INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. 2018/04/22 16:11:09 fuzzer started 2018/04/22 16:11:09 dialing manager at 10.128.0.26:41781 syzkaller login: [ 49.513416] can: request_module (can-proto-0) failed. [ 49.524735] can: request_module (can-proto-0) failed. 2018/04/22 16:11:16 kcov=true, comps=false 2018/04/22 16:11:19 executing program 0: r0 = memfd_create(&(0x7f0000000380)="3f32669c120bef064750da221113b7666a49bf2df92721c581", 0x0) r1 = syz_open_dev$sndseq(&(0x7f000092e000)='/dev/snd/seq\x00', 0x0, 0x2000a) r2 = dup2(r1, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@setlink={0x20, 0x13}, 0x20}, 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r2, &(0x7f0000000040), 0x30c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x233}) 2018/04/22 16:11:19 executing program 2: mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="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") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/22 16:11:19 executing program 7: setrlimit(0x2, &(0x7f0000cc0ff0)={0x1, 0xfffff7fffffffffe}) mmap(&(0x7f0000ef4000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 2018/04/22 16:11:19 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80080, 0x0) fcntl$setflags(r0, 0x2, 0x0) 2018/04/22 16:11:19 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000c34000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) 2018/04/22 16:11:19 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f00003e2ff6)='net/ptype\x00') pread64(r0, &(0x7f0000000040), 0x2bc, 0x0) 2018/04/22 16:11:19 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f00003fd000)) prctl$intptr(0x18, 0x0) 2018/04/22 16:11:19 executing program 6: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) [ 53.718939] IPVS: ftp: loaded support on port[0] = 21 [ 53.896362] IPVS: ftp: loaded support on port[0] = 21 [ 53.948697] IPVS: ftp: loaded support on port[0] = 21 [ 54.002541] IPVS: ftp: loaded support on port[0] = 21 [ 54.122991] IPVS: ftp: loaded support on port[0] = 21 [ 54.213780] IPVS: ftp: loaded support on port[0] = 21 [ 54.350592] IPVS: ftp: loaded support on port[0] = 21 [ 54.508219] IPVS: ftp: loaded support on port[0] = 21 [ 55.917414] ip (4715) used greatest stack depth: 54312 bytes left [ 55.954815] ip (4717) used greatest stack depth: 53944 bytes left [ 57.011500] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.018082] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.042635] device bridge_slave_0 entered promiscuous mode [ 57.109445] ip (4799) used greatest stack depth: 53656 bytes left [ 57.155939] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.162446] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.197529] device bridge_slave_0 entered promiscuous mode [ 57.259486] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.266133] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.296547] device bridge_slave_0 entered promiscuous mode [ 57.320916] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.327433] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.359667] device bridge_slave_1 entered promiscuous mode [ 57.442680] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.449181] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.462464] device bridge_slave_0 entered promiscuous mode [ 57.478268] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.484736] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.512229] device bridge_slave_1 entered promiscuous mode [ 57.547751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.555396] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.561851] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.608326] device bridge_slave_1 entered promiscuous mode [ 57.652789] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.659374] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.676528] device bridge_slave_0 entered promiscuous mode [ 57.700762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.729516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.736957] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.743468] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.787817] device bridge_slave_1 entered promiscuous mode [ 57.818606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.828426] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.834882] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.866080] device bridge_slave_0 entered promiscuous mode [ 57.905459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.941524] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.948131] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.979198] device bridge_slave_1 entered promiscuous mode [ 58.006917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.063535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.089614] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.096141] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.128540] device bridge_slave_1 entered promiscuous mode [ 58.136360] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.142856] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.158723] device bridge_slave_0 entered promiscuous mode [ 58.171592] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.178111] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.189594] device bridge_slave_0 entered promiscuous mode [ 58.221430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.277377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.286925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.394215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.418547] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.425106] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.465698] device bridge_slave_1 entered promiscuous mode [ 58.480756] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.487268] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.501144] device bridge_slave_1 entered promiscuous mode [ 58.533268] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.553803] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.581596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.615206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.735543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.757726] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.788553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.813620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.845723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.940497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.967709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.976624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.000875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.019575] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.042253] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.076374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.084097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.170696] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.192204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.199220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.277892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.284907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.301139] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.324332] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.334847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.341830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.405697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.414671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.508157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.515206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.543814] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.578332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.585913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.638228] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.656621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.665546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.767210] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.792867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.800448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.838229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.847129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.881379] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.922236] team0: Port device team_slave_0 added [ 59.931477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.005456] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.023602] team0: Port device team_slave_0 added [ 60.042164] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.132351] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.148162] team0: Port device team_slave_0 added [ 60.158803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.167590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.190967] team0: Port device team_slave_1 added [ 60.209438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.260984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.279243] team0: Port device team_slave_1 added [ 60.294584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.303244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.310209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.328328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.398798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.405834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.424508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.448085] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.466393] team0: Port device team_slave_1 added [ 60.488723] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.495799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.508814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.533379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.542585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.555129] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.568835] team0: Port device team_slave_0 added [ 60.613407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.620420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.636679] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.681503] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.703992] team0: Port device team_slave_0 added [ 60.730849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.739341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.752169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.812328] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.829486] team0: Port device team_slave_0 added [ 60.844299] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.853637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.874841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.899788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.927401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.947420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.968093] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.979710] team0: Port device team_slave_1 added [ 60.996278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.009925] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.030158] team0: Port device team_slave_1 added [ 61.049048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.058809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.082147] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.092719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.108168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.125091] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.143170] team0: Port device team_slave_0 added [ 61.152353] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.173440] team0: Port device team_slave_1 added [ 61.187370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.194826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.206762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.231431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.238335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.247162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.264385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.272274] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.280006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.295622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.332634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.358228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.376501] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.383440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.392902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.417113] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.426391] team0: Port device team_slave_0 added [ 61.442005] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.449642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.467649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.481872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.494212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.503716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.538197] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.558980] team0: Port device team_slave_1 added [ 61.582581] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.590748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.617959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.643658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.651725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.667444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.692760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.704883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.729349] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.772699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.782892] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.802947] team0: Port device team_slave_1 added [ 61.817517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.834320] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.869974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.876968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.892937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.923071] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.931335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.955109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.962831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.983920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.010803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.034251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.054009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.071272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.080515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.087751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.096815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.115261] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.135988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.148830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.166882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.174670] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.187301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.223674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.252899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.278517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.324589] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.334161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.354211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.372822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.394261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.407285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.435701] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.455987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.473373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.552002] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.560009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.572238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.680974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.689179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.705156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.187639] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.194146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.201049] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.207510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.249435] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.256094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.276926] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.283438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.290361] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.296826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.309175] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.338793] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.345292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.352211] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.358678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.455661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.484674] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.491175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.498062] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.504507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.542106] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.641246] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.647772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.654662] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.661155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.717324] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.937656] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.944155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.950995] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.957487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.970293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.170241] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.176752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.183651] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.190139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.205988] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.226091] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.232582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.239424] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.245909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.311381] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.324125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.346830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.377853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.400128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.409237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.417241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.425126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.089701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.334305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.389618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.587657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.812760] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.870315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.950071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.102285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.203742] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.215755] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.223968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.424779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.661223] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.667658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.679658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.725877] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.792111] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.893823] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.014956] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.022891] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.029972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.040124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.112189] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.118531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.130480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.218212] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.224493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.240477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.544819] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.578215] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.584527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.599460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.650502] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.658708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.684989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.742437] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.751130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.766108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.875868] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.882194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.890713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.923276] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.061857] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.160093] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.408547] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.593704] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.621905] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.699595] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.348472] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) [ 