7, 0xfff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000001c0)) ustat(0xffffffffffffff00, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000240)={0x200, 0x8, 0x7, 'queue1\x00', 0x400}) r3 = getuid() readv(r2, &(0x7f0000000300), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000440)={{0x1, r3, r5, r3, r6, 0x10, 0xe0}, 0x0, 0x7ff, 0x2}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000004c0)={'HL\x00'}, &(0x7f0000000500)=0x1e) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="0c4bae45d81f5ae87e20d69d798899081badc04850a896e17216ba7e1c62276fa047c7f782886f77dab7adb7a4835226a05fff55b01520570049ef399cc67d", 0x3f) r7 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000580)=@generic={0x9, 0x400, 0xc4}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r8 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x6, 0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_bt_hidp_HIDPCONNDEL(r8, 0x400448c9, &(0x7f00000006c0)={{0x5, 0x100, 0x1, 0x4, 0x6, 0x7f}, 0xd4}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000700)={'ip6gretap0\x00', {0x2, 0x4e23, @rand_addr=0x4}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0x70, &(0x7f0000000740)={0x0, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, [0x2, 0xfd, 0x81, 0x0, 0x7, 0xffffffff, 0xff, 0x100000000, 0x800, 0x5, 0x5, 0x6, 0xffffffff, 0x8, 0xcf64]}, &(0x7f0000000840)=0x100) getsockopt$inet_sctp_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f0000000880)={r9, 0x1fe000000000000, 0x6, 0x61cab27e}, &(0x7f00000008c0)=0x10) r10 = memfd_create(&(0x7f0000000900)='/dev/zero\x00', 0x0) ioctl$GIO_FONT(r10, 0x4b60, &(0x7f0000000940)=""/165) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000a00)=""/227, &(0x7f0000000b00)=0xe3) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@loopback={0x0, 0x1}, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4e24, 0x2, 0x4e21, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, r4}, {0xe58, 0x1000, 0x23, 0x800, 0x400, 0x3, 0xff, 0x8}, {0x40, 0xfff, 0x58, 0x100000000}, 0x9, 0x6e6bb6, 0x1, 0x0, 0x3}, {{@in=@rand_addr=0x6, 0x4d6, 0xff}, 0x0, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x3507, 0x2, 0x1, 0x5, 0x5, 0x34, 0x6}}, 0xe8) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r8, 0x40405515, &(0x7f0000000c40)={0x1, 0x3, 0x1f, 0x1ff, "623db2966578fed8b1634b2f0f0cef0fce718180e1f9ec4d7847ada3192d3814215be68da561b300c9363239", 0x7}) 2018/05/24 11:14:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)=@ethtool_eee={0x45, 0x0, 0x10000, 0x4, 0x800, 0x81, 0x8, 0x100000000, [0x1]}}) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f0000000080)="7093") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000016c0)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000001700)={r4, 0x1, 0x6, @random="8a73a135dbc2"}, 0x10) bind$inet6(r2, &(0x7f0000001740)={0xa, 0x4e21, 0x3, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) write$sndseq(r1, &(0x7f0000001780)=[{0xbb, 0x9, 0x100000000, 0x1, @time={0x0, 0x989680}, {0x8, 0xb7ec}, {0x3, 0x60}, @queue={0x9, {0x0, 0x10000}}}], 0x30) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/full\x00', 0x400, 0x0) ioperm(0x80000001, 0x9, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001800)={0xf, 0x584, 0x7f, 0x45, 0xd, r5, 0x9}, 0x2c) getsockopt$sock_int(r3, 0x1, 0x2f, &(0x7f0000001840), &(0x7f0000001880)=0x4) connect$rds(r5, &(0x7f00000018c0)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) fallocate(r0, 0x1, 0x9, 0x6) ioctl$sock_ifreq(r1, 0x899b, &(0x7f0000001940)={'bcsf0\x00', @ifru_data=&(0x7f0000001900)="105134afaf80169674aa037a92ce8ee26e9b13050ee90433e4c7bac9184cc7e6"}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001980)=0x3, 0x4) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r5, 0x80dc5521, &(0x7f00000019c0)=""/142) syz_genetlink_get_family_id$team(&(0x7f0000001a80)='team\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000001ac0)={0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0xfffffffffffff3e8, 0x3ff, 0x2, 0xf7, 0xffffffff}, &(0x7f0000001b80)=0x98) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001bc0)={r7, 0x3}, &(0x7f0000001c00)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000001c40)={r8, 0x8, 0x6, 0x0, 0x4, 0x7fffffff}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000001c80)={0xd, 0x7, 0x41, 0x80000000, 0x28, 0xffffffffffffffff, 0x7f}, 0x2c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000001cc0)={r8, @in6={{0xa, 0x4e20, 0x49df, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}, 0x80000001, 0x8, 0xffff, 0x200, 0x8}, 0x98) syz_open_dev$admmidi(&(0x7f0000001d80)='/dev/admmidi#\x00', 0x0, 0x208002) ioctl$TIOCNXCL(r1, 0x540d) r9 = dup2(r3, r6) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000001dc0)) getsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000001e00)=""/233, &(0x7f0000001f00)=0xe9) ioctl$BLKPG(r9, 0x1269, &(0x7f0000001f80)={0x1000, 0x21f, 0x0, &(0x7f0000001f40)}) 2018/05/24 11:14:28 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000040)={0x10001, 0x4, 0x401, 0x8, 0x19, 0x6}) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x200000, 0x20) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x600, 0x70bd27, 0x25dfdbfc, {0x1}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044805}, 0x4000000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x83, "481e0b4a6aefdf1f3060c3ea349ff9d7c6263a712f7421c33bb9d19052d166601d2d85731dd460189c864e904b4679f37431adc873b053885e80863b2860d936c872c3ad5f9f4047d290ba0576aaa5025b13897d8b2c8fe7a33f39886a3a21e8405dd6da6161f5d31c766fd8033d83508e0d6c683e64947f9ffaf63b152f86f6d03c5d"}, &(0x7f00000002c0)=0x8b) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r3, 0x40, 0x10}, 0xc) tee(r1, r1, 0x5, 0x2) fcntl$setflags(r0, 0x2, 0x1) sync_file_range(r0, 0x1000, 0x8, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1, 0x101040) fremovexattr(r1, &(0x7f0000000380)=@known='system.sockprotoname\x00') ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000003c0)) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x12102, 0x0) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000440)={'bcsf0\x00'}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000480)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000004c0)) r6 = syz_open_dev$tun(&(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x501001) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000540)={0x1, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f0000000580)={r7, 0x100000000}) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f00000005c0)=0x8, 0x4) pwritev(r6, &(0x7f0000000640)=[{&(0x7f0000000600)="b13b7fca014602f80ef336fb6618585096b7809dc873de5ed2b2ffbe7e99d357bc3c29e1b83fcf78f76329c5b6072c0dfbbee820e6", 0x35}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000680)={0x2, 0x4, 0x5, 0xf40f, 0x8, 0x2, 0x7, 0x649, r3}, &(0x7f00000006c0)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000700)={r3, @in6={{0xa, 0x4e23, 0x73adf146, @mcast1={0xff, 0x1, [], 0x1}, 0x5}}, 0x4, 0x4}, 0x90) fadvise64(r4, 0x0, 0x6, 0x2) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) setsockopt$inet_dccp_int(r5, 