81.483241] mmap: syz-executor7 (6620): VmData 18448384 exceed data ulimit 1. Update limits or use boot option ignore_rlimit_data. 2018/04/22 16:11:47 executing program 0: pipe2(&(0x7f0000000ff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000b1c000/0x4000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(r1, &(0x7f0000b1d000)=[{&(0x7f0000005fe3)}], 0x1, 0x0) vmsplice(r0, &(0x7f0000000100), 0x3cc, 0x0) 2018/04/22 16:11:47 executing program 2: mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="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") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/22 16:11:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes),poly1305)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 2018/04/22 16:11:47 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x0, 0x0) syncfs(r0) 2018/04/22 16:11:47 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x1000, 0x2) writev(r0, &(0x7f0000000600)=[{&(0x7f00000003c0)="ef7538a16931762b73e4fd1a3a397b9a3ee708571c1a37e8f4abdfb1635ce4f51cc7dcb9071b4ce61da6efbf811ac3bbf97b2d3a8b7037b1780b433af93d1207c33f2d99cd972ca6b397007ba083ae24af7a2923aaa53d6fb46aa3f5eba0b5b6e49113d31f7dfee1d267", 0x6a}, {&(0x7f0000000480)="98a2b1881714cbe5aa00b982c40131dbb2a651383bbf55a25a03b9007811d7ba72bd1d6d456f5b40508aa493e47ae5b8e95ba57b9882732e86d6ca836866aebdd38243d0aa8c18c95dfc8382532bd6c5f51ef4be27dfd42d70dd0621ad5999485d8d187673af6088764384f5459d0ad34f79dd54a4cbdccf6918899393a4d643aed799e7edaaa7f40dd4a179ccab48422d79b522e684900b046f73d81166ac0b652eeddd186ced5073c997534b5c7847fdb359fca459d96d0f6b8d6969", 0xbd}, {&(0x7f0000000580)="91e481a8f07b17b7b275df9ce85633a749151f1d6fd8533843fdb79d64", 0x1d}], 0x3) 2018/04/22 16:11:47 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x3}}) 2018/04/22 16:11:47 executing program 7: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002600)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000200)=[{&(0x7f0000002400)="5500000018007fafc22e1cb2a4a2f9930a06000000a84308910523693900090020000000010000001300050000000000000000dc1338d5440700000000000000fb83de4407aa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000002500)}, 0x0) 2018/04/22 16:11:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x2bc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000002700)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x3, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) 2018/04/22 16:11:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ef0fe4)={0x5, 0x1, 0x7d, 0x200000000000000c}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x1, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000eeb000)={r1, &(0x7f0000eed000), &(0x7f0000eee000)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000204ff0)={r1, &(0x7f00003ec000)}, 0x10) 2018/04/22 16:11:47 executing program 2: mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798007439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a36dca30d55e4fda59435fe1fd4262d165a6ccb3f75372e1842ce015e10aad2f3479389f8ec7abe08a38776073709fb20b39b17e9fec21147cdd6390442436826385cb97f04dadc3393024b97b203b3e121d3c67c593ee9f0787a405a1d3ec1935bee8a24cb2123e4a0b98b88796b1311ea4c0dc94e61fcf4a1090f4c360818abd0dd134ae391fe99cf200991798d0cc90367c4ee08ae49075dd74dad19937e51e0812cefa80333d3ad38d5cf07a6351365acc5d9e9ea0841041851755ccfe1906590da07d576439646ed64cf9df55fd9e3a9857e6ddea31bcaac255a2683811f879e854a8d126a4aabeb51d19e9c763b4ca99bbc1c1d1d6fd5b05fa7cc3e0426868dc36d5625e610a38aac2ea53f01d855119dcc4da16720b2362162b688a30cd25db4a56ad5ebce224abf37a5793f3fe1996117c5ccc4d4f272eb584debcff6f7f8290b770f4e00e7ed09956fa1209abc34b50a30800b9ff16734bacf46177a519d5d6c19f38cd29114b2fa1979434485eb49612cbbb27b1708") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/22 16:11:47 executing program 4: r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000fff)=[{&(0x7f0000006000), 0x2a9}], 0x1) [ 81.737651] alg: No test for gcm_base(ctr(aes),poly1305) (gcm_base(ctr(aes-fixed-time),poly1305-generic)) 2018/04/22 16:11:47 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000380), 0x0, &(0x7f00000004c0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x3}, &(0x7f0000000440), &(0x7f0000000480)}}], 0x58}, 0x0) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/22 16:11:47 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)="6664001a000000") exit(0x0) getdents64(r1, &(0x7f0000000080)=""/4096, 0x1000) 2018/04/22 16:11:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00001b3000)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000dc0000)={0xffffffff80000013}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000939ff4)={0x7}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000b1eff4)={0x1}) epoll_pwait(r1, &(0x7f0000dc7fc4)=[{}], 0x1, 0x0, &(0x7f0000dc7000), 0x8) 2018/04/22 16:11:47 executing program 5: r0 = epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000a09ff1)='net/ipv6_route\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000e37ff4)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/04/22 16:11:47 executing program 7: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002600)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000200)=[{&(0x7f0000002400)="5500000018007fafc22e1cb2a4a2f9930a06000000a84308910523693900090020000000010000001300050000000000000000dc1338d5440700000000000000fb83de4407aa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000002500)}, 0x0) 2018/04/22 16:11:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xffe7, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {0xa}, [@RTA_GATEWAY={0x14, 0x5, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14}}}]}, 0x30}, 0x1}, 0x0) 2018/04/22 16:11:48 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)="6664001a000000") exit(0x0) getdents64(r1, &(0x7f0000000080)=""/4096, 0x1000) 2018/04/22 16:11:48 executing program 2: mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="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") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/22 16:11:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 2018/04/22 16:11:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000380), 0x0, &(0x7f00000004c0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x3}, &(0x7f0000000440), &(0x7f0000000480)}}], 0x58}, 0x0) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/22 16:11:48 executing program 5: unshare(0x20000400) r0 = inotify_init() r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000280)={'erspan0\x00'}) 2018/04/22 16:11:48 executing program 0: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f0000399000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/22 16:11:48 executing program 7: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002600)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000200)=[{&(0x7f0000002400)="5500000018007fafc22e1cb2a4a2f9930a06000000a84308910523693900090020000000010000001300050000000000000000dc1338d5440700000000000000fb83de4407aa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000002500)}, 0x0) 2018/04/22 16:11:48 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) 2018/04/22 16:11:48 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x1) accept4$inet(r0, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 2018/04/22 16:11:49 executing program 5: io_setup(0xbc, &(0x7f0000000000)=0x0) r1 = socket(0x2, 0x806, 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040), 0x4e3}]) 2018/04/22 16:11:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 2018/04/22 16:11:49 executing program 7: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002600)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000200)=[{&(0x7f0000002400)="5500000018007fafc22e1cb2a4a2f9930a06000000a84308910523693900090020000000010000001300050000000000000000dc1338d5440700000000000000fb83de4407aa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000002500)}, 0x0) 2018/04/22 16:11:49 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="ff020400001b000500000000000000000000000000000205", 0x18) sendto$inet6(r0, &(0x7f0000f3afc2), 0x0, 0xfffffffffffffffd, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/22 16:11:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000380), 0x0, &(0x7f00000004c0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x3}, &(0x7f0000000440), &(0x7f0000000480)}}], 0x58}, 0x0) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/22 16:11:49 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffffffffffe) 2018/04/22 16:11:49 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@rand_addr, 0x0, 0x6c}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 2018/04/22 16:11:49 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12013, r0, 0x0) 2018/04/22 16:11:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000380), 0x0, &(0x7f00000004c0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x3}, &(0x7f0000000440), &(0x7f0000000480)}}], 0x58}, 0x0) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x22d3) 2018/04/22 16:11:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 2018/04/22 16:11:49 executing program 0: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, &(0x7f0000ae2fff)) 2018/04/22 16:11:49 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)="6664001a000000") exit(0x0) getdents64(r1, &(0x7f0000000080)=""/4096, 0x1000) 2018/04/22 16:11:49 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80001, 0x0) 2018/04/22 16:11:49 executing program 0: unshare(0x400) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40033, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8912, &(0x7f0000000140)) 2018/04/22 16:11:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 2018/04/22 16:11:49 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00004aaffc)=0x6, 0x239) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000d1b252)) 2018/04/22 16:11:50 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000000c0)) 2018/04/22 16:11:50 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x1, 0x0) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0x9) 2018/04/22 16:11:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:50 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/22 16:11:50 executing program 0: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/22 16:11:50 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x112, 0x4) sendto$inet6(r0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0xff, 0x4) recvmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x3a, &(0x7f0000001680)}, 0x2000) 2018/04/22 16:11:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff}) r1 = epoll_create(0x4) r2 = dup(r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000140)) 2018/04/22 16:11:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:50 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/22 16:11:50 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x112, 0x4) sendto$inet6(r0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0xff, 0x4) recvmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x3a, &(0x7f0000001680)}, 0x2000) 2018/04/22 16:11:50 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000000c0)) 2018/04/22 16:11:50 executing program 0: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/22 16:11:50 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)="6664001a000000") exit(0x0) getdents64(r1, &(0x7f0000000080)=""/4096, 0x1000) 2018/04/22 16:11:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:50 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/22 16:11:51 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x112, 0x4) sendto$inet6(r0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0xff, 0x4) recvmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x3a, &(0x7f0000001680)}, 0x2000) 2018/04/22 16:11:51 executing program 0: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/22 16:11:51 executing program 4: sysfs$2(0x2, 0x0, &(0x7f00000000c0)=""/37) 2018/04/22 16:11:51 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000000c0)) 2018/04/22 16:11:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f0000000080)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 2018/04/22 16:11:51 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000002ff6)=@file={0x1, '//..le0\x00'}, 0x6) 2018/04/22 16:11:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) dup3(r1, r2, 0x0) 2018/04/22 16:11:51 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}]}, 0x20}, 0x1}, 0x0) 2018/04/22 16:11:51 executing program 0: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000001240)='blacklist\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a}, &(0x7f00000012c0)='vboxnet0\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001200), 0x1000000000000082, 0x0) 2018/04/22 16:11:51 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x112, 0x4) sendto$inet6(r0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0xff, 0x4) recvmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x3a, &(0x7f0000001680)}, 0x2000) 2018/04/22 16:11:51 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000000c0)) 2018/04/22 16:11:51 executing program 6: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000dc4ff6)='./control\x00', 0x20) r1 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000044ff6)='./control\x00', 0x0) mkdirat(r1, &(0x7f00008b8ff6)='./file0\x00', 0x0) renameat2(r1, &(0x7f0000036ff6)='./control\x00', r1, &(0x7f0000036000)='./file0\x00', 0x2) 2018/04/22 16:11:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) close(r0) 2018/04/22 16:11:51 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) 2018/04/22 16:11:51 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000003ac0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000500), 0x6bb065368611ba7e}], 0x1, &(0x7f0000000000), 0xffffffffffffff48}}], 0x2, 0x0) 2018/04/22 16:11:51 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000200)) 2018/04/22 16:11:51 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x1000004, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/04/22 16:11:51 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x2], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) 2018/04/22 16:11:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) 2018/04/22 16:11:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000005ffc)=0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/04/22 16:11:52 executing program 7: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x5}}, 0x1c) 2018/04/22 16:11:52 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) 2018/04/22 16:11:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt(r0, 0x3a, 0x0, &(0x7f0000000080), 0x0) 2018/04/22 16:11:52 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) 2018/04/22 16:11:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18070000e4ffffff00000000028000008500000007000000bd070000000000009500000900000000"], &(0x7f0000000080), 0x1, 0xce, &(0x7f00000002c0)=""/206}, 0x48) 2018/04/22 16:11:52 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000200)) 2018/04/22 16:11:52 executing program 0: capget(&(0x7f0000000200)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000240)) 2018/04/22 16:11:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xef) read(r0, &(0x7f0000004f45)=""/187, 0xbb) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000013ffc)=0x2, 0x33) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000000c0)=@fragment, 0x8) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/22 16:11:52 executing program 6: pipe(&(0x7f00005dcff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000003940)="90", 0x1}], 0x1) write(r1, &(0x7f0000335000), 0xfc94) readv(r0, &(0x7f0000000040), 0x100000000000035d) 2018/04/22 16:11:52 executing program 2: r0 = perf_event_open(&(0x7f000005df88)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000b24000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000f3cfe0)=[{r1}], 0x1, &(0x7f0000723ff0)={0x0, 0x989680}, &(0x7f0000dbbff8), 0x8) dup3(r0, r1, 0x0) 2018/04/22 16:11:52 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/137, 0x89}], 0x1, &(0x7f0000000140)=""/221, 0xdd}, 0x2022) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00004b3fff), 0x380, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/22 16:11:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18070000e4ffffff00000000028000008500000007000000bd070000000000009500000900000000"], &(0x7f0000000080), 0x1, 0xce, &(0x7f00000002c0)=""/206}, 0x48) 2018/04/22 16:11:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_cmd={0x1c}}) 2018/04/22 16:11:53 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f000001cff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000001240)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f00000011c0), &(0x7f0000001200)}}, @cswp={0x58, 0x114, 0x7, {{}, &(0x7f0000001ff8), &(0x7f0000017000)}}], 0xb0}, 0x0) 2018/04/22 16:11:53 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000200)) 2018/04/22 16:11:53 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) 2018/04/22 16:11:53 executing program 2: unshare(0x400) r0 = socket(0x10, 0x2, 0x0) getpeername$netrom(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffffffffffd0) 2018/04/22 16:11:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18070000e4ffffff00000000028000008500000007000000bd070000000000009500000900000000"], &(0x7f0000000080), 0x1, 0xce, &(0x7f00000002c0)=""/206}, 0x48) 2018/04/22 16:11:53 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/137, 0x89}], 0x1, &(0x7f0000000140)=""/221, 0xdd}, 0x2022) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00004b3fff), 0x380, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/22 16:11:53 executing program 3: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00002f7000)) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x0, &(0x7f00000000c0), 0x8) 2018/04/22 16:11:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18070000e4ffffff00000000028000008500000007000000bd070000000000009500000900000000"], &(0x7f0000000080), 0x1, 0xce, &(0x7f00000002c0)=""/206}, 0x48) 2018/04/22 16:11:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) 2018/04/22 16:11:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000002, 0x300) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xc}}, 0x8) dup2(r1, r0) 2018/04/22 16:11:53 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='nfs4\x00', 0x8a1000, 0x0) rename(&(0x7f0000e6dff8)='./file0\x00', &(0x7f0000b76000)='./file1\x00') 2018/04/22 16:11:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x200000000d3, &(0x7f0000790ff0)=""/16, &(0x7f00004d1000)=0x10) 2018/04/22 16:11:53 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000200)) 2018/04/22 16:11:53 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/22 16:11:53 executing program 1: r0 = memfd_create(&(0x7f0000000000)="01", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000480)={{0x0, 0x2710}}, 0x0) 2018/04/22 16:11:53 executing program 2: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) llistxattr(&(0x7f0000000080)='..', &(0x7f00000000c0)=""/38, 0x26) [ 88.073340] device bridge_slave_1 left promiscuous mode [ 88.079258] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.090776] device bridge_slave_0 left promiscuous mode [ 88.096431] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/22 16:11:54 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create1(0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000001c0)) dup2(r3, r0) 2018/04/22 16:11:54 executing program 6: syz_emit_ethernet(0x2a, &(0x7f0000ad9000)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_request={0x16}}}}}, &(0x7f0000adaff4)) 2018/04/22 16:11:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000cb9ffc)=0x1, 0x4) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0x0, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001}, 0x10) 2018/04/22 16:11:54 executing program 5: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000002c0)=0x8, 0x4) 2018/04/22 16:11:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ipddp0\x00', &(0x7f0000000280)=ANY=[]}) 2018/04/22 16:11:54 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/137, 0x89}], 0x1, &(0x7f0000000140)=""/221, 0xdd}, 0x2022) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00004b3fff), 0x380, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/22 16:11:54 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) chown(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 2018/04/22 16:11:54 executing program 1: r0 = memfd_create(&(0x7f0000000000)="01", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000480)={{0x0, 0x2710}}, 0x0) [ 88.130383] team0 (unregistering): Port device team_slave_1 removed [ 88.140771] team0 (unregistering): Port device team_slave_0 removed [ 88.150335] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 88.166328] bond0 (unregistering): Releasing backup interface bond_slave_0 2018/04/22 16:11:54 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x2a8, 0x138, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, [], [], 'teql0\x00', 'ifb0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}, {{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr}, @ipv4={[], [0xff, 0xff], @rand_addr}, [], [], 'lo\x00', 'vlan0\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x308) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) 2018/04/22 16:11:54 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) [ 88.322100] bond0 (unregistering): Released all slaves 2018/04/22 16:11:54 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) tee(r0, 0xffffffffffffffff, 0x8434, 0x0) 2018/04/22 16:11:54 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000080), 0x1) 2018/04/22 16:11:54 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000994fd9)="2700000014001707030e0000120f0a0028171000f5fe0012ff000300078a151f75080039000500", 0x27) 2018/04/22 16:11:54 executing program 5: r0 = socket(0xa, 0x6, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) fallocate(r1, 0x0, 0x0, 0x3ff) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/04/22 16:11:54 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) 2018/04/22 16:11:54 executing program 6: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) [ 90.514870] IPVS: ftp: loaded support on port[0] = 21 [ 91.070681] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.077135] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.084647] device bridge_slave_0 entered promiscuous mode [ 91.123853] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.130280] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.137641] device bridge_slave_1 entered promiscuous mode [ 91.174753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 91.212665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 91.319978] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 91.359666] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 91.527336] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 91.534654] team0: Port device team_slave_0 added [ 91.571404] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.578704] team0: Port device team_slave_1 added [ 91.616528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.650986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.690162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.729863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.102526] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.108974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.115805] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.122220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.132374] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 92.959163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.522494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.653402] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 93.786228] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 93.792610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.800910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.929128] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/22 16:12:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x100000000009) r1 = accept(r0, &(0x7f0000317000)=ANY=[], &(0x7f0000123000)) listen(r1, 0x0) 2018/04/22 16:12:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:00 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) 2018/04/22 16:12:00 executing program 6: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) 2018/04/22 16:12:00 executing program 5: r0 = socket(0xa, 0x6, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) fallocate(r1, 0x0, 0x0, 0x3ff) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/04/22 16:12:00 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/137, 0x89}], 0x1, &(0x7f0000000140)=""/221, 0xdd}, 0x2022) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00004b3fff), 0x380, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/04/22 16:12:00 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) io_destroy(0x0) listen(r0, 0x1008007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x19b, &(0x7f0000000140)=[{0xffffffffffffffcc}], 0x10}}], 0x2, 0x0) 2018/04/22 16:12:00 executing program 1: r0 = memfd_create(&(0x7f0000000000)="01", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000480)={{0x0, 0x2710}}, 0x0) 2018/04/22 16:12:00 executing program 6: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) 2018/04/22 16:12:00 executing program 5: r0 = socket(0xa, 0x6, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) fallocate(r1, 0x0, 0x0, 0x3ff) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/04/22 16:12:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:00 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mincore(&(0x7f000021f000/0x1000)=nil, 0x1000, &(0x7f0000972fbf)=""/65) 2018/04/22 16:12:01 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) io_destroy(0x0) listen(r0, 0x1008007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x19b, &(0x7f0000000140)=[{0xffffffffffffffcc}], 0x10}}], 0x2, 0x0) 2018/04/22 16:12:01 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:01 executing program 5: r0 = socket(0xa, 0x6, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) fallocate(r1, 0x0, 0x0, 0x3ff) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/04/22 16:12:01 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010a000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5434, &(0x7f0000000000)) 2018/04/22 16:12:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:01 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) 2018/04/22 16:12:01 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) io_destroy(0x0) listen(r0, 0x1008007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x19b, &(0x7f0000000140)=[{0xffffffffffffffcc}], 0x10}}], 0x2, 0x0) 2018/04/22 16:12:01 executing program 1: r0 = memfd_create(&(0x7f0000000000)="01", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000480)={{0x0, 0x2710}}, 0x0) 2018/04/22 16:12:01 executing program 4: unshare(0x8000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = dup(r0) connect$bt_rfcomm(r1, &(0x7f0000000040)={0x1f}, 0xa) 2018/04/22 16:12:01 executing program 3: pipe(&(0x7f0000815000)={0x0, 0x0}) vmsplice(0xffffffffffffffff, &(0x7f0000eacfd0), 0x0, 0x0) dup2(r0, r1) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000140)='p', 0x1}], 0x1, 0x0) 2018/04/22 16:12:01 executing program 4: r0 = socket(0x1e, 0x805, 0x0) sendmsg$nl_generic(r0, &(0x7f00000015c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000001580)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:01 executing program 7: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x200000000114, 0x5, &(0x7f0000001000)=""/4, &(0x7f0000fcb000)=0x4) 2018/04/22 16:12:01 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:01 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x8000}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x4}) fcntl$lock(r0, 0x7, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x6}) 2018/04/22 16:12:02 executing program 3: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) read$eventfd(r0, &(0x7f0000000100), 0x8) 2018/04/22 16:12:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000c88ff6)={0x0, 0x0, 0x80000000000001aa}, 0xfef1) 2018/04/22 16:12:02 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) io_destroy(0x0) listen(r0, 0x1008007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x19b, &(0x7f0000000140)=[{0xffffffffffffffcc}], 0x10}}], 0x2, 0x0) 2018/04/22 16:12:02 executing program 4: r0 = socket(0x1e, 0x805, 0x0) sendmsg$nl_generic(r0, &(0x7f00000015c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000001580)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x1, 0x8, 0x0, &(0x7f0000000080), &(0x7f0000000040), 0x0) 2018/04/22 16:12:02 executing program 7: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f00000001c0)=@ethtool_cmd={0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x400]}}) 2018/04/22 16:12:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000200)="96", 0x1}], 0x1, &(0x7f0000000240)}, {&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c, &(0x7f000093e000), 0x0, &(0x7f000093ef10)=[@sndinfo={0x20, 0x84, 0x2}], 0x30}], 0x2, 0x200040c1) 2018/04/22 16:12:02 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x49, &(0x7f0000f6e000), 0x0) 2018/04/22 16:12:02 executing program 6: r0 = socket$inet(0x2, 0x80000000000003, 0x2) fsetxattr(r0, &(0x7f0000000080)=@random={'user.', '+GPLvboxnet1\x00'}, &(0x7f0000000040)='user{@\x00', 0xffffffffffffffa9, 0x0) 2018/04/22 16:12:02 executing program 0: madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2) madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2) 2018/04/22 16:12:02 executing program 4: r0 = socket(0x1e, 0x805, 0x0) sendmsg$nl_generic(r0, &(0x7f00000015c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000001580)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0xfffffffffffffffb, 0x4) 2018/04/22 16:12:02 executing program 7: creat(&(0x7f0000000000)='./file0\x00', 0x8a7f2804da18af8d) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 2018/04/22 16:12:02 executing program 1: setrlimit(0x7, &(0x7f0000a9cff8)) epoll_create1(0x0) 2018/04/22 16:12:02 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000003fc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000280)="5500000018007fafb72d1cb2a4a28093020600fc19a8430502262369250004ffffe90149bd50ca8a0348a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ac6220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) 2018/04/22 16:12:02 executing program 4: r0 = socket(0x1e, 0x805, 0x0) sendmsg$nl_generic(r0, &(0x7f00000015c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000001580)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:02 executing program 7: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = creat(&(0x7f000002cff4)='./file0/bus\x00', 0x800) write(r0, &(0x7f000002d000)="e0", 0x1) 2018/04/22 16:12:02 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) unshare(0x8000400) recvmsg(r0, &(0x7f00005b7000)={0x0, 0x0, &(0x7f0000ef4fc0), 0x0, &(0x7f0000edffaf)}, 0x2020) 2018/04/22 16:12:02 executing program 0: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 2018/04/22 16:12:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup2(r0, r0) sendto$ax25(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000001000)={0x3, {"d2ad79d62ab900"}}, 0x10) 2018/04/22 16:12:02 executing program 6: io_setup(0xda13, &(0x7f0000000080)) 2018/04/22 16:12:02 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) mmap(&(0x7f0000000000/0xaab000)=nil, 0xaab000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x800000000000010d, 0x2, &(0x7f000031df55)=""/4, &(0x7f0000b91000)=0x4) 2018/04/22 16:12:02 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) read(r0, &(0x7f0000000000)=""/44, 0x2c) 2018/04/22 16:12:03 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fgetxattr(r0, &(0x7f00000006c0)=@random={'trusted.', "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"}, &(0x7f0000000540)=""/43, 0x2b) 2018/04/22 16:12:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cmdline\x00') prctl$seccomp(0x16, 0x1, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pkey_alloc(0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000000000000044) 2018/04/22 16:12:03 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, r0, 0x0) 2018/04/22 16:12:03 executing program 1: r0 = socket(0x11, 0x4000000000080003, 0x0) unshare(0x8000400) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "41f5d5e2c97dec2160a34c44d34592c822fe0e765f2a5841fca2b68aeb25afac48c317423ca96e6bc3f1e8ee09267104fd55ada8e5e57a574a39f8889d3270"}, 0x60) 2018/04/22 16:12:03 executing program 0: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 2018/04/22 16:12:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup2(r0, r0) sendto$ax25(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000001000)={0x3, {"d2ad79d62ab900"}}, 0x10) 2018/04/22 16:12:03 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) dup2(r0, r1) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000440)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/04/22 16:12:03 executing program 5: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) [ 97.176124] audit: type=1326 audit(1524413523.174:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7496 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 2018/04/22 16:12:03 executing program 5: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 2018/04/22 16:12:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup2(r0, r0) sendto$ax25(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000001000)={0x3, {"d2ad79d62ab900"}}, 0x10) 2018/04/22 16:12:03 executing program 1: unshare(0x40600) r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x80000) ioctl$void(r0, 0x5450) 2018/04/22 16:12:03 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x61) 2018/04/22 16:12:03 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x52a}], 0x1) readv(r0, &(0x7f0000001040)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1) 2018/04/22 16:12:03 executing program 0: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 2018/04/22 16:12:03 executing program 5: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 2018/04/22 16:12:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000270031940000000000000000135e5d00b0081d1a160522188651a29b5a904c79805ad4a624b3d9bfbb53fb54cdf4f0a47ede2eb543c19c81831d0d51add4edb73cb3269380b458be4317fe975b7063d05f9e56cef4cbf6d3cf1f3b8640c22320245f885b462600bd5c29db9f9a98f07a923bdbce85ec3432997bc36bf147c6e03c1dd84107c281"], 0x1}, 0x1}, 0x0) [ 98.066166] audit: type=1326 audit(1524413524.064:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7496 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 2018/04/22 16:12:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup2(r0, r0) sendto$ax25(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000001000)={0x3, {"d2ad79d62ab900"}}, 0x10) 2018/04/22 16:12:04 executing program 3: setrlimit(0x20000000002, &(0x7f0000000240)={0x0, 0x400040000}) mmap(&(0x7f0000ef4000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:04 executing program 6: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7), &(0x7f0000000000)) 2018/04/22 16:12:04 executing program 0: unshare(0x28060400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 2018/04/22 16:12:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x18, 0x55, 0x3fd, 0x0, 0x0, {0x10000007}, [@generic="ff"]}, 0x18}, 0x1}, 0x0) 2018/04/22 16:12:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10000000000027, 0x331, 0x0, 0x0, {0x13}}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000000)=0xfffffffeffffffff, 0x4) bind$inet6(r0, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/22 16:12:04 executing program 7: socket$nl_xfrm(0x11, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/181, 0xb5}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2) [ 98.230546] PF_BRIDGE: br_mdb_parse() with unknown ifindex 2018/04/22 16:12:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f00001f1000)={&(0x7f00001fffe4)=@in6={0x2, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x80, &(0x7f00001d4000), 0x0, &(0x7f0000000000)=[{0x28, 0x29, 0x32, "ff0bd621db34ce2a77bedef24979c85cd2"}], 0x28}, 0x0) 2018/04/22 16:12:04 executing program 1: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f00000000c0)=""/4, 0x4) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) 2018/04/22 16:12:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x5, 0x201a7fd7, 0xa, 0x6a, 0xffffffc0}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x6, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/22 16:12:04 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/22 16:12:04 executing program 7: socket$nl_xfrm(0x11, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/181, 0xb5}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2) 2018/04/22 16:12:04 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_setup(0x5, &(0x7f0000000200)=0x0) io_submit(r1, 0x2, &(0x7f0000002540)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000240)}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000340)="91ad3f269d70c898160ffb1b952250f4af97eb823666a3a14f10c1d43d2912d9cd28b8b0328e50fd15c32666120aaa3383ac7b881059a9fffd666348a75daf68c22974a2f0e2fb98d7950ce2b4c1d65f4f20bc4459dda823bccc464b1bd79243ead7238817f7b32c5d37d0a43c7f47f65e87bcd34e4e8b79c29df359d8939373a300a749da903038089688a49b23dfef4789a61ef16c310ce2231e8ef6d5d00206167586fe28812f9407c6cd764f0e8f8cfa558a26a04b1d0836858f3282031a0ce9e9c0c8f7f637d213e35d9a1283c2c5fae08cb531ce393dc723df86bc3e5b675e35d99eb74600cc18a33829aaa33876b6874ff5698950fc88984dc9302f1c83c775d482599ba2f905afad818249f8602a9a5912d2894456b9675ae8b83117200ddd8d382eb0ac1f1a0214d19da56ac4f9848323897e0ba2e91aef0322ccd47421471c2cfff39c524d5441dbc56533e4ca4b1d18a00e1b3c14c5d701976f375859ce168caf89276ffad90ecd59be04eadd9d51613c90f1b678927fe350c1fa1088b1c311da34dd30d4eb302d33e2bcb2ca3926b87801555118b5d27a70239ddf4916d68137f69ddfd3a641ce970b63a12bdcfb50ed45b8f741c42e4f59c02c38cef3046a23ccc2fc706ad336f2d8cd1be9a62269fc816ba68a9966c849fb356cc1c030da06b418100c184d944809c91c7237d0aff7a3b82bff9fad4fa4fd515da2431313144a8b497d96dff1180602a7b7e7d8480b502ae478b6d4f9478b357c67fbdd1cd0fd8ddebb8a58a8d068186befea43bae7d6f927b0b538b4f2453711c3420c07706b99c4265cc5e091354960f3fe3b26f43c3467c8de2c4b95a0f6e123f0e98de038242a38305bfa518c1fcf43dc057d3051d83731ce1738df328c2ca28ecfdfb139a6b4dddea58a8e8444a78b11c21cbad93144931c938ddd9ca4e5266c2908b310d9ea5efa699351d073be9b8d6fb3295bb26a251ec21860dbf63ac4b3f3f3041aa3f0c8e500ad974f1eb4f4a14252f59c8f60efc94266ca667bcec33280b3993489022f2e348aa73842bf13e0b19c0b12963c2e9a0e23644b10e091f836f9302737c0f2cc15fd5e348a4cb32d6ab45e3253c2cf0dc961f43313eb9077b0d03e43233dc8d650e67c0a512f5cf4b10feb0a3b54029a1015e72bcf76a1c989fb01e8a211cae9dee3582bbced9813377591c068215c7325f510adb911d6c88194c2973539177660af958e00217b7c03bb17248fde929318142b69ac2dadd114342ddc70f33a45a0b5de4af786b026b2585dbddb8fcfcde2c75763f966eea73ec20f562c7e98d5f858f310806f314385ca17ce4ceeaf35fb01038829cc8db21a1f3d51caac4334ec1bd764c5d4d816153083f5d11b8348c9516f9260a766b8b21c86d3cd634c1ff7764986184507e9eaf8b4ee85a1b701a8a5ae44178c", 