0x21, 0x11, &(0x7f00000007c0)=0x6e8, 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000800)={r8, 0x7, 0x1, [0x7]}, &(0x7f0000000840)=0xa) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000880)={r8, 0x1}, &(0x7f00000008c0)=0x8) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000900)={@mcast2}, &(0x7f0000000940)=0x14) [ 71.633368] IPVS: ftp: loaded support on port[0] = 21 [ 71.718842] IPVS: ftp: loaded support on port[0] = 21 [ 71.746108] IPVS: ftp: loaded support on port[0] = 21 [ 71.760707] IPVS: ftp: loaded support on port[0] = 21 [ 71.765285] IPVS: ftp: loaded support on port[0] = 21 [ 71.790925] IPVS: ftp: loaded support on port[0] = 21 [ 71.800179] IPVS: ftp: loaded support on port[0] = 21 [ 71.800215] IPVS: ftp: loaded support on port[0] = 21 [ 74.573580] ip (4749) used greatest stack depth: 54280 bytes left [ 74.896806] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.903314] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.947960] device bridge_slave_0 entered promiscuous mode [ 75.101311] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.107876] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.149146] device bridge_slave_1 entered promiscuous mode [ 75.202246] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.208730] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.221927] device bridge_slave_0 entered promiscuous mode [ 75.232102] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.238546] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.258413] device bridge_slave_0 entered promiscuous mode [ 75.282738] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.289191] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.324504] device bridge_slave_0 entered promiscuous mode [ 75.346867] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.353388] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.375207] device bridge_slave_0 entered promiscuous mode [ 75.384274] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.390766] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.404436] device bridge_slave_0 entered promiscuous mode [ 75.420200] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.426660] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.449287] device bridge_slave_0 entered promiscuous mode [ 75.462263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.477408] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.483879] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.499261] device bridge_slave_1 entered promiscuous mode [ 75.513300] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.519792] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.536850] device bridge_slave_1 entered promiscuous mode [ 75.549755] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.556233] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.574969] device bridge_slave_1 entered promiscuous mode [ 75.589389] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.595860] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.615672] device bridge_slave_1 entered promiscuous mode [ 75.623605] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.630105] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.645503] device bridge_slave_0 entered promiscuous mode [ 75.665673] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.672215] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.684239] device bridge_slave_1 entered promiscuous mode [ 75.702430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.712473] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.718935] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.751227] device bridge_slave_1 entered promiscuous mode [ 75.763060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.770732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 75.778265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.806016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.814970] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.821478] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.866406] device bridge_slave_1 entered promiscuous mode [ 75.906385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 75.918642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.927170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.976094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 76.011822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 76.030769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 76.116205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 76.130305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 76.221834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 76.280392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 76.405065] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.555828] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.616566] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.649887] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.673227] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.684140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.767632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.804369] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.819124] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.832228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 76.848279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.854644] ip (4908) used greatest stack depth: 54232 bytes left [ 76.882626] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.907545] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.935794] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 76.965658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.991853] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 77.018218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.025299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.069460] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 77.084989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.092308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.108994] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.123154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.141635] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 77.151194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.158411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.183963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.191124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.242971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.249977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.275716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.282835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.356624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.364609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.384069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.391487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.413600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.421263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 