0x401}]) 2018/04/22 16:12:04 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'bond_slave_0\x00', {0x2}}) 2018/04/22 16:12:04 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0xca, &(0x7f00000001c0), 0x0) 2018/04/22 16:12:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/22 16:12:04 executing program 1: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f00000000c0)=""/4, 0x4) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) 2018/04/22 16:12:04 executing program 7: socket$nl_xfrm(0x11, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/181, 0xb5}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2) 2018/04/22 16:12:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x5, 0x201a7fd7, 0xa, 0x6a, 0xffffffc0}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x6, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/22 16:12:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x200000002, 0x78, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/99) 2018/04/22 16:12:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0x0, 0x20000000032, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000ea0000)='\b', 0x1) 2018/04/22 16:12:04 executing program 0: socket$inet6(0x10, 0x3, 0xffffffffffffffff) 2018/04/22 16:12:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/22 16:12:04 executing program 6: syz_emit_ethernet(0x366, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/22 16:12:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079", 0x18) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000000)='[', 0x1}], 0x1) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/22 16:12:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, &(0x7f0000000380)=0x90) 2018/04/22 16:12:04 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") ptrace$getenv(0x4201, r1, 0x0, &(0x7f0000000200)) 2018/04/22 16:12:04 executing program 1: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f00000000c0)=""/4, 0x4) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) 2018/04/22 16:12:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x401) sendto$inet6(r0, &(0x7f0000260000), 0xffad, 0x20000001, &(0x7f0000476694)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000b0fffc)=0x58, 0x0) 2018/04/22 16:12:04 executing program 7: socket$nl_xfrm(0x11, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/181, 0xb5}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2) 2018/04/22 16:12:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x5, 0x201a7fd7, 0xa, 0x6a, 0xffffffc0}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x6, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/22 16:12:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/22 16:12:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001680)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c, &(0x7f0000001280), 0x0, &(0x7f0000001500)}, 0x40) 2018/04/22 16:12:05 executing program 1: keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f00000000c0)=""/4, 0x4) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) 2018/04/22 16:12:05 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/22 16:12:05 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") ptrace$getenv(0x4201, r1, 0x0, &(0x7f0000000200)) 2018/04/22 16:12:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x5, 0x201a7fd7, 0xa, 0x6a, 0xffffffc0}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x6, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/22 16:12:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x401) sendto$inet6(r0, &(0x7f0000260000), 0xffad, 0x20000001, &(0x7f0000476694)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000b0fffc)=0x58, 0x0) 2018/04/22 16:12:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) 2018/04/22 16:12:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/195, 0xc3}], 0x1, 0x800) 2018/04/22 16:12:05 executing program 0: syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001ac0)=ANY=[]) 2018/04/22 16:12:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000bb5000), 0x8) 2018/04/22 16:12:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x401) sendto$inet6(r0, &(0x7f0000260000), 0xffad, 0x20000001, &(0x7f0000476694)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000b0fffc)=0x58, 0x0) 2018/04/22 16:12:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) sendmsg$netlink(r1, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000a77000)={0x2300}, 0x2300}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/22 16:12:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000400), 0xc) 2018/04/22 16:12:05 executing program 7: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), 0x4) 2018/04/22 16:12:05 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") ptrace$getenv(0x4201, r1, 0x0, &(0x7f0000000200)) 2018/04/22 16:12:05 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000009c0)="0cee1f32b3c1544126fbfc235dd2f34224da40") 2018/04/22 16:12:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@rand_addr}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'ccm_base(pcbc(aes-aesni),sm3-generic)\x00'}, 0x0, 0x60}}]}, 0x13c}, 0x1}, 0x0) 2018/04/22 16:12:06 executing program 3: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000335000), 0xfc94) close(r1) close(r0) 2018/04/22 16:12:06 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00006b5f98)={0x18, 0x1, 0x2, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}, 0x1}, 0x0) 2018/04/22 16:12:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:06 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") ptrace$getenv(0x4201, r1, 0x0, &(0x7f0000000200)) 2018/04/22 16:12:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) sendmsg$netlink(r1, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000a77000)={0x2300}, 0x2300}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/22 16:12:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x401) sendto$inet6(r0, &(0x7f0000260000), 0xffad, 0x20000001, &(0x7f0000476694)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000b0fffc)=0x58, 0x0) 2018/04/22 16:12:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000bb5000), 0x8) 2018/04/22 16:12:06 executing program 7: r0 = socket$inet6(0xa, 0x802, 0x0) shutdown(r0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x8) 2018/04/22 16:12:06 executing program 3: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') fchdir(r0) 2018/04/22 16:12:06 executing program 0: mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000ab2fe2)=""/30, &(0x7f0000000040)=0x1e) 2018/04/22 16:12:06 executing program 5: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x400) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f00000021c0)=""/4096, &(0x7f0000001600)=0x967791bd0cb162f9) 2018/04/22 16:12:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000bb5000), 0x8) 2018/04/22 16:12:06 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f5, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_map}) 2018/04/22 16:12:06 executing program 0: rt_sigprocmask(0x0, &(0x7f0000686ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000ddd000)="7d0000000000000000ffffffffea2159b1", 0x4) fallocate(r0, 0x0, 0x0, 0x3ff) 2018/04/22 16:12:06 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:06 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x3bb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/04/22 16:12:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x9}, @exit={0x95}], &(0x7f00000000c0)='GPL\x00', 0xfae2000000, 0xd5, &(0x7f0000000100)=""/213}, 0x48) 2018/04/22 16:12:06 executing program 6: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) sendmsg$netlink(r1, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000a77000)={0x2300}, 0x2300}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/22 16:12:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000bb5000), 0x8) 2018/04/22 16:12:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:06 executing program 0: unshare(0x40600) r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)) 2018/04/22 16:12:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:07 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x4000000ee, &(0x7f0000000080), &(0x7f0000000040)=0x3a9) 2018/04/22 16:12:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xe}, @multicast2=0xe0000002}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000240)={0x5, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2}}}, 0x108) 2018/04/22 16:12:07 executing program 0: r0 = memfd_create(&(0x7f0000000080)='ramfs\x00', 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000040)) 2018/04/22 16:12:08 executing program 3: r0 = memfd_create(&(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa}, 0xb) mknod(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000240), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000007060804002000fffc0c6565643b799365195f1b76"], 0x1000) 2018/04/22 16:12:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) sendmsg$netlink(r1, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000a77000)={0x2300}, 0x2300}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/22 16:12:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xe}, @multicast2=0xe0000002}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000240)={0x5, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2}}}, 0x108) 2018/04/22 16:12:08 executing program 6: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:08 executing program 0: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:08 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xe}, @multicast2=0xe0000002}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000240)={0x5, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2}}}, 0x108) 2018/04/22 16:12:08 executing program 0: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:08 executing program 6: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xe}, @multicast2=0xe0000002}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000240)={0x5, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2}}}, 0x108) 2018/04/22 16:12:08 executing program 4: mmap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000300), 0x4) 2018/04/22 16:12:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006980)=[{{&(0x7f0000000140)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001ac0), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000002d00)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000003340), 0x0, &(0x7f0000002d80)}}], 0x2, 0x0) 2018/04/22 16:12:09 executing program 0: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_cmd={0x8}}) 2018/04/22 16:12:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df82147bd46f000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/22 16:12:09 executing program 6: ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) 2018/04/22 16:12:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) recvmsg(r1, &(0x7f0000042fc8)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000a9000)}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000740ff5)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) 2018/04/22 16:12:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:10 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x73) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/22 16:12:10 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x8924, &(0x7f0000000240)=ANY=[@ANYBLOB="14072b4af20549ddfaad554293081ba50100005b"]) 2018/04/22 16:12:10 executing program 6: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)="00ad242538f92ebf9f6499aa66bf332efc8243b0390000") exit(0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 16:12:10 executing program 5: r0 = userfaultfd(0x0) fstat(r0, &(0x7f0000000000)) accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x5c70adf8}, &(0x7f0000000440)=0x8) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x43a9, &(0x7f0000000940)=0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/04/22 16:12:10 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xffffff0c) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:10 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x8924, &(0x7f0000000240)=ANY=[@ANYBLOB="14072b4af20549ddfaad554293081ba50100005b"]) 2018/04/22 16:12:10 executing program 4: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f000000a000)=@broute={'broute\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e80], 0x2, &(0x7f0000008000), &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]}, 0x210) 2018/04/22 16:12:11 executing program 5: r0 = userfaultfd(0x0) fstat(r0, &(0x7f0000000000)) accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x5c70adf8}, &(0x7f0000000440)=0x8) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x43a9, &(0x7f0000000940)=0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/04/22 16:12:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) ioctl$TIOCSBRK(r1, 0x40044591) 2018/04/22 16:12:11 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x8924, &(0x7f0000000240)=ANY=[@ANYBLOB="14072b4af20549ddfaad554293081ba50100005b"]) 2018/04/22 16:12:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) recvmsg(r1, &(0x7f0000042fc8)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000a9000)}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000740ff5)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) 2018/04/22 16:12:11 executing program 6: r0 = epoll_create1(0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000756000)={0x30000000}) 2018/04/22 16:12:11 executing program 5: r0 = userfaultfd(0x0) fstat(r0, &(0x7f0000000000)) accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x5c70adf8}, &(0x7f0000000440)=0x8) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x43a9, &(0x7f0000000940)=0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/04/22 16:12:11 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000002fe8)=[{0x84}, {0x6}]}, 0x10) 2018/04/22 16:12:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write$evdev(r0, &(0x7f0000d20f58)=[{{0x77359400}}, {}], 0xfffffe1c) ioctl$sock_inet_SIOCSARP(r0, 0x227d, &(0x7f000035bfbc)={{0x2, 0x0, @rand_addr}, {}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}) 2018/04/22 16:12:12 executing program 1: clock_gettime(0x3, &(0x7f00000000c0)) 2018/04/22 16:12:12 executing program 5: r0 = userfaultfd(0x0) fstat(r0, &(0x7f0000000000)) accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x5c70adf8}, &(0x7f0000000440)=0x8) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x43a9, &(0x7f0000000940)=0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) 2018/04/22 16:12:12 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)="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") fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x5) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/22 16:12:12 executing program 6: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) dup2(r1, r0) dup2(r0, r2) 2018/04/22 16:12:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) recvmsg(r1, &(0x7f0000042fc8)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000a9000)}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000740ff5)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) 2018/04/22 16:12:12 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00005ab000)=0x8, 0x4) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000fb3ffc), 0x4) 2018/04/22 16:12:12 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x8924, &(0x7f0000000240)=ANY=[@ANYBLOB="14072b4af20549ddfaad554293081ba50100005b"]) 2018/04/22 16:12:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000200000031ebf8c70000000000000000030005000000000002000000bc8a90d88fa2cecb0000000008001200020001000000000000000000100000de020100000012000000dbea001d00000121000000000000000000ffffe0000001000000000000000000000000"], 0x80}, 0x1}, 0x0) 2018/04/22 16:12:12 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 2018/04/22 16:12:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f0000667000)={&(0x7f00000002c0)=@allocspi={0xf8, 0x16, 0x5d04016144e95613, 0x0, 0x0, {{{@in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@rand_addr, 0x0, 0x6c}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x6}}, 0xf8}, 0x1}, 0x0) 2018/04/22 16:12:12 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) recvmsg(r0, &(0x7f0000004580)={&(0x7f0000004240)=@ll, 0x80, &(0x7f0000004480), 0x0, &(0x7f00000044c0)=""/171, 0xab}, 0x0) 2018/04/22 16:12:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) 2018/04/22 16:12:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') lseek(r0, 0x400002, 0x0) 2018/04/22 16:12:13 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)="2f70726f632f7379732f6e65742f697076342f76730f73796e635f726574726965730075cc5926ec5706a48a51fa074c1442f80f0efefac07f317fd365af832d4079f18ace199161493a7cc70b599a3660a286e263d939692154d0b26e98cce791ce8ac1ae51e93857ecd7d921f2b8e1edb35b8b2c9a1c228d607e37b40808fba486e61c0c3e687662905e2ace61fd6a0faecdf5241a7fe62d57135804f0767ab7", 0x7ffff, 0x0) 2018/04/22 16:12:13 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800aa829393e5c9f801f9db006d8215f54f96ca6500ff00b5d118"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/22 16:12:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000200000031ebf8c70000000000000000030005000000000002000000bc8a90d88fa2cecb0000000008001200020001000000000000000000100000de020100000012000000dbea001d00000121000000000000000000ffffe0000001000000000000000000000000"], 0x80}, 0x1}, 0x0) [ 107.078963] device lo entered promiscuous mode [ 107.126945] device lo left promiscuous mode [ 107.172191] device lo entered promiscuous mode 2018/04/22 16:12:13 executing program 4: unshare(0x40600) r0 = syz_fuse_mount(&(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000001400)=[{r0}], 0x1, 0x0) 2018/04/22 16:12:13 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280), &(0x7f00000002c0)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/22 16:12:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000200000031ebf8c70000000000000000030005000000000002000000bc8a90d88fa2cecb0000000008001200020001000000000000000000100000de020100000012000000dbea001d00000121000000000000000000ffffe0000001000000000000000000000000"], 0x80}, 0x1}, 0x0) 2018/04/22 16:12:13 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)="2f70726f632f7379732f6e65742f697076342f76730f73796e635f726574726965730075cc5926ec5706a48a51fa074c1442f80f0efefac07f317fd365af832d4079f18ace199161493a7cc70b599a3660a286e263d939692154d0b26e98cce791ce8ac1ae51e93857ecd7d921f2b8e1edb35b8b2c9a1c228d607e37b40808fba486e61c0c3e687662905e2ace61fd6a0faecdf5241a7fe62d57135804f0767ab7", 0x7ffff, 0x0) 2018/04/22 16:12:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) 2018/04/22 16:12:13 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800aa829393e5c9f801f9db006d8215f54f96ca6500ff00b5d118"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/22 16:12:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f000005eff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept(r0, &(0x7f0000f06000)=@rc, &(0x7f00008f4000)=0xa) recvmsg(r1, &(0x7f0000042fc8)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000a9000)}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000740ff5)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) 2018/04/22 16:12:13 executing program 6: unshare(0x400) r0 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3, 0x3ffffc}, 0x4) [ 107.753360] device lo left promiscuous mode 2018/04/22 16:12:13 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)="2f70726f632f7379732f6e65742f697076342f76730f73796e635f726574726965730075cc5926ec5706a48a51fa074c1442f80f0efefac07f317fd365af832d4079f18ace199161493a7cc70b599a3660a286e263d939692154d0b26e98cce791ce8ac1ae51e93857ecd7d921f2b8e1edb35b8b2c9a1c228d607e37b40808fba486e61c0c3e687662905e2ace61fd6a0faecdf5241a7fe62d57135804f0767ab7", 0x7ffff, 0x0) 2018/04/22 16:12:13 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800aa829393e5c9f801f9db006d8215f54f96ca6500ff00b5d118"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) [ 107.799579] device lo entered promiscuous mode 2018/04/22 16:12:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000200000031ebf8c70000000000000000030005000000000002000000bc8a90d88fa2cecb0000000008001200020001000000000000000000100000de020100000012000000dbea001d00000121000000000000000000ffffe0000001000000000000000000000000"], 0x80}, 0x1}, 0x0) 2018/04/22 16:12:13 executing program 6: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:13 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/22 16:12:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) 2018/04/22 16:12:14 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)="2f70726f632f7379732f6e65742f697076342f76730f73796e635f726574726965730075cc5926ec5706a48a51fa074c1442f80f0efefac07f317fd365af832d4079f18ace199161493a7cc70b599a3660a286e263d939692154d0b26e98cce791ce8ac1ae51e93857ecd7d921f2b8e1edb35b8b2c9a1c228d607e37b40808fba486e61c0c3e687662905e2ace61fd6a0faecdf5241a7fe62d57135804f0767ab7", 0x7ffff, 0x0) [ 108.033732] device lo left promiscuous mode [ 108.077068] device lo entered promiscuous mode 2018/04/22 16:12:14 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800aa829393e5c9f801f9db006d8215f54f96ca6500ff00b5d118"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/22 16:12:14 executing program 1: mkdir(&(0x7f0000000000)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/control\x00', 0x0) rename(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", &(0x7f0000000340)='./file0/control/file1\x00') 2018/04/22 16:12:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)={[0x3a, 0x0, 0x2f, 0x36]}, 0x4) socket$inet6(0xa, 0x2, 0x0) 2018/04/22 16:12:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) 2018/04/22 16:12:14 executing program 6: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:14 executing program 2: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:14 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000040), 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10}, 0x370, &(0x7f0000000300)={&(0x7f0000000000)={0x2fb, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x5}}, 0x325}, 0x1}, 0x0) 2018/04/22 16:12:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000180)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000dc0)=@connect={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x120) [ 108.729385] device lo left promiscuous mode [ 108.759692] device lo entered promiscuous mode [ 108.761168] netlink: 743 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/22 16:12:14 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xc0000001}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) 2018/04/22 16:12:14 executing program 1: unshare(0x400) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = dup2(r0, r0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 2018/04/22 16:12:14 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f00002d7000)=&(0x7f0000989fff)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f00003acf97)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f000017d000)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000400)=0x1000000000000001) 2018/04/22 16:12:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000400)=[{0x94, 0x0, 0x0, 0xfffff034}, {0x16}]}, 0x10) [ 108.829452] netlink: 743 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/22 16:12:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:14 executing program 2: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:14 executing program 6: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:15 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000040), 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10}, 0x370, &(0x7f0000000300)={&(0x7f0000000000)={0x2fb, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x5}}, 0x325}, 0x1}, 0x0) 2018/04/22 16:12:15 executing program 1: unshare(0x40600) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x800000010d, 0x4, &(0x7f000045affc), 0x0) 2018/04/22 16:12:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000233fe4)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2}, 0x1c) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 2018/04/22 16:12:15 executing program 7: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='schedstat\x00') exit(0x0) preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/61, 0x3d}], 0x1, 0x0) 2018/04/22 16:12:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 109.138507] netlink: 743 bytes leftover after parsing attributes in process `syz-executor3'. [ 109.243273] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 2018/04/22 16:12:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80401, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000400)=0x8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)=""/158) 2018/04/22 16:12:16 executing program 2: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:16 executing program 6: socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x4, 0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/04/22 16:12:16 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000040), 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10}, 0x370, &(0x7f0000000300)={&(0x7f0000000000)={0x2fb, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x5}}, 0x325}, 0x1}, 0x0) 2018/04/22 16:12:16 executing program 1: unshare(0x40600) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x800000010d, 0x4, &(0x7f000045affc), 0x0) 2018/04/22 16:12:16 executing program 7: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f0000044000)='ns/mnt\x00') setns(r0, 0x0) clone(0x3ef6a30f5168d923, &(0x7f00002c9000), &(0x7f0000000040), &(0x7f00001cc000), &(0x7f0000000080)) 2018/04/22 16:12:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:16 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x83, &(0x7f0000e86ff8)=0x6) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000002880)={0x5, 0x1, 0x101, 'queue1\x00', 0x4}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000140)={0xcc48, 0x80000001, 0x0, 'queue1\x00'}) [ 110.270411] netlink: 743 bytes leftover after parsing attributes in process `syz-executor3'. [ 110.277124] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 110.302216] IPVS: ftp: loaded support on port[0] = 21 2018/04/22 16:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:17 executing program 5: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000078eff8)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000653fff)) r0 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) mq_getsetattr(r0, &(0x7f0000000040), 0x0) 2018/04/22 16:12:17 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000040), 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10}, 0x370, &(0x7f0000000300)={&(0x7f0000000000)={0x2fb, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x5}}, 0x325}, 0x1}, 0x0) 2018/04/22 16:12:17 executing program 6: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my}, 0xc) 2018/04/22 16:12:17 executing program 1: unshare(0x40600) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x800000010d, 0x4, &(0x7f000045affc), 0x0) 2018/04/22 16:12:17 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_mreqn(r0, 0x114, 0x8, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000001380)=0xc) 2018/04/22 16:12:17 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000080)={0x0, ""/4096}, 0x1008, 0x1, 0x2000) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="01000007"], 0x1, 0x0) 2018/04/22 16:12:17 executing program 7: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f0000044000)='ns/mnt\x00') setns(r0, 0x0) clone(0x3ef6a30f5168d923, &(0x7f00002c9000), &(0x7f0000000040), &(0x7f00001cc000), &(0x7f0000000080)) [ 111.386478] netlink: 743 bytes leftover after parsing attributes in process `syz-executor3'. [ 111.394124] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 111.427620] IPVS: ftp: loaded support on port[0] = 21 2018/04/22 16:12:17 executing program 0: syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x0) 2018/04/22 16:12:17 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={r1, 0x10, "937187ed09572169d84182634235aec2"}, &(0x7f0000000180)=0x18) 2018/04/22 16:12:17 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x18}, 0x10) 2018/04/22 16:12:17 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_mreqn(r0, 0x114, 0x8, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000001380)=0xc) 2018/04/22 16:12:17 executing program 3: mkdir(&(0x7f000085cff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000c42fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000ff3000)='./file0\x00', &(0x7f0000c22000)='./file0\x00', &(0x7f000015d000)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/22 16:12:17 executing program 1: unshare(0x40600) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x800000010d, 0x4, &(0x7f000045affc), 0x0) 2018/04/22 16:12:17 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_mreqn(r0, 0x114, 0x8, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000001380)=0xc) 2018/04/22 16:12:17 executing program 5: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) [ 111.699191] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 2018/04/22 16:12:17 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00005b1000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}}}}}}, &(0x7f0000ea3000)) 2018/04/22 16:12:17 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @rand_addr=0x4b28}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000001d00)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/22 16:12:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000004d40)=[{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000240), 0x0, &(0x7f0000000580)=[@sndrcv={0x30, 0x84, 0x1}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x8000}}], 0x60}], 0x1, 0x0) 2018/04/22 16:12:17 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xa000, 0x3, &(0x7f0000ff4000/0xa000)=nil) syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') 2018/04/22 16:12:17 executing program 5: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) 2018/04/22 16:12:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000023afe8)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/04/22 16:12:18 executing program 7: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f0000044000)='ns/mnt\x00') setns(r0, 0x0) clone(0x3ef6a30f5168d923, &(0x7f00002c9000), &(0x7f0000000040), &(0x7f00001cc000), &(0x7f0000000080)) 2018/04/22 16:12:18 executing program 6: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x80800) read(r0, &(0x7f0000000000)=""/128, 0x80) 2018/04/22 16:12:18 executing program 5: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) 2018/04/22 16:12:18 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/22 16:12:18 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000540), &(0x7f0000000580)=0x4) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000680)=@nfc, &(0x7f0000000700)=0x80) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x42) mkdir(&(0x7f0000000100)='./file0//ile0\x00', 0x10000002007) 2018/04/22 16:12:18 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_mreqn(r0, 0x114, 0x8, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000001380)=0xc) 2018/04/22 16:12:18 executing program 0: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) 2018/04/22 16:12:18 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) 2018/04/22 16:12:18 executing program 5: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) 2018/04/22 16:12:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f000068b000)='io\x00') bind$alg(r0, &(0x7f0000d59fa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000140)=0x45, 0x1) 2018/04/22 16:12:18 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000abd000)=0x47bc7b3a, 0x4) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000a43ffc), &(0x7f00000bcffc)=0x4) 2018/04/22 16:12:18 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000340)={0x1d}, 0x10) 2018/04/22 16:12:18 executing program 0: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) 2018/04/22 16:12:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000023afe8)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/04/22 16:12:19 executing program 3: rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 2018/04/22 16:12:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) 2018/04/22 16:12:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000040)="040100000309c14609005375c52c876d886b6621d8d207ccf73f257e55e86eb29406136fcfffffffffbe62159403c7a616cf8c5ddf1a9b02680bef213647023c733abccbbed08efb", 0x48, 0x0, &(0x7f0000000180)={0xa, 0x800, 0x4, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/22 16:12:19 executing program 0: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x1, &(0x7f0000000080)="d4"}) 2018/04/22 16:12:19 executing program 6: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000100)=0x10) 2018/04/22 16:12:19 executing program 1: unshare(0x8000400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000000080)) 2018/04/22 16:12:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000023afe8)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/04/22 16:12:19 executing program 7: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f0000044000)='ns/mnt\x00') setns(r0, 0x0) clone(0x3ef6a30f5168d923, &(0x7f00002c9000), &(0x7f0000000040), &(0x7f00001cc000), &(0x7f0000000080)) 2018/04/22 16:12:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000023afe8)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/04/22 16:12:19 executing program 6: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$alg(r0, &(0x7f0000000fc0)=[{0x0, 0x0, &(0x7f0000000000), 0x264}, {0x0, 0x0, &(0x7f0000000240), 0x3db}], 0x2, 0x0) [ 113.204357] IPVS: ftp: loaded support on port[0] = 21 2018/04/22 16:12:19 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100), &(0x7f0000000000)=0xa9) 2018/04/22 16:12:19 executing program 1: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000140)='H', 0x1) sendfile(r0, r0, &(0x7f000079a000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='dev ', 0x4, 0x0) 2018/04/22 16:12:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) fcntl$setown(r1, 0x8, 0x0) symlinkat(&(0x7f0000003700)='./file0\x00', r1, &(0x7f0000003740)='./file0\x00') fcntl$notify(r0, 0x402, 0x10) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) 2018/04/22 16:12:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/04/22 16:12:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000000080)}}], 0x2, 0x24048011) [ 113.459797] random: crng init done 2018/04/22 16:12:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000a12fb8)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18090000005760000000000000a25c0071100c000000000015000000000000009500000000000000"], &(0x7f0000000140), 0x2, 0xfb, &(0x7f00000001c0)=""/251}, 0x48) 2018/04/22 16:12:20 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000040)) 2018/04/22 16:12:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) fcntl$setown(r1, 0x8, 0x0) symlinkat(&(0x7f0000003700)='./file0\x00', r1, &(0x7f0000003740)='./file0\x00') fcntl$notify(r0, 0x402, 0x10) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) 2018/04/22 16:12:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x20000000000fffe, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$eventfd(r1, &(0x7f0000000080), 0x8) write$eventfd(r1, &(0x7f0000000040), 0xfdc8) 2018/04/22 16:12:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/04/22 16:12:20 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000010, &(0x7f0000000040)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$ipx(r1, &(0x7f0000000c80)="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", 0x21d, 0x0, &(0x7f0000000000)={0x4, 0x0, 0x0, "98d3dba6bfff"}, 0x10) shutdown(r0, 0x2) 2018/04/22 16:12:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f000000dfee)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00002a7000)={0x14}) epoll_wait(r1, &(0x7f0000b11000)=[{}], 0x1, 0x0) 2018/04/22 16:12:20 executing program 6: unshare(0x8000400) r0 = socket$packet(0x11, 0x2, 0x300) pwrite64(r0, &(0x7f0000000100), 0x0, 0x0) 2018/04/22 16:12:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/04/22 16:12:20 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) fcntl$setown(r1, 0x8, 0x0) symlinkat(&(0x7f0000003700)='./file0\x00', r1, &(0x7f0000003740)='./file0\x00') fcntl$notify(r0, 0x402, 0x10) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) 2018/04/22 16:12:20 executing program 3: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/22 16:12:20 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000010, &(0x7f0000000040)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$ipx(r1, &(0x7f0000000c80)="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", 0x21d, 0x0, &(0x7f0000000000)={0x4, 0x0, 0x0, "98d3dba6bfff"}, 0x10) shutdown(r0, 0x2) 2018/04/22 16:12:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x20000000000fffe, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$eventfd(r1, &(0x7f0000000080), 0x8) write$eventfd(r1, &(0x7f0000000040), 0xfdc8) 2018/04/22 16:12:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f000063543e)='./file1\x00', 0x0) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 2018/04/22 16:12:20 executing program 6: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000080)="f0", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 16:12:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) fcntl$setown(r1, 0x8, 0x0) symlinkat(&(0x7f0000003700)='./file0\x00', r1, &(0x7f0000003740)='./file0\x00') fcntl$notify(r0, 0x402, 0x10) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) 2018/04/22 16:12:21 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000010, &(0x7f0000000040)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$ipx(r1, &(0x7f0000000c80)="e6578cbc22fdc7d4b287625bd3a7b7fb683981c3cae5989b6fc2c8ed3d6ae28b0e279a149b88cbb8717e0be8f64a86db7eb5fd41801ec8aae420416f409b332e3f1a44079723c371117b2d5f8bffaf18d43337887d17591bd1e4c31dc8cd5752fc52dc85872a13d9b7111c4f52051fcdb59f19c829529a9902b811b92af22d95678927e5387dc80657474572e4e33e0e5d8eedd87fbc5ee078461b6092c57c6a8d9cfca3a4c30ad498d34b1cb9471c8a0125c19edab161821fdafb3c92f5c05fd2c75c84bdd1699615473307e02d88d2d1fa76f6e7a78dc4f401605d228fce07f4266177465e9e91684ed238f254f539bde21f4e83a603c7dbd2dba16a1aa5b531475ee247fc74e318619a5021ebf7e64de23c0fbf43a5e9095ae5e8789ac1a1152d30222bbcbf3f48031dcacf613ff7ce9cdfb917342ad77e668a9ec884ab0b8f8711f8ff88c0f51ed3814dbb73a61f4c38d5fe4c755128a2d3e2866478292acf4afe24318416d3e427a2d21e926686e2258193a30baf0ffdd479de9cccf51c951a1c61dde3cac268a22326ec72701ce7482a5bb90aa0def2333a94c2166f94080b3e49c7d71992cc90d04ebd3863a0515d9a6107818d9ee07ecce009d91633da3fdc39e0e607e6cce0346f3ec2494eb153c5e8c04d68d4e28514c33a5fb1f715484beb8bc592be721250b6ad9d00f5f33171defe1aa7a1b7bbd00fa65285227fe59396bae2d3b27976722d586011f5f845cd8d2c615e0439998b94c9", 0x21d, 0x0, &(0x7f0000000000)={0x4, 0x0, 0x0, "98d3dba6bfff"}, 0x10) shutdown(r0, 0x2) 2018/04/22 16:12:21 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:21 executing program 6: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000080)="f0", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 16:12:21 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000ddd000)="266b5d967b9a95bfa9e22cec1d685e20510fe95c") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000ddd000)) 2018/04/22 16:12:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x20000000000fffe, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$eventfd(r1, &(0x7f0000000080), 0x8) write$eventfd(r1, &(0x7f0000000040), 0xfdc8) 2018/04/22 16:12:21 executing program 3: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:21 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:21 executing program 0: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:21 