77.434168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.480334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.501100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.530536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.562578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.572475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.603248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.651889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.711442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 77.718781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.908281] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 77.938865] team0: Port device team_slave_0 added [ 78.019222] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.041131] team0: Port device team_slave_0 added [ 78.066314] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.092775] team0: Port device team_slave_0 added [ 78.116253] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.138893] team0: Port device team_slave_0 added [ 78.154120] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.168636] team0: Port device team_slave_1 added [ 78.179086] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.191787] team0: Port device team_slave_0 added [ 78.212937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.237607] team0: Port device team_slave_1 added [ 78.265691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.290006] team0: Port device team_slave_0 added [ 78.304919] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.320795] team0: Port device team_slave_0 added [ 78.332854] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.359119] team0: Port device team_slave_1 added [ 78.369287] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.383480] team0: Port device team_slave_1 added [ 78.397768] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.415261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.426945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.460443] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.474923] team0: Port device team_slave_1 added [ 78.482540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.490112] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 78.520612] team0: Port device team_slave_0 added [ 78.537307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.547794] team0: Port device team_slave_1 added [ 78.563057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.576830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.606326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.613350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.624654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.644164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 78.651208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.673332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.689298] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.697825] team0: Port device team_slave_1 added [ 78.706688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 78.714646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.725276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.752993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.762200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.770845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.793419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.800446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.814304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.827549] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 78.841493] team0: Port device team_slave_1 added [ 78.848409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 78.856713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.870300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.900716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.908426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.940216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.961020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 78.971178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.979852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.002148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 79.010788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 79.018378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 79.027713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.042778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.057208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.082666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.110175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.133370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.156700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.169621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.178250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.186675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.194594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.202806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.213388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 79.220695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 79.232766] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.252804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.267213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.287819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.308854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.321150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.331229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.341308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.349469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.359538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.369455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.377720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.386865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.406616] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.425009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 79.432016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.451470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.460392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.480348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.506446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.514970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.525098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.535614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 