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000010, &(0x7f0000000040)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$ipx(r1, &(0x7f0000000c80)="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", 0x21d, 0x0, &(0x7f0000000000)={0x4, 0x0, 0x0, "98d3dba6bfff"}, 0x10) shutdown(r0, 0x2) 2018/04/22 16:12:21 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001580)='ntfs\x00', &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='uid=']) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/22 16:12:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x20000000000fffe, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$eventfd(r1, &(0x7f0000000080), 0x8) write$eventfd(r1, &(0x7f0000000040), 0xfdc8) 2018/04/22 16:12:22 executing program 3: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:22 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:22 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:22 executing program 6: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000080)="f0", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 16:12:22 executing program 0: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:22 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000012c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@timestamp={0xd}}}}}, &(0x7f0000ea3000)) 2018/04/22 16:12:22 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001580)='ntfs\x00', &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='uid=']) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/22 16:12:22 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x2201, 0xffffffffffffffff) 2018/04/22 16:12:22 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="080000000028000015"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/22 16:12:22 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001580)='ntfs\x00', &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='uid=']) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/22 16:12:22 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/22 16:12:22 executing program 7: setrlimit(0x7, &(0x7f0000becff0)) socket$kcm(0x29, 0x5, 0x0) 2018/04/22 16:12:22 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001580)='ntfs\x00', &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='uid=']) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/22 16:12:22 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/22 16:12:23 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/22 16:12:23 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/22 16:12:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x2, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f000074b000)={@remote={0xfe, 0x80, [], 0xbb}, 0x800, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1f}, 0x20) 2018/04/22 16:12:23 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000340)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "b6769d", 0x10, 0x3b, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2725ab", 0x0, "f58f41"}}}}}}}, 0x0) 2018/04/22 16:12:23 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000300), &(0x7f00000003c0)}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r1}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r3, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r2, r3, 0x0) 2018/04/22 16:12:23 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/22 16:12:23 executing program 6: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000080)="f0", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 16:12:23 executing program 3: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:23 executing program 0: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000021000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 2018/04/22 16:12:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:23 executing program 4: r0 = socket(0x11, 0x2, 0x81) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000300)='l', 0x1}], 0x1) 2018/04/22 16:12:23 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/22 16:12:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:23 executing program 4: r0 = socket(0x11, 0x2, 0x81) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000300)='l', 0x1}], 0x1) 2018/04/22 16:12:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:24 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/22 16:12:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:24 executing program 4: r0 = socket(0x11, 0x2, 0x81) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000300)='l', 0x1}], 0x1) 2018/04/22 16:12:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:24 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/22 16:12:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000080), &(0x7f0000000180)=0x4) 2018/04/22 16:12:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) preadv(r0, &(0x7f0000000240), 0x298, 0x0) 2018/04/22 16:12:24 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={"6c6f000000080000c8aa000000079900", {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x0, @loopback=0x7f000001}}) 2018/04/22 16:12:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000f4fc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000edff0)={&(0x7f0000000200)=@bridge_getneigh={0x28, 0x1e, 0xa21, 0x0, 0x0, {0x7}, [@IFLA_MASTER={0x8, 0xa}]}, 0x28}, 0x1}, 0x0) 2018/04/22 16:12:24 executing program 4: r0 = socket(0x11, 0x2, 0x81) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000300)='l', 0x1}], 0x1) 2018/04/22 16:12:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r1, r0, &(0x7f0000000140), 0x7) 2018/04/22 16:12:24 executing program 3: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:24 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) sendmmsg$inet_sctp(r0, &(0x7f0000001d40), 0x0, 0x0) 2018/04/22 16:12:24 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) 2018/04/22 16:12:24 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={"6c6f000000080000c8aa000000079900", {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x0, @loopback=0x7f000001}}) 2018/04/22 16:12:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000fb7fee)='/dev/input/event#\x00', 0x2, 0x101002) write(r0, &(0x7f0000255000)="2000000014001d07060e00000000ee0011000400f608ffff", 0x18) 2018/04/22 16:12:24 executing program 5: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req3={0x10001, 0x0, 0x1}, 0x1c) r1 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000b89fe4)=@req3={0x10001, 0x0, 0x1}, 0x1c) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00000000c0)}, 0x0) 2018/04/22 16:12:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) preadv(r0, &(0x7f0000000240), 0x298, 0x0) 2018/04/22 16:12:25 executing program 7: unshare(0x20000400) r0 = memfd_create(&(0x7f000056ffff)='\x00', 0x0) sendfile(r0, r0, 0x0, 0x0) 2018/04/22 16:12:25 executing program 1: unshare(0x400) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 2018/04/22 16:12:25 executing program 4: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:25 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={"6c6f000000080000c8aa000000079900", {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x0, @loopback=0x7f000001}}) 2018/04/22 16:12:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000040)=""/24, &(0x7f0000000000)=0xfd) 2018/04/22 16:12:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) preadv(r0, &(0x7f0000000240), 0x298, 0x0) 2018/04/22 16:12:25 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000cb1000)=0x55) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000001000)={0x77359400}, &(0x7f00008dd000), 0x0) futex(&(0x7f000000cffc), 0x1, 0x2000000000004, &(0x7f00000000c0), &(0x7f0000000000), 0x0) 2018/04/22 16:12:25 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) unshare(0x8000400) mkdir(&(0x7f0000024ff6)='./control\x00', 0x0) r1 = open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x40049409, r0) 2018/04/22 16:12:25 executing program 3: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:25 executing program 1: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000180)={[0x33, 0x2f]}, 0x2) 2018/04/22 16:12:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) preadv(r0, &(0x7f0000000240), 0x298, 0x0) 2018/04/22 16:12:25 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='*GPL[vmnet1@vmnet1{-vmnet@vboxnet0!vboxnet1+M\x00', 0x6e93ebbbcc0884ef, 0x0, &(0x7f0000664fc0)={0x0, 0x7, 0x2}) r1 = epoll_create(0x1f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000004ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f67ff4)={0x4}) ppoll(&(0x7f0000489fb8)=[{r1}], 0x1, &(0x7f0000377000), &(0x7f0000447ff8), 0x8) 2018/04/22 16:12:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x11400018}, 0xc) 2018/04/22 16:12:25 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200000005001a00ffffffff00000000000000000000000000000000000000000000000000000000"], 0x28}, 0x1}, 0x0) 2018/04/22 16:12:25 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={"6c6f000000080000c8aa000000079900", {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x0, @loopback=0x7f000001}}) 2018/04/22 16:12:25 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000480)=0x10, 0x80000) open(&(0x7f00000004c0)='./file0\x00', 0x40000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fremovexattr(r0, &(0x7f0000000000)=@known='user.syz\x00') 2018/04/22 16:12:25 executing program 1: r0 = userfaultfd(0x0) r1 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e8dfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f000075ef4e)=""/178, 0xb2}], 0x1000000000000363, &(0x7f000088efe0)=[{&(0x7f0000000040)=""/83, 0xfffffe83}], 0x1, 0x0) close(r0) 2018/04/22 16:12:26 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200000005001a00ffffffff00000000000000000000000000000000000000000000000000000000"], 0x28}, 0x1}, 0x0) 2018/04/22 16:12:26 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000a28ef8)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000e6d000)={0x3, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x190) 2018/04/22 16:12:26 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000d8b000)="0107040600", 0x5) 2018/04/22 16:12:26 executing program 2: r0 = socket$inet(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6, 0xe, &(0x7f0000000000)=@broute={'\n\x00oute\x00', 0x20, 0x8, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20d9f000], 0x0, &(0x7f0000d9e000), &(0x7f00000b6000)=[{}]}, 0xa8) 2018/04/22 16:12:26 executing program 4: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001400)='/dev/ppp\x00', 0x40401, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) write$binfmt_misc(r0, &(0x7f0000001480)={'syz1'}, 0x4) 2018/04/22 16:12:26 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000cb1000)=0x55) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000001000)={0x77359400}, &(0x7f00008dd000), 0x0) futex(&(0x7f000000cffc), 0x1, 0x2000000000004, &(0x7f00000000c0), &(0x7f0000000000), 0x0) 2018/04/22 16:12:26 executing program 3: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:26 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6098b0480014210000000000000000000000000000040000fe8000000000000000000000000000aa00000000ae199c06ff5883607ca6ed0fac1eff4bda6470c2a59a0c52934b979a2eb13af5a2656ae81a", @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f0000000080)) 2018/04/22 16:12:27 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200000005001a00ffffffff00000000000000000000000000000000000000000000000000000000"], 0x28}, 0x1}, 0x0) 2018/04/22 16:12:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) flistxattr(r0, &(0x7f0000000280), 0x0) 2018/04/22 16:12:27 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000a000)={&(0x7f0000c6cff4)={0x10}, 0xc, &(0x7f0000001000)={&(0x7f0000004000)=@bridge_getlink={0x20, 0x12, 0x305, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) 2018/04/22 16:12:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000280)="e59fc053dce404317bb51f597ea6feb27c6371100ca682c212f7feadb3af32ac0ea507d00f1e8b1530b7", 0x2a}], 0x1) 2018/04/22 16:12:27 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x3, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x3, 0x1000000200007d}) 2018/04/22 16:12:27 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6) 2018/04/22 16:12:27 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200000005001a00ffffffff00000000000000000000000000000000000000000000000000000000"], 0x28}, 0x1}, 0x0) 2018/04/22 16:12:27 executing program 1: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f00009b6ff9)='ns/mnt\x00') setns(r0, 0x20000) 2018/04/22 16:12:27 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/22 16:12:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000b80)={&(0x7f0000000440)=@getlink={0x34, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'gretap0\x00'}]}, 0x34}, 0x1}, 0x0) 2018/04/22 16:12:27 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6) 2018/04/22 16:12:27 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) 2018/04/22 16:12:27 executing program 1: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f00009b6ff9)='ns/mnt\x00') setns(r0, 0x20000) 2018/04/22 16:12:27 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/22 16:12:27 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000cb1000)=0x55) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000001000)={0x77359400}, &(0x7f00008dd000), 0x0) futex(&(0x7f000000cffc), 0x1, 0x2000000000004, &(0x7f00000000c0), &(0x7f0000000000), 0x0) 2018/04/22 16:12:27 executing program 4: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:27 executing program 3: r0 = syz_open_dev$mice(&(0x7f00002ac000)='/dev/input/mice\x00', 0x0, 0x42) readv(r0, &(0x7f000003f000)=[{&(0x7f00004dcfe1)=""/31, 0x1f}], 0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00008d1000), 0x401) 2018/04/22 16:12:27 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6) 2018/04/22 16:12:27 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) 2018/04/22 16:12:27 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/22 16:12:27 executing program 1: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f00009b6ff9)='ns/mnt\x00') setns(r0, 0x20000) 2018/04/22 16:12:28 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) 2018/04/22 16:12:28 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6) 2018/04/22 16:12:28 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)={[0x37, 0x2d, 0x36]}, 0x3) 2018/04/22 16:12:28 executing program 1: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f00009b6ff9)='ns/mnt\x00') setns(r0, 0x20000) 2018/04/22 16:12:28 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/22 16:12:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) r1 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x7}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/22 16:12:28 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = gettid() ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0xffffffff}, 0x8) timer_create(0x3, &(0x7f0000547fa8)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, &(0x7f0000105000)) 2018/04/22 16:12:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/04/22 16:12:28 executing program 5: request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="994277d06c1e520913000000000000200441", 0x0) 2018/04/22 16:12:28 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) 2018/04/22 16:12:28 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000cb1000)=0x55) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000001000)={0x77359400}, &(0x7f00008dd000), 0x0) futex(&(0x7f000000cffc), 0x1, 0x2000000000004, &(0x7f00000000c0), &(0x7f0000000000), 0x0) 2018/04/22 16:12:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 122.771914] IPv4: Oversized IP packet from 127.0.0.1 2018/04/22 16:12:28 executing program 5: request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="994277d06c1e520913000000000000200441", 0x0) 2018/04/22 16:12:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) [ 122.827474] IPv4: Oversized IP packet from 127.0.0.1 2018/04/22 16:12:28 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100), 0x0) 2018/04/22 16:12:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/22 16:12:28 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) 2018/04/22 16:12:29 executing program 5: request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="994277d06c1e520913000000000000200441", 0x0) 2018/04/22 16:12:29 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000aba000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000831000)={0x14, 0x0, 0x4, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/04/22 16:12:29 executing program 5: request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="994277d06c1e520913000000000000200441", 0x0) 2018/04/22 16:12:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) io_setup(0x23, &(0x7f0000c6b000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00001b0000)}]) 2018/04/22 16:12:29 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={"426f6e64300000d24865c6eb37369b02", 0x1}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 2018/04/22 16:12:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000331000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000201000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000c7ff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0xc0) connect$unix(r0, &(0x7f0000d6a000)=@file={0x1, './file0\x00'}, 0xa) close(r0) 2018/04/22 16:12:29 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = gettid() ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0xffffffff}, 0x8) timer_create(0x3, &(0x7f0000547fa8)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, &(0x7f0000105000)) 2018/04/22 16:12:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) 2018/04/22 16:12:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x10000) keyctl$describe(0x6, r0, &(0x7f00000001c0)=""/56, 0x38) 2018/04/22 16:12:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000331000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000201000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000c7ff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0xc0) connect$unix(r0, &(0x7f0000d6a000)=@file={0x1, './file0\x00'}, 0xa) close(r0) 2018/04/22 16:12:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800aa829393e5c9f801f9db006d8215f54f96ca6500ff00b5d108"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/22 16:12:30 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000846ff0)={0x2, &(0x7f0000111fe8)=[{0x4c}, {0x6}]}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000007000)={&(0x7f0000006000)={0x10}, 0xc, &(0x7f0000000ff0)={&(0x7f000000c000)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in6=@mcast2={0xff, 0x2, [], 0x1}}}, 0x28}, 0x1}, 0x0) 2018/04/22 16:12:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00001c0000)={0xa}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00001e9ff7)='net/udp6\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/245, 0xf5}], 0x1, 0x0) 2018/04/22 16:12:30 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)) 2018/04/22 16:12:30 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000660000)={0x0, @in={{0x2}}}, &(0x7f00000c8000)=0x8c) 2018/04/22 16:12:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000331000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000201000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000c7ff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0xc0) connect$unix(r0, &(0x7f0000d6a000)=@file={0x1, './file0\x00'}, 0xa) close(r0) 2018/04/22 16:12:30 executing program 2: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000c1d000)={0x1}) timerfd_settime(r1, 0x0, &(0x7f0000000fe0)={{}, {0x0, 0x989680}}, &(0x7f0000c20000)) r2 = fcntl$dupfd(r0, 0x0, r0) epoll_pwait(r2, &(0x7f0000000040)=[{}], 0x1, 0x1f, &(0x7f00000000c0), 0x8) 2018/04/22 16:12:30 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg$kcm(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000100), 0x219, &(0x7f0000000080)}, 0x0) 2018/04/22 16:12:30 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000001000), &(0x7f0000012000)=0x4) dup3(r1, r0, 0x0) 2018/04/22 16:12:30 executing program 5: migrate_pages(0x0, 0x209, &(0x7f0000000340), &(0x7f0000000380)=0xffffffffffffffff) 2018/04/22 16:12:30 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00006a4000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffa888, 0x0, 