79.542716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.554805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.579810] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.594870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.606012] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.613547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.641678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.679941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.706720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.722677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.732311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.741212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.749166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.760169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.784532] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.794322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.808778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.817789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.843235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.866195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.885015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.909725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.923352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.159719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 80.167451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.192538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.164485] ip (5193) used greatest stack depth: 54104 bytes left [ 81.638833] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.645307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.652201] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.658659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.700161] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 81.710666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 81.925237] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.931708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.938540] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.944977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.968509] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 81.994407] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.000859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.007670] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.014114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.026738] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.033794] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.040255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.047062] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.053492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.102836] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.120810] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.127269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.134101] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.140547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.155110] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.174882] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.181327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.188152] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.194588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.263941] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.356205] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.362786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.369611] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.376082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.444709] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.675084] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.681534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.688399] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.694818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.703228] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.720383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.738651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.756843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.777080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.801113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.815922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.824216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.925617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.392282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.626457] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.661969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.696512] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 90.834008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.912951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.158094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.187551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 91.270270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.425208] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 91.464058] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 91.556504] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 91.563258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.577278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.623676] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 91.672936] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 91.924423] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 91.992722] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 91.999163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.011905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.099736] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 92.249602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.259572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.267188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.306243] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.312694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.343756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.436954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.443376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.456942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.494248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.503757] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.529903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.546365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.803933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.810571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.822831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.852122] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.975911] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 92.982300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.999586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.088591] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.124506] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.332330] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.370766] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.625225] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.777949] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/24 