0x0, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp}}}}, &(0x7f0000000040)) 2018/04/22 16:12:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000331000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000201000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000c7ff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0xc0) connect$unix(r0, &(0x7f0000d6a000)=@file={0x1, './file0\x00'}, 0xa) close(r0) 2018/04/22 16:12:30 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) 2018/04/22 16:12:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1000000000001, 0xa, 0xff, 0xffffffdf00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000180)=""/231}, 0x18) 2018/04/22 16:12:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) 2018/04/22 16:12:30 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = gettid() ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0xffffffff}, 0x8) timer_create(0x3, &(0x7f0000547fa8)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, &(0x7f0000105000)) 2018/04/22 16:12:30 executing program 5: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000161000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}]}, &(0x7f0000f91ffc)=0xfffffffffffffd67) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000c43000)='GPL\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) 2018/04/22 16:12:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000ff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f00000001c0)=[{0x48}, {0x6}]}, 0x10) sendto$unix(r1, &(0x7f000005a000), 0x0, 0x0, &(0x7f0000000000)=@abs, 0x8) 2018/04/22 16:12:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) 2018/04/22 16:12:31 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @random="7d73cf61100f", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x12, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000000000)) 2018/04/22 16:12:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='ac']) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)="6e66733400230762e3e4f82fd73ba23111c3204976e99c2af4275efffbd0167af0478f2611efaa3c3fb23b8e6438717fe09ac634593b08e145f0173ca75eea55309b760bbb19c32a167e2bcc72c92aba1ef76da346361702965d5e06a682e2d7331112f3fa0373c4c52c41ebcd88e45d30410bb09dfcf50cb0aea24b502c58db117753e040010fb36265df35b80399", 0x0, &(0x7f0000000240)) 2018/04/22 16:12:31 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000bbeff4)) shutdown(r0, 0x2) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) 2018/04/22 16:12:31 executing program 1: getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw6\x00') lseek(r0, 0x17, 0x0) 2018/04/22 16:12:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') r1 = socket$inet(0x2b, 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000140), 0x1) 2018/04/22 16:12:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0xfe) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000100)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/22 16:12:31 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) 2018/04/22 16:12:31 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f00006fcff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000b0ef98)={0x0, 0x9, 0x60}) 2018/04/22 16:12:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) 2018/04/22 16:12:31 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = gettid() ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0xffffffff}, 0x8) timer_create(0x3, &(0x7f0000547fa8)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, &(0x7f0000105000)) 2018/04/22 16:12:31 executing program 1: clock_adjtime(0x0, &(0x7f0000000000)={0xa26e}) 2018/04/22 16:12:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0xfe) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000100)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/22 16:12:31 executing program 5: r0 = socket(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000c50000)={0x3, &(0x7f0000f13fe0)=[{0x2, 0x0, 0x0, 0x4}, {0x60, 0x0, 0x0, 0x4}, {0x6}]}, 0x10) 2018/04/22 16:12:32 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000075bff7)='/dev/rtc\x00', 0x0, 0x0) close(r0) mq_timedsend(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) 2018/04/22 16:12:32 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) 2018/04/22 16:12:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000180)="2f000000000000002a3d7208ff0900") 2018/04/22 16:12:32 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='loginuid\x00') sendfile(r0, r1, &(0x7f0000000000), 0x200000001000ff) 2018/04/22 16:12:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback={0x0, 0x1}, @in6, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@broadcast=0xffffffff, 0x0, 0x33}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}, 0xe8) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) 2018/04/22 16:12:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0xfe) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000100)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/22 16:12:32 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000001f8d)="390000001300090468fe0000810000000700004003000000450001070000001419001a000400020007000012020000080001010c00f41ee400", 0x39}], 0x1) 2018/04/22 16:12:32 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='!\x00') 2018/04/22 16:12:32 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="fc00000016000700ab040008090007000a0022590200000004000300e0000100004533a49e3500a60000000000036d15fa2c1ec2ff12f0009bb9de061219d07f1500020000008ce6036c6c258f1a273c2e117c22ebc247ad4306000009db8934d07302ad1720d7d5bbc9fc3d2e80772c81fb2cc56ce1f0f156272f5ba4fdcf3cde045a32e200fc83ab82f60af70c9d00f2fe0800000003000000000000040112bab2b9d243f295ede0ad91bd0734babc7c3f2eeb57d439d16b17e583df150c000000000000004867b4d5715505e658a1ad874f01731d05b000240041d40126ed7eee36deecdd108f6ff6b60000000000000040429fd3000175e63fb8", 0xfc) 2018/04/22 16:12:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000d40)={0x1, &(0x7f0000000080)=[{0x40006, 0x0, 0x0, 0xa85}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/22 16:12:32 executing program 7: unshare(0x400) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000080), 0x4) 2018/04/22 16:12:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0xfe) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000100)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/22 16:12:32 executing program 1: clone(0x0, &(0x7f0000e02000), &(0x7f000006fffc), &(0x7f0000e9cffc), &(0x7f0000cd6f68)) wait4(0xffffffffffffffff, 0x0, 0x40000008, 0x0) 2018/04/22 16:12:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x74}) 2018/04/22 16:12:32 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x4401000000001278, &(0x7f0000000040)) [ 126.936780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/22 16:12:33 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) 2018/04/22 16:12:33 executing program 6: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)="6664001a000000") exit(0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/04/22 16:12:33 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) timer_create(0x0, &(0x7f0000978fa0), &(0x7f0000044000)) ppoll(&(0x7f0000b7fff0)=[{r2}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) 2018/04/22 16:12:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000b90000), &(0x7f0000758ffc)=0x4) 2018/04/22 16:12:33 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x80045105) 2018/04/22 16:12:33 executing program 7: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@empty, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}}) 2018/04/22 16:12:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x71, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2018/04/22 16:12:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000040)=0x8, 0x4) sendto$inet(r0, &(0x7f00006fd000)="c3", 0x1, 0x0, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/22 16:12:34 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x119, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80}}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}]}, 0x40}, 0x1}, 0x0) 2018/04/22 16:12:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000d40)={0x1, &(0x7f0000000080)=[{0x40006, 0x0, 0x0, 0xa85}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/22 16:12:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x81a, &(0x7f0000000080)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000640)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='vxfs\x00', 0x8003080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x500f, &(0x7f00000e7000)) mount(&(0x7f0000000040)='.', &(0x7f0000852000)='.', &(0x7f0000000240)='ramfs\x00', 0x3002, &(0x7f0000000100)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000003040)=""/4096, 0x1000}], 0x1000000000000062, 0x0) 2018/04/22 16:12:34 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) timer_create(0x0, &(0x7f0000978fa0), &(0x7f0000044000)) ppoll(&(0x7f0000b7fff0)=[{r2}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) 2018/04/22 16:12:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) recvfrom(r0, &(0x7f0000000700), 0x0, 0x0, 0x0, 0x0) 2018/04/22 16:12:34 executing program 6: writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)="8e6a0aacd461c202d03317a4f9a1d8ed2c12", 0x12}], 0x1) mknod$loop(&(0x7f0000dceff8)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f0000000040)) [ 128.285617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/22 16:12:34 executing program 1: clock_settime(0xfffffffffffffffe, &(0x7f0000000000)={0x77359400}) 2018/04/22 16:12:34 executing program 0: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8001, &(0x7f0000000000)=0x8001, 0x6, 0x2) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x0, 0x0) 2018/04/22 16:12:34 executing program 6: writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)="8e6a0aacd461c202d03317a4f9a1d8ed2c12", 0x12}], 0x1) mknod$loop(&(0x7f0000dceff8)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f0000000040)) 2018/04/22 16:12:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={"6c6f0000ff00000000000029490bee00", &(0x7f00000000c0)=@ethtool_eee={0x45}}) 2018/04/22 16:12:34 executing program 7: pkey_mprotect(&(0x7f0000671000/0x4000)=nil, 0xffffffffffffff6a, 0x0, 0xffffffffffffffff) 2018/04/22 16:12:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000d40)={0x1, &(0x7f0000000080)=[{0x40006, 0x0, 0x0, 0xa85}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/22 16:12:34 executing program 7: sendmsg(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="cf61", 0x2}], 0x1, &(0x7f00000002c0)}, 0x0) mkdir(&(0x7f0000000180)='.', 0x0) 2018/04/22 16:12:34 executing program 1: mkdir(&(0x7f00001af000)='./file0\x00', 0x0) mount(&(0x7f00000d0ff8)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) 2018/04/22 16:12:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/216, 0xd8}], 0x1) [ 128.587404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/22 16:12:34 executing program 6: writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)="8e6a0aacd461c202d03317a4f9a1d8ed2c12", 0x12}], 0x1) mknod$loop(&(0x7f0000dceff8)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f0000000040)) 2018/04/22 16:12:34 executing program 7: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"d202b999cf85000000000088f301e710"}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x28060400) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000000040)) 2018/04/22 16:12:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000d40)={0x1, &(0x7f0000000080)=[{0x40006, 0x0, 0x0, 0xa85}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/22 16:12:36 executing program 6: writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)="8e6a0aacd461c202d03317a4f9a1d8ed2c12", 0x12}], 0x1) mknod$loop(&(0x7f0000dceff8)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f0000000040)) 2018/04/22 16:12:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/216, 0xd8}], 0x1) 2018/04/22 16:12:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x81a, &(0x7f0000000080)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000640)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='vxfs\x00', 0x8003080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x500f, &(0x7f00000e7000)) mount(&(0x7f0000000040)='.', &(0x7f0000852000)='.', &(0x7f0000000240)='ramfs\x00', 0x3002, &(0x7f0000000100)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000003040)=""/4096, 0x1000}], 0x1000000000000062, 0x0) 2018/04/22 16:12:36 executing program 1: mkdir(&(0x7f00001af000)='./file0\x00', 0x0) mount(&(0x7f00000d0ff8)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) 2018/04/22 16:12:36 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) timer_create(0x0, &(0x7f0000978fa0), &(0x7f0000044000)) ppoll(&(0x7f0000b7fff0)=[{r2}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) 2018/04/22 16:12:36 executing program 0: mkdir(&(0x7f00000e1000)='./file0\x00', 0x0) r0 = open(&(0x7f0000851000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f000003f154)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00004a9000)=""/4096, 0x1000) getdents64(r1, &(0x7f00000000c0)=""/83, 0x37e) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/22 16:12:36 executing program 7: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"d202b999cf85000000000088f301e710"}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x28060400) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000000040)) [ 130.193980] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/22 16:12:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/216, 0xd8}], 0x1) 2018/04/22 16:12:36 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x100000001}}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000000100)=[{}], 0x1, 0x62dc9b1c) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002015}) 2018/04/22 16:12:36 executing program 1: mkdir(&(0x7f00001af000)='./file0\x00', 0x0) mount(&(0x7f00000d0ff8)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) 2018/04/22 16:12:36 executing program 7: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"d202b999cf85000000000088f301e710"}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x28060400) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000000040)) 2018/04/22 16:12:36 executing program 0: mkdir(&(0x7f00000e1000)='./file0\x00', 0x0) r0 = open(&(0x7f0000851000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f000003f154)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00004a9000)=""/4096, 0x1000) getdents64(r1, &(0x7f00000000c0)=""/83, 0x37e) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/22 16:12:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/216, 0xd8}], 0x1) 2018/04/22 16:12:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x402c542c, 0x0) 2018/04/22 16:12:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x81a, &(0x7f0000000080)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000640)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='vxfs\x00', 0x8003080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x500f, &(0x7f00000e7000)) mount(&(0x7f0000000040)='.', &(0x7f0000852000)='.', &(0x7f0000000240)='ramfs\x00', 0x3002, &(0x7f0000000100)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000003040)=""/4096, 0x1000}], 0x1000000000000062, 0x0) 2018/04/22 16:12:37 executing program 1: mkdir(&(0x7f00001af000)='./file0\x00', 0x0) mount(&(0x7f00000d0ff8)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) 2018/04/22 16:12:37 executing program 7: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"d202b999cf85000000000088f301e710"}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x28060400) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000000040)) 2018/04/22 16:12:37 executing program 0: mkdir(&(0x7f00000e1000)='./file0\x00', 0x0) r0 = open(&(0x7f0000851000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f000003f154)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00004a9000)=""/4096, 0x1000) getdents64(r1, &(0x7f00000000c0)=""/83, 0x37e) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/22 16:12:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa}}]}, 0x38}, 0x1}, 0x0) 2018/04/22 16:12:37 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000dc5000)='/dev/hwrng\x00', 0x0, 0x0) unshare(0x400) fchmod(r0, 0x0) 2018/04/22 16:12:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x81a, &(0x7f0000000080)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000640)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='vxfs\x00', 0x8003080, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x500f, &(0x7f00000e7000)) mount(&(0x7f0000000040)='.', &(0x7f0000852000)='.', &(0x7f0000000240)='ramfs\x00', 0x3002, &(0x7f0000000100)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000003040)=""/4096, 0x1000}], 0x1000000000000062, 0x0) 2018/04/22 16:12:37 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000040)=""/217) close(0xffffffffffffffff) 2018/04/22 16:12:37 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) timer_create(0x0, &(0x7f0000978fa0), &(0x7f0000044000)) ppoll(&(0x7f0000b7fff0)=[{r2}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) 2018/04/22 16:12:37 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x0, 0x2}], 0x18) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x2, 0x8, 0x401}, {}], 0x30) 2018/04/22 16:12:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x6) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet(r0, &(0x7f0000000540)='{', 0x1, 0x4008000, &(0x7f0000de5ff0)={0x2}, 0x10) dup3(r1, r0, 0x0) 2018/04/22 16:12:37 executing program 4: faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80, 0x0) 2018/04/22 16:12:37 executing program 0: mkdir(&(0x7f00000e1000)='./file0\x00', 0x0) r0 = open(&(0x7f0000851000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f000003f154)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00004a9000)=""/4096, 0x1000) getdents64(r1, &(0x7f00000000c0)=""/83, 0x37e) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/22 16:12:37 executing program 6: r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f0000000300), 0x3d9, &(0x7f0000000280)}}, {{&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "99066c9aa4c2fbbf0aecb573b9d1bdc8be397716e627f0d1865ea32e0822c1026f14d27d9eb2214e9b34beb87de5d3aab05c161c037b28907fcb4fa979f696"}, 0x60, &(0x7f0000000f80), 0x0, &(0x7f0000002480)}}], 0x2, 0x0) 2018/04/22 16:12:37 executing program 7: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_ipx_SIOCAIPXITFCRT(r0, 0x89e0, &(0x7f0000000000)) 2018/04/22 16:12:37 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) sendto$inet6(r0, &(0x7f0000f3afc2), 0x0, 0x0, &(0x7f0000b86000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/22 16:12:38 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f00000000c0)='[*[\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000006680)=0xc) 2018/04/22 16:12:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x7ffff}]}]}, 0x28}, 0x1}, 0x0) 2018/04/22 16:12:38 executing program 6: unshare(0x8000400) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/22 16:12:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x6) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet(r0, &(0x7f0000000540)='{', 0x1, 0x4008000, &(0x7f0000de5ff0)={0x2}, 0x10) dup3(r1, r0, 0x0) 2018/04/22 16:12:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000eccfa8)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6e6", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000094fc8)=[{0x0, 0x0, &(0x7f0000d55000)=[{&(0x7f0000823f4f)="b6d9606ea7d8517947f8eb00fc75cda97f", 0x11}], 0x1, &(0x7f000027c000)}], 0x1, 0x0) 2018/04/22 16:12:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x14, 0x0) 2018/04/22 16:12:38 executing program 7: r0 = socket$inet(0x2, 0x80000000805, 0x0) bind$inet(r0, &(0x7f00003daff0)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) listen(r0, 0x4) sendto$inet(r0, &(0x7f0000000000)='O', 0x1, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/22 16:12:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x18, 0x8, [@typed={0x14, 0x0, @ipv6}]}]}, 0x2c}, 0x1}, 0x0) [ 132.179950] netlink: 'syz-executor2': attribute type 8 has an invalid length. 