11:14:55 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) 2018/05/24 11:14:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev={0xfe, 0x80}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x404000, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) 2018/05/24 11:14:55 executing program 4: unshare(0x8000000) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) lseek(r0, 0x0, 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x1) accept$ipx(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 2018/05/24 11:14:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x40000000000010) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/241, 0xf1}], 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000280)={'gre0\x00', {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000000c0)={0x9, 0x6, 0x10000, 'queue1\x00', 0x4}) 2018/05/24 11:14:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x109, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0xb5, 0xfffffffffffffd4c, &(0x7f0000000080)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x7}], {0x95}}, &(0x7f000000a000)='GPL\x00', 0x1, 0xc3, &(0x7f0000011f3d)=""/195, 0x0, 0x1}, 0x48) 2018/05/24 11:14:56 executing program 5: socketpair(0x3, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0x4) 2018/05/24 11:14:56 executing program 6: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000002000), 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x10}, {&(0x7f0000002040)={0x10, 0x1d, 0x20b, 0x0, 0x0, "", [@generic]}, 0x10}], 0x2}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfff, 0x10201) accept4$inet(r1, 0x0, &(0x7f0000000040), 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x9, 0x3, 0x2c8, 0xf0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1f8, 0xffffffff, 0xffffffff, 0x1f8, 0xffffffff, 0x3, &(0x7f0000000080), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x16}, @loopback={0x0, 0x1}, [0x0, 0xffffff00, 0x0, 0xffffff00], [0xffffff00, 0xffffff00, 0xffffffff, 0xffffffff], 'veth1_to_bridge\x00', 'veth1_to_bond\x00', {}, {}, 0x67, 0x8, 0x6, 0x8}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}, {0x1ff, 0x0, 0x3}}}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x15c2, 0xa, "be610cbd4269b9fa0df32c3e43cf8f8e26981e2eb91eaa507d9936af6aff"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x328) 2018/05/24 11:14:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cg\b\x00\x00\x00\x00\x00\x00\x000\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000001280)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000140)=""/4096) r2 = epoll_create1(0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000012c0)={&(0x7f0000001180)={0xc8, r4, 0x400, 0x70bd26, 0x25dfdbfe, {0x10}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x200}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback={0x0, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x57}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6d}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x112, 0x4) sendto$inet6(r5, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000440)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r6 = socket(0x2000000011, 0x2, 0x0) ioctl(r6, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") recvmsg(r5, &(0x7f0000001740)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x3a, &(0x7f0000001680)}, 0x2000) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f0000001340)) accept4$alg(r6, 0x0, 0x0, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x20000000}) 2018/05/24 11:14:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="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", 0xffffffffffffff84) 2018/05/24 11:14:56 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x6040) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r2}, 0x8) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r3 = accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) shutdown(r3, 0x1) 2018/05/24 11:14:56 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7, 0x202000) ioctl(r0, 0x890f, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0x80044dfe, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xc7, &(0x7f0000000040)=""/199, 0x88, &(0x7f0000000200)=""/136, 0xc8, &(0x7f00000003c0)=""/200}) 2018/05/24 11:14:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x109, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0xb5, 0xfffffffffffffd4c, &(0x7f0000000080)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x7}], {0x95}}, &(0x7f000000a000)='GPL\x00', 0x1, 0xc3, &(0x7f0000011f3d)=""/195, 0x0, 0x1}, 0x48) 2018/05/24 11:14:56 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="0e707276341a7673af73796e635f76657273696f7e00", 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x7c, "4e8402a2a5eb946ef6583828debdb85d7bcea2dc7fe735002ef6d6a1f683e2002fbd3ddbc02e38adb5a47d433e8a3b80edcaf38b6d3b7fe8e72766697c621371fcd62a7f0706a7f3062ffdd760c90b57a1561613ce3a8abf93d76de80b93c2bc91ee3d795af47b17d6559a3c55368d7a92c134c0c3889263b8520773"}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r2, 0x9, 0xf5c3}, 0xfffffffffffffeaa) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@getae={0x40, 0x1f, 0x305, 0x0, 0x0, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}}, @in=@loopback=0x7f000001}}, 0x40}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="3b003800350d789ead6fa44dfe6944263cb3cf42861ed14fa41a9c3419f5f9942aa0caee14066b7740933d9bc6b41dd1663cbcfa15d4b6d37d7dab6f"], 0x40) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f0000000340)=0x84) 2018/05/24 11:14:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x40, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000480)=""/196) r2 = socket(0x20000000000000a, 0x2, 0x0) r3 = dup2(r0, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000001c0)=0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x4, 0x8206, 0x1, 0x5, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={r4, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e20, @broadcast=0xffffffff}]}, &(0x7f0000000180)=0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0461d2a40d155d71200e570f000000100004e5ff04000040"], 0x14}, 0x1}, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x50}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, r5, 0x423, 0x70bd28, 0x25dfdbfc, {0x2}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2d}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 2018/05/24 11:14:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x22a9c7c6, 0x400) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000140)={0x20, 0x0, 0x101, 0xffff, 0x3}, 0xc) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia)\x00'}, 0x58) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000180)="8153bbfd8e0335b20151e81d7a7a7bbd63c29babd235230d951fa9a480ec0306504bd4fd1ed8cb3726f5a15f0838", 0x2e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7be", 0x10) r2 = accept4(r0, 0x0, &(0x7f0000000240), 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000001"], 0x14}, 0x1}, 0x0) 2018/05/24 11:14:56 executing program 1: r0 = socket(0xa, 0x1, 0x0) getsockname$packet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl(r0, 0x8912, &(0x7f0000000080)="c426262c8523bf012cf66f") r1 = getpid() setpriority(0x1, r1, 0x0) 2018/05/24 11:14:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup(r0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32-generic)\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x800) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [], 0xa}, 0xb) 2018/05/24 11:14:56 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 2018/05/24 11:14:56 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x4000, 0x4, &(0x7f000000a000/0x4000)=nil) remap_file_pages(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 98.919653] alg: No test for cmac(camellia) (cmac(camellia-generic)) [ 99.036268] mmap: syz-executor1 (6673) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/05/24 11:14:57 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400202, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x3}, [{}]}, 0x78) sendfile(r0, r0, &(0x7f0000000080), 0xfba) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 2018/05/24 11:14:57 executing program 6: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000003c00)) r0 = gettid() r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000040)=""/214, &(0x7f0000000180)=0xd6) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x15) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 2018/05/24 11:14:57 executing program 3: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) semtimedop(0x0, &(0x7f0000000500), 0x2aaaaaaaaaaaab2f, &(0x7f0000000540)={0x0, 0x989680}) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7fff, 0x400000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x83, "4d739298dff263087552e6dfa02055f8e076f84bd4a83dd5077e24a9c105aca99435f47bef2f5e1039d81e2af84937afe987ff90c983bd7607290ebe07f26e293a5414257f14876f44ad9e6aea6f8bfab5826f255b6505632d6c65773d89dcbf794fa19cf9c5d74fb9f5dbd196236f1862b326bd5aa54d85e7c11a77b1b01dab22fbe7"}, &(0x7f0000000080)=0x8b) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x0, 0x418, 0x4, 0x7, 0x100000001}, &(0x7f00000002c0)=0x98) 2018/05/24 11:14:57 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, 0xca03, r1}) socket$inet6_sctp(0xa, 0x80000000000005, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) recvfrom$ipx(r0, &(0x7f0000000200)=""/108, 0x6c, 0x0, &(0x7f0000000280)={0x4, 0x3e, 0x6, "f4804bd3a468", 0x3}, 0x10) sendmsg$inet_sctp(r2, &(0x7f00004e4fc8)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @empty, 0x9b8}, 0xa, &(0x7f00008fbfa0), 0x0, &(0x7f00004e4fa0), 0x30}, 0x0) 2018/05/24 11:14:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) r3 = semget(0x3, 0x4, 0x20) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000200)={0x0, 0x0, 0xf4a8, 0x40, &(0x7f00000000c0)=""/64, 0x20, &(0x7f0000000100)=""/32, 0xa0, &(0x7f0000000140)=""/160}) semctl$GETZCNT(r3, 0x4, 0xf, &(0x7f0000000340)=""/97) 2018/05/24 11:14:57 executing program 1: r0 = socket(0x11, 0x100000803, 0x0) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x20000000002) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x5001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="11000000000000060000febb57f7f71a50030011907800000000e000000100009078e0000001"], 0xfdef) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xa01, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000140)={r3}) 2018/05/24 11:14:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f0000c24ffb)='user\x00', &(0x7f00003ebffb)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000000)="0000000000000001e3a255ec4a8d9d652d0536c67b9695cfb4c29da627ab9e5e0587e50ec159997396abc344a7d9f563a3e3af2d90a5dfcade859e4717cdf8f03fdf022186424d68996f51a7b3f20108f152bfd57ac5a50be84a106249d0216d5c98c41df97cd7d5032e9c632e4715a226907aabbfc5b3f2e96bf3039474801053b87fbf8674e100", 0x88, r2) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a}, &(0x7f00000004c0)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e2ecd3fff32853747eda22d29be9b36119ec53dc60e2c80b3e9ffa1b81a808ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b0687d6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb46c1523b8a25e71690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672f98f7e149bd61bd78b506e8bd71824cec9a8db26823cdd5259e688752d5491bd542b2ca7d08bdb777695db99f0401294aca81ab60da18f42ce48bf4226ea", 0x109, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) r6 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x5, 0x101000) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 2018/05/24 11:14:57 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) open$dir(&(0x7f0000000000)='./file0\x00', 0x8000185840, 0x0) tkill(r1, 0x15) open$dir(&(0x7f0000000540)='./file0\x00', 0x27e, 0x0) 2018/05/24 11:14:57 executing program 3: r0 = socket(0x6, 0x0, 0xffffffffeffffffa) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x4, 0x9, 0x7, 0x3f, 0x80000000, 0x585}, 0x9, 0x7}, 0xe) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r1 = semget$private(0x0, 0x3, 0x0) getuid() semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000280)=""/67) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000140)="c5393409f6424e052babe7f8e15b87277d3bb9d726719998763ea703f6b051d5ecf773039d8657a6ca45f32fcd705c7f62a864dda90a27cc40b1afb2878200ab75e7f6ee3e9da8d07cadbae7ce05a8783c4c6e3551c1a5cb95d02188de3b8fda57bd36b173ed496539c5b43d27e5ec513c7c30264397f2f07b0844036238b2456c9fc139f7445f5d91dd379c68700c254f47c1dcf8411c16b4d9f4a79913b6767d45780c33a0dab61ddb1b6fd24e6efd2955ab682db88fd1df785eaedb45eb038dec373ae7b16537c4513cbf52d1a90d97fcf708a163cf258b6611593cc20ab5c09fc89bce8ed8c4bfbe0712deeba3", 0xef) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000400)=""/221, &(0x7f0000000080)=0xdd) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 2018/05/24 11:14:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f0000c24ffb)='user\x00', &(0x7f00003ebffb)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000000)="0000000000000001e3a255ec4a8d9d652d0536c67b9695cfb4c29da627ab9e5e0587e50ec159997396abc344a7d9f563a3e3af2d90a5dfcade859e4717cdf8f03fdf022186424d68996f51a7b3f20108f152bfd57ac5a50be84a106249d0216d5c98c41df97cd7d5032e9c632e4715a226907aabbfc5b3f2e96bf3039474801053b87fbf8674e100", 0x88, r2) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a}, &(0x7f00000004c0)="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", 0x109, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) r6 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x5, 0x101000) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 2018/05/24 11:14:58 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) bind$netrom(r1, &(0x7f0000000080)=@ax25={0x3, {"7cad31135fc497"}, 0x79e}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000)=0x3, 0x4) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) sendto(r1, &(0x7f0000000040), 0x0, 0x4, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000200), 0x5009a56d, 0x0, &(0x7f0000000240)=@file={0x0, "e91f7189591e9233614b00"}, 0xfffffffe) 2018/05/24 11:14:58 executing program 7: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x8a45, 0x2) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7fe4614d88f57b30c5c9027fd490918e9c454c46000020000001000000000000000010000000000000000000400000000000ca6f15e905a0c631df4fb0a94205010000000000dcd5a96b00000000000000825d9ac67ca8b90000000000000000000000000000000000000000000000000000000000000000000000000000dd91521706c29f24b3a8d7a3ec15b9375437ce3a4daec0193975b7553ad1cf43fca65b8b0b2b5dceaaaa2318659c077d60476cefacf32294728f821df9511fee956f010a50c10f823000f7affa52781b4bdf6fbfe058ca95ce7158c1c1ad4a8360efcc8b39923080bd"], 0xfe7a) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)=0x1) r1 = msgget(0x1, 0x1) chdir(&(0x7f0000000080)='./file0\x00') msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/31) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000001c0)=""/196, 0xc4) 2018/05/24 11:14:58 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ftruncate(r0, 0x9) getsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f0000000000)=""/60, &(0x7f0000000040)=0x3c) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x4, 0x0, 0x1, 0xffffffff, 0x0, 0x9, 0x9, 0x40, r3}, &(0x7f00000002c0)=0x20) select(0x40, &(0x7f0000000080)={0x5, 0x7f, 0x200, 0x7, 0x2, 0x4, 0x6, 0x6333721c}, &(0x7f00000000c0)={0x7fff, 0xff, 0x400, 0xde8, 0x8000, 0x79b, 0xffff, 0x8000}, &(0x7f0000000100)={0x3, 0x0, 0x2d, 0x7, 0x9, 0x1, 0x5, 0x10001}, &(0x7f0000000180)={r1, r2/1000+30000}) r4 = syz_open_procfs(0x0, &(0x7f0000000480)="2f65786500000000000409004bddd9de91be10eebf000e0e281ab42fb897c0d554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a984237d092ef1c00b517026f8bd7f2b0436a4c40960ab3f6bc482809f6bd82caa34799193b35445293b992ab5e44573eef5fd0f423a5cfb386f9cc996c6effde7e603fdeab448671b63bec6e9395aabab4d045f1ad982a2a897fafa710be9e681f3c6a45db03d9e6cb58fbec3d8397005f17d6f7afa102ded1837bcb805600000000000000000000") pread64(r4, &(0x7f0000000080), 0x0, 0x40000000) 2018/05/24 11:14:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockname(r0, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(seqiv(rfc4106(gcm(aes))))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x320) 2018/05/24 11:14:58 executing program 3: r0 = socket(0x2, 0x3, 0x40000000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0x26) sendto$inet(r0, &(0x7f00000002c0), 0x2e2, 0x0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getpeername$netrom(r0, &(0x7f0000000080)=@full, &(0x7f0000000140)=0x48) 2018/05/24 11:14:58 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="e6012aa53554acb4d15f41c65ba9f270d99e0a8cc230e4aba4750bfdae4c8432866a06210bce1b24b234d79b69849201e23c50e8e9a427a057cd040716bbd20764f3e0f8fd63b9e996", 0x49) pipe2(&(0x7f00000000c0), 0x80000) r0 = socket$nl_xfrm(0xa, 0x5, 0x84) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f00000050c0)=""/4096, &(0x7f0000000000)=0x1000) 2018/05/24 11:14:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x400}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendfile(r2, r1, &(0x7f0000000080), 0x80000003) close(r2) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="d1020400005800200007000613f32e1c00ce5fe1b471985e", 0x18) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) r3 = getpgid(0x0) sched_setscheduler(r3, 0x7, &(0x7f0000000180)=0x1f) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x2}, 0x1c) 2018/05/24 11:14:58 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x600800) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x8, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x100000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x8195, 0x4) [ 100.523120] ================================================================== [ 100.530558] BUG: KMSAN: uninit-value in gre_rcv+0x1237/0x1970 [ 100.536451] CPU: 0 PID: 6746 Comm: syz-executor3 Not tainted 4.17.0-rc5+ #102 [ 100.543724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.553095] Call Trace: [ 100.555680] [ 100.557838] dump_stack+0x185/0x1d0 [ 100.561474] ? gre_rcv+0x1237/0x1970 [ 100.565189] kmsan_report+0x149/0x260 [ 100.568995] __msan_warning_32+0x6e/0xc0 [ 100.573061] gre_rcv+0x1237/0x1970 [ 100.576604] ? raw_local_deliver+0x63/0x1660 [ 100.581025] ? kmsan_set_origin_inline+0x6b/0x120 [ 100.585885] ? erspan_xmit+0x2d70/0x2d70 [ 100.589962] gre_rcv+0x2d6/0x3b0 [ 100.593336] ? gre_parse_header+0x14e0/0x14e0 [ 100.597848] ip_local_deliver_finish+0x881/0xed0 [ 100.602618] ip_local_deliver+0x43c/0x4e0 [ 100.606774] ? ip_local_deliver+0x4e0/0x4e0 [ 100.611105] ? ip_call_ra_chain+0x7c0/0x7c0 [ 100.615439] ip_rcv_finish+0xa36/0x1d00 [ 100.619424] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 100.624808] ip_rcv+0x118a/0x16d0 [ 100.628276] ? ip_rcv+0x16d0/0x16d0 [ 100.631920] ? ip_local_deliver_finish+0xed0/0xed0 [ 100.636869] __netif_receive_skb_core+0x47ff/0x4ac0 [ 100.641903] ? kmsan_set_origin_inline+0x20/0x120 [ 100.646761] process_backlog+0x62d/0xe20 [ 100.650846] ? rps_trigger_softirq+0x2f0/0x2f0 [ 100.655441] net_rx_action+0x7c1/0x1a70 [ 100.659429] ? net_tx_action+0xab0/0xab0 [ 100.663504] __do_softirq+0x56d/0x93d [ 100.667319] do_softirq_own_stack+0x2a/0x40 [ 100.671639] [ 100.673885] __local_bh_enable_ip+0x114/0x140 [ 100.678387] local_bh_enable+0x36/0x40 [ 100.682280] ip_finish_output2+0x1378/0x1490 [ 100.686720] ip_finish_output+0xcaf/0xff0 [ 100.690882] ip_output+0x505/0x5d0 [ 100.694430] ? ip_mc_finish_output+0x3b0/0x3b0 [ 100.699023] ? ip_finish_output+0xff0/0xff0 [ 100.703348] raw_sendmsg+0x3e77/0x41c0 [ 100.707249] ? raw_getfrag+0x630/0x630 [ 100.711149] ? compat_raw_ioctl+0x100/0x100 [ 100.715473] inet_sendmsg+0x3f7/0x750 [ 100.719283] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 100.724660] ? inet_getname+0x4a0/0x4a0 [ 100.728645] __sys_sendto+0x6c0/0x7e0 [ 100.732456] ? syscall_return_slowpath+0xe9/0x700 [ 100.737306] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 100.742506] ? syscall_return_slowpath+0xe9/0x700 [ 100.747372] __x64_sys_sendto+0x1a1/0x210 [ 100.751535] do_syscall_64+0x152/0x230 [ 100.755440] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.760639] RIP: 0033:0x455a09 [ 100.763838] RSP: 002b:00007f0d07abac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 100.771548] RAX: ffffffffffffffda RBX: 00007f0d07abb6d4 RCX: 0000000000455a09 [ 100.778822] RDX: 00000000000002e2 RSI: 00000000200002c0 RDI: 0000000000000013 [ 100.786103] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000010 [ 100.793381] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 100.800658] R13: 00000000000005ab R14: 00000000006fc8a8 R15: 0000000000000000 [ 100.807934] [ 100.809558] Uninit was stored to memory at: [ 100.813891] kmsan_internal_chain_origin+0x12b/0x210 [ 100.819010] kmsan_memcpy_origins+0x11d/0x170 [ 100.823509] __msan_memcpy+0x109/0x160 [ 100.827405] pskb_expand_head+0x3a6/0x1a70 [ 100.831640] ip_tunnel_xmit+0x2dd6/0x37b0 [ 100.835791] erspan_xmit+0x1c67/0x2d70 [ 100.839686] dev_hard_start_xmit+0x5f1/0xc70 [ 100.844107] sch_direct_xmit+0x578/0x8f0 [ 100.848178] __qdisc_run+0x1785/0x3730 [ 100.852079] __dev_queue_xmit+0x1d50/0x3510 [ 100.856411] dev_queue_xmit+0x4b/0x60 [ 100.860225] neigh_resolve_output+0xac6/0xb60 [ 100.864736] ip_finish_output2+0x1362/0x1490 [ 100.869147] ip_finish_output+0xcaf/0xff0 [ 100.874382] ip_output+0x505/0x5d0 [ 100.877937] raw_sendmsg+0x3e77/0x41c0 [ 100.881837] inet_sendmsg+0x3f7/0x750 [ 100.885651] __sys_sendto+0x6c0/0x7e0 [ 100.889459] __x64_sys_sendto+0x1a1/0x210 [ 100.893622] do_syscall_64+0x152/0x230 [ 100.897518] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.902701] Uninit was created at: [ 100.906256] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 100.911371] kmsan_kmalloc+0x94/0x100 [ 100.915182] kmsan_slab_alloc+0x10/0x20 [ 100.919170] __kmalloc_node_track_caller+0xb32/0x11b0 2018/05/24 11:14:58 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x3, &(0x7f0000000040)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x7, 0xad, &(0x7f0000000340)=""/173, 0x0, 0x1, [], 0x0, 0xfffffffffffffffd}, 0x48) 2018/05/24 11:14:58 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) r2 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(r1, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) recvmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000880)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000900)=""/247, 0xf7}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)=""/97, 0x61}, {&(0x7f0000000ac0)=""/14, 0xe}], 0x4, &(0x7f0000000b40)=""/67, 0x43, 0xf8}, 0x0) accept$packet(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000c40)=0x14) getpeername$packet(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002240)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000024c0)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000002500)={@loopback, 0x0}, &(0x7f0000002540)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000028c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000002880)={&(0x7f0000002580)=ANY=[@ANYBLOB="dc020000", @ANYRES16=r4, @ANYBLOB="120028bd7000fddbdf250200000008000100", @ANYRES32=r5, @ANYBLOB="8800020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000008000100", @ANYRES32=r7, @ANYBLOB="a401020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r9, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400050000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000008000100", @ANYRES32=r12, @ANYBLOB="0db7c4809f33e236", @ANYRES32=r13, @ANYBLOB="780002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ff030000"], 0x2dc}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180), 0xd0) 2018/05/24 11:14:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x400}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendfile(r2, r1, &(0x7f0000000080), 0x80000003) close(r2) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="d1020400005800200007000613f32e1c00ce5fe1b471985e", 0x18) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) r3 = getpgid(0x0) sched_setscheduler(r3, 0x7, &(0x7f0000000180)=0x1f) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x2}, 0x1c) 2018/05/24 11:14:58 executing program 6: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) poll(&(0x7f0000000040)=[{r0, 0x84c1}], 0x1, 0x7) [ 100.924370] __alloc_skb+0x2cb/0x9e0 [ 100.928090] alloc_skb_with_frags+0x1e6/0xb80 [ 100.932595] sock_alloc_send_pskb+0xb56/0x1190 [ 100.937187] sock_alloc_send_skb+0xca/0xe0 [ 100.941434] raw_sendmsg+0x221c/0x41c0 [ 100.945331] inet_sendmsg+0x3f7/0x750 [ 100.949142] __sys_sendto+0x6c0/0x7e0 [ 100.952953] __x64_sys_sendto+0x1a1/0x210 [ 100.957110] do_syscall_64+0x152/0x230 [ 100.961020] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.966209] ================================================================== [ 100.973570] Disabling lock debugging due to kernel taint [ 100.979030] Kernel panic - not syncing: panic_on_warn set ... [ 100.979030] [ 100.986414] CPU: 0 PID: 6746 Comm: syz-executor3 Tainted: G B 4.17.0-rc5+ #102 [ 100.995085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.004445] Call Trace: [ 101.007030] [ 101.009200] dump_stack+0x185/0x1d0 [ 101.012846] panic+0x39d/0x940 [ 101.016072] ? gre_rcv+0x1237/0x1970 [ 101.019800] kmsan_report+0x260/0x260 [ 101.023620] __msan_warning_32+0x6e/0xc0 [ 101.027697] gre_rcv+0x1237/0x1970 [ 101.031254] ? raw_local_deliver+0x63/0x1660 [ 101.035690] ? kmsan_set_origin_inline+0x6b/0x120 [ 101.040559] ? erspan_xmit+0x2d70/0x2d70 [ 101.044642] gre_rcv+0x2d6/0x3b0 [ 101.048024] ? gre_parse_header+0x14e0/0x14e0 [ 101.052539] ip_local_deliver_finish+0x881/0xed0 [ 101.057325] ip_local_deliver+0x43c/0x4e0 [ 101.061492] ? ip_local_deliver+0x4e0/0x4e0 [ 101.065873] ? ip_call_ra_chain+0x7c0/0x7c0 [ 101.070212] ip_rcv_finish+0xa36/0x1d00 2018/05/24 11:14:59 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) bind$netrom(r2, &(0x7f0000000180)=@full={{0x3, {"e22bd1e3017be9"}, 0x2}, [{"5924e6a56225bd"}, {"937e537b7b0740"}, {"767baaa3a6ff52"}, {"70004f6d56a4b0"}, {"52a5a0a79b744c"}, {"c82e86a07fc221"}, {"50fc08977364fb"}, {"a29234a250ef8a"}]}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)) [ 101.074205] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 101.079588] ip_rcv+0x118a/0x16d0 [ 101.083051] ? ip_rcv+0x16d0/0x16d0 [ 101.086700] ? ip_local_deliver_finish+0xed0/0xed0 [ 101.091644] __netif_receive_skb_core+0x47ff/0x4ac0 [ 101.096677] ? kmsan_set_origin_inline+0x20/0x120 [ 101.101538] process_backlog+0x62d/0xe20 [ 101.105618] ? rps_trigger_softirq+0x2f0/0x2f0 [ 101.110308] net_rx_action+0x7c1/0x1a70 [ 101.114297] ? net_tx_action+0xab0/0xab0 [ 101.118375] __do_softirq+0x56d/0x93d [ 101.122190] do_softirq_own_stack+0x2a/0x40 [ 101.126511] [ 101.128765] __local_bh_enable_ip+0x114/0x140 [ 101.133267] local_bh_enable+0x36/0x40 [ 101.137164] ip_finish_output2+0x1378/0x1490 [ 101.141595] ip_finish_output+0xcaf/0xff0 [ 101.145760] ip_output+0x505/0x5d0 [ 101.149316] ? ip_mc_finish_output+0x3b0/0x3b0 [ 101.153918] ? ip_finish_output+0xff0/0xff0 [ 101.158254] raw_sendmsg+0x3e77/0x41c0 [ 101.162162] ? raw_getfrag+0x630/0x630 [ 101.166073] ? compat_raw_ioctl+0x100/0x100 [ 101.170408] inet_sendmsg+0x3f7/0x750 [ 101.174222] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 101.179611] ? inet_getname+0x4a0/0x4a0 [ 101.183606] __sys_sendto+0x6c0/0x7e0 [ 101.187423] ? syscall_return_slowpath+0xe9/0x700 [ 101.192285] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 101.197230] ? syscall_return_slowpath+0xe9/0x700 [ 101.202102] __x64_sys_sendto+0x1a1/0x210 [ 101.206268] do_syscall_64+0x152/0x230 [ 101.210172] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.215369] RIP: 0033:0x455a09 [ 101.218562] RSP: 002b:00007f0d07abac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 101.226304] RAX: ffffffffffffffda RBX: 00007f0d07abb6d4 RCX: 0000000000455a09 [ 101.233598] RDX: 00000000000002e2 RSI: 00000000200002c0 RDI: 0000000000000013 [ 101.240880] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000010 [ 101.248162] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 101.255440] R13: 00000000000005ab R14: 00000000006fc8a8 R15: 0000000000000000 [ 101.263279] Dumping ftrace buffer: [ 101.266809] (ftrace buffer empty) [ 101.270497] Kernel Offset: disabled [ 101.274108] Rebooting in 86400 seconds..