2018/04/22 16:12:38 executing program 5: pipe(&(0x7f0000043000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00007d3fdb)='\'', 0x1) vmsplice(r1, &(0x7f00003b6fd0)=[{&(0x7f0000177000)="f2", 0x1}], 0x1, 0x0) close(r1) close(r0) 2018/04/22 16:12:38 executing program 6: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000aed000), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000e30fff)) 2018/04/22 16:12:38 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00007f2000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x2}}) 2018/04/22 16:12:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:38 executing program 7: r0 = socket$inet(0x2, 0x80000000805, 0x0) bind$inet(r0, &(0x7f00003daff0)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) listen(r0, 0x4) sendto$inet(r0, &(0x7f0000000000)='O', 0x1, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 132.262216] alg: No test for cmac(blowfish) (cmac(blowfish-generic)) 2018/04/22 16:12:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x6) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet(r0, &(0x7f0000000540)='{', 0x1, 0x4008000, &(0x7f0000de5ff0)={0x2}, 0x10) dup3(r1, r0, 0x0) 2018/04/22 16:12:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='mqueue\x00', 0x8409, &(0x7f0000c81ffe)) lseek(r0, 0x4000000000000, 0x0) 2018/04/22 16:12:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x3, 0x0, 0x6, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x80ffffff]}}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x70}, 0x1}, 0x0) 2018/04/22 16:12:38 executing program 5: syz_emit_ethernet(0x423, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xac1414aa}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "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"}}}}}, 0x0) 2018/04/22 16:12:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000a00)=@setlink={0x44, 0x13, 0x932f8fe2959679dd, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MAP={0x24, 0xe}]}, 0x44}, 0x1}, 0x0) 2018/04/22 16:12:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x6) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet(r0, &(0x7f0000000540)='{', 0x1, 0x4008000, &(0x7f0000de5ff0)={0x2}, 0x10) dup3(r1, r0, 0x0) 2018/04/22 16:12:38 executing program 7: r0 = socket$inet(0x2, 0x80000000805, 0x0) bind$inet(r0, &(0x7f00003daff0)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) listen(r0, 0x4) sendto$inet(r0, &(0x7f0000000000)='O', 0x1, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/22 16:12:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:38 executing program 4: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'btrfs.', '/dev/rtc\x00'}, &(0x7f00000002c0)='\x00', 0x1, 0x0) 2018/04/22 16:12:38 executing program 6: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000aed000), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000e30fff)) 2018/04/22 16:12:38 executing program 3: sync() r0 = memfd_create(&(0x7f0000000040)=']\x00', 0x1ffffffffffc) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffb000/0x1000)=nil) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xb}, 0xe0000000000}, {0xa, 0x0, 0x50eba416, @remote={0xfe, 0x80, [], 0xbb}}, 0x8, [0x100, 0x39ac, 0x8, 0x247, 0x5, 0x20, 0x1ff, 0x100000001]}, 0x5c) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) socket(0x4, 0x3, 0x8) r5 = dup2(r3, r4) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6f86322e5576626f786e65743100"], &(0x7f0000000280)=')\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f00000004c0)={0x20000000}) 2018/04/22 16:12:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000009f) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f00003fd000)) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/22 16:12:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="13000000"], 0x4) 2018/04/22 16:12:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:38 executing program 7: r0 = socket$inet(0x2, 0x80000000805, 0x0) bind$inet(r0, &(0x7f00003daff0)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) listen(r0, 0x4) sendto$inet(r0, &(0x7f0000000000)='O', 0x1, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/22 16:12:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:38 executing program 1: pipe(&(0x7f0000362ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000de6000)) epoll_pwait(r2, &(0x7f000003cf94)=[{}], 0x1, 0x0, &(0x7f00004c7000), 0x8) 2018/04/22 16:12:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000009f) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f00003fd000)) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/22 16:12:39 executing program 4: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'btrfs.', '/dev/rtc\x00'}, &(0x7f00000002c0)='\x00', 0x1, 0x0) 2018/04/22 16:12:39 executing program 3: sync() r0 = memfd_create(&(0x7f0000000040)=']\x00', 0x1ffffffffffc) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffb000/0x1000)=nil) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xb}, 0xe0000000000}, {0xa, 0x0, 0x50eba416, @remote={0xfe, 0x80, [], 0xbb}}, 0x8, [0x100, 0x39ac, 0x8, 0x247, 0x5, 0x20, 0x1ff, 0x100000001]}, 0x5c) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) socket(0x4, 0x3, 0x8) r5 = dup2(r3, r4) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6f86322e5576626f786e65743100"], &(0x7f0000000280)=')\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f00000004c0)={0x20000000}) 2018/04/22 16:12:39 executing program 6: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000aed000), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000e30fff)) 2018/04/22 16:12:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:39 executing program 4: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'btrfs.', '/dev/rtc\x00'}, &(0x7f00000002c0)='\x00', 0x1, 0x0) 2018/04/22 16:12:39 executing program 3: sync() r0 = memfd_create(&(0x7f0000000040)=']\x00', 0x1ffffffffffc) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffb000/0x1000)=nil) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xb}, 0xe0000000000}, {0xa, 0x0, 0x50eba416, @remote={0xfe, 0x80, [], 0xbb}}, 0x8, [0x100, 0x39ac, 0x8, 0x247, 0x5, 0x20, 0x1ff, 0x100000001]}, 0x5c) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) socket(0x4, 0x3, 0x8) r5 = dup2(r3, r4) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6f86322e5576626f786e65743100"], &(0x7f0000000280)=')\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f00000004c0)={0x20000000}) 2018/04/22 16:12:39 executing program 1: pipe(&(0x7f0000362ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000de6000)) epoll_pwait(r2, &(0x7f000003cf94)=[{}], 0x1, 0x0, &(0x7f00004c7000), 0x8) 2018/04/22 16:12:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000009f) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f00003fd000)) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/22 16:12:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0xfffffffffffffffa) 2018/04/22 16:12:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/04/22 16:12:39 executing program 6: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000aed000), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000e30fff)) 2018/04/22 16:12:39 executing program 4: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'btrfs.', '/dev/rtc\x00'}, &(0x7f00000002c0)='\x00', 0x1, 0x0) 2018/04/22 16:12:39 executing program 7: pipe(&(0x7f0000f59ff8)={0x0, 0x0}) splice(r0, &(0x7f00000e2000), r1, &(0x7f00000d1000), 0x2, 0x0) 2018/04/22 16:12:39 executing program 1: pipe(&(0x7f0000362ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000de6000)) epoll_pwait(r2, &(0x7f000003cf94)=[{}], 0x1, 0x0, &(0x7f00004c7000), 0x8) 2018/04/22 16:12:39 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000840)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, 0x84) 2018/04/22 16:12:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000999000)="390000001300094700bb61e1c3e4ffff06000000020000004500000020000000190029000dfffffff000280f00000007fd17e9ffff06060400", 0x39}], 0x1) 2018/04/22 16:12:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000009f) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f00003fd000)) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/22 16:12:39 executing program 3: sync() r0 = memfd_create(&(0x7f0000000040)=']\x00', 0x1ffffffffffc) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffb000/0x1000)=nil) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xb}, 0xe0000000000}, {0xa, 0x0, 0x50eba416, @remote={0xfe, 0x80, [], 0xbb}}, 0x8, [0x100, 0x39ac, 0x8, 0x247, 0x5, 0x20, 0x1ff, 0x100000001]}, 0x5c) write$cgroup_pid(r2, &(0x7f0000000580)=ANY=[], 0xfffffce5) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) socket(0x4, 0x3, 0x8) r5 = dup2(r3, r4) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6f86322e5576626f786e65743100"], &(0x7f0000000280)=')\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f00000004c0)={0x20000000}) [ 133.884498] netlink: 'syz-executor5': attribute type 41 has an invalid length. 2018/04/22 16:12:40 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x80, 0x100) splice(r2, &(0x7f0000000100), r0, &(0x7f0000000140), 0x1c, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000380)=""/204, 0xcc}], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev}, &(0x7f0000000080)=0xc) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) 2018/04/22 16:12:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/22 16:12:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, &(0x7f000045c000)=0x10) shutdown(r0, 0x2000000000000002) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x4}, 0x8) 2018/04/22 16:12:40 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000001c40)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@ax25, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/157, 0x9d}, 0x0) shutdown(r0, 0x0) 2018/04/22 16:12:40 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000100)="e5fef78ab67f17503591a623109b19f7edbf3d4ccb40b557f2b164bc36cee79b0836df905a16336f15", 0x29) 2018/04/22 16:12:40 executing program 5: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f000000a000)=@broute={'broute\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e80], 0x2, &(0x7f0000008000), &(0x7f0000000e80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000079616d30000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000007000000518010000680100007265646972656374000000000000000000000000000000000000000000000000080000000000000000000000000000006e666c6f67000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000088d723160be005dd28e669e4af13c267acbec0877fa169c7ca9f39f98b8b8792feee08000000e6f5dd9c365c800de9134279a62d0d38655305745e36a64778b0000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x210) 2018/04/22 16:12:40 executing program 1: pipe(&(0x7f0000362ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000de6000)) epoll_pwait(r2, &(0x7f000003cf94)=[{}], 0x1, 0x0, &(0x7f00004c7000), 0x8) 2018/04/22 16:12:40 executing program 7: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000580), &(0x7f0000000080)=0xffffffffffffff67) [ 134.086368] kernel msg: ebtables bug: please report to author: entry offsets not in right order 2018/04/22 16:12:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f000002effa)='ramfs\x00', 0x100000, &(0x7f0000ce3000)) mount(&(0x7f000052f000)='./file0\x00', &(0x7f00008fcfff)='.', &(0x7f00003a2ffa)="0700cc667300", 0x1000, 0x0) mount(&(0x7f0000c6bff8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x0, &(0x7f000002f000)) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='.', 0x0) 2018/04/22 16:12:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x4e20, @rand_addr}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000040)=[{0x10}], 0x1}}], 0x2, 0x0) 2018/04/22 16:12:40 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d30000)=0x1, 0x4) bind$inet(r0, &(0x7f00002c8000)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 2018/04/22 16:12:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000c73fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)=ANY=[]}], 0x1, 0x8044) accept4(r1, 0x0, &(0x7f00000000c0), 0x0) 2018/04/22 16:12:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) [ 134.912630] sctp: [Deprecated]: syz-executor3 (pid 9485) Use of struct sctp_assoc_value in delayed_ack socket option. [ 134.912630] Use struct sctp_sack_info instead [ 134.929921] sctp: [Deprecated]: syz-executor3 (pid 9485) Use of struct sctp_assoc_value in delayed_ack socket option. [ 134.929921] Use struct sctp_sack_info instead 2018/04/22 16:12:41 executing program 5: perf_event_open(&(0x7f0000940000)={0x1, 0x78, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a73000)}, 0x2801}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/22 16:12:41 executing program 7: r0 = shmget$private(0x0, 0x4000, 0x54001c21, &(0x7f0000000000/0x4000)=nil) shmctl$SHM_LOCK(r0, 0xb) 2018/04/22 16:12:41 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='.', 0x1, r1) 2018/04/22 16:12:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000), 0x0) 2018/04/22 16:12:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/22 16:12:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0xfffffffffffffffa) 2018/04/22 16:12:41 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x10, &(0x7f0000000600), 0x0, &(0x7f0000000300)=[{0x10, 0x0, 0x1}], 0x10}}], 0x2, 0x0) 2018/04/22 16:12:41 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000001c40)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@ax25, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/157, 0x9d}, 0x0) shutdown(r0, 0x0) 2018/04/22 16:12:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0xfffffffffffffffa) 2018/04/22 16:12:41 executing program 7: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000d19000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 2018/04/22 16:12:41 executing program 3: futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000380), 0x20004022000001) 2018/04/22 16:12:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0xfffffffffffffffa) 2018/04/22 16:12:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x180a05) keyctl$read(0xb, r0, &(0x7f00000004c0)=""/217, 0xb0) 2018/04/22 16:12:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000016000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001000)={0x14, 0x12, 0x301}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f000000e000)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000013f73)=""/141, 0x8d}, {&(0x7f000001e000)=""/72, 0x48}, {&(0x7f000001f000)=""/107, 0x6b}], 0x4, &(0x7f0000019f8e)=""/114, 0x72}, 0x0) 2018/04/22 16:12:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, r0, 0x0) 2018/04/22 16:12:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000b92000)='smaps\x00') mlock(&(0x7f0000d09000/0x3000)=nil, 0x3000) readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x12b0}], 0x1) readv(r0, &(0x7f0000dc8ff8)=[{&(0x7f0000208000)=""/4096, 0x1000}], 0x1d3) 2018/04/22 16:12:41 executing program 7: unshare(0x40600) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 2018/04/22 16:12:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000eee000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) 2018/04/22 16:12:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0xfffffffffffffffa) 2018/04/22 16:12:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/22 16:12:41 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000471000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x0, 0x6, 0xfff}) 2018/04/22 16:12:41 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000001c40)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@ax25, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/157, 0x9d}, 0x0) shutdown(r0, 0x0) 2018/04/22 16:12:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=@allocspi={0x104, 0x16, 0x1, 0x0, 0x0, {{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@rand_addr}, {@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x33}, @in6=@local={0xfe, 0x80, [], 0xaa}}}, [@mark={0xc, 0x15}]}, 0x104}, 0x1}, 0x0) 2018/04/22 16:12:41 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) read(r0, &(0x7f0000000e80), 0x0) 2018/04/22 16:12:41 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000740)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00002b8ff6)="940a0ed3084f8823a7", 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000080)="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", 0x5a1, 0x0, &(0x7f0000a7dff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/22 16:12:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000240)=""/32, 0x20) getdents64(r0, &(0x7f0000000180)=""/77, 0x54) 2018/04/22 16:12:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=@allocspi={0x104, 0x16, 0x1, 0x0, 0x0, {{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@rand_addr}, {@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x33}, @in6=@local={0xfe, 0x80, [], 0xaa}}}, [@mark={0xc, 0x15}]}, 0x104}, 0x1}, 0x0) 2018/04/22 16:12:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') execveat(r0, &(0x7f0000018ff8)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000018fed)="2d1fe7f7ff5076696e65743000"], &(0x7f0000000040), 0x0) 2018/04/22 16:12:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) r2 = socket$packet(0x11, 0x3, 0x300) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) syz_emit_ethernet(0xe, &(0x7f0000000280)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, &(0x7f0000000000)) 2018/04/22 16:12:42 executing program 7: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000ed3000)=0x3e, 0x4) bind$inet6(r0, &(0x7f0000afe000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000e00000)=0x3f, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) listen(r0, 0x0) dup2(r1, r0) 2018/04/22 16:12:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000240)=""/32, 0x20) getdents64(r0, &(0x7f0000000180)=""/77, 0x54) 2018/04/22 16:12:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="180000001000000000000000000000000500000000000000d4000000200000009500000000000000"], &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) 2018/04/22 16:12:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:42 executing program 4: mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='security.evm\x00', &(0x7f0000000240)='/dev/snd/timer\x00', 0xf, 0x0) 2018/04/22 16:12:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=@allocspi={0x104, 0x16, 0x1, 0x0, 0x0, {{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@rand_addr}, {@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x33}, @in6=@local={0xfe, 0x80, [], 0xaa}}}, [@mark={0xc, 0x15}]}, 0x104}, 0x1}, 0x0) 2018/04/22 16:12:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:42 executing program 7: syslog(0x3, 0x0, 0x0) 2018/04/22 16:12:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000240)=""/32, 0x20) getdents64(r0, &(0x7f0000000180)=""/77, 0x54) 2018/04/22 16:12:42 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000001c40)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@ax25, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/157, 0x9d}, 0x0) shutdown(r0, 0x0) 2018/04/22 16:12:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) ioctl$fiemap(r0, 0x40086610, &(0x7f0000000000)) 2018/04/22 16:12:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 2018/04/22 16:12:43 executing program 7: unshare(0x400) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)=""/106, &(0x7f0000000080)=0x6a) 2018/04/22 16:12:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=@allocspi={0x104, 0x16, 0x1, 0x0, 0x0, {{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@rand_addr}, {@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x33}, @in6=@local={0xfe, 0x80, [], 0xaa}}}, [@mark={0xc, 0x15}]}, 0x104}, 0x1}, 0x0) 2018/04/22 16:12:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x8001) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x19) 2018/04/22 16:12:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000240)=""/32, 0x20) getdents64(r0, &(0x7f0000000180)=""/77, 0x54) 2018/04/22 16:12:43 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) dup2(r0, r1) 2018/04/22 16:12:43 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x12, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000002ffc)=0xa0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/04/22 16:12:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x8001) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x19) 2018/04/22 16:12:44 executing program 2: mkdir(&(0x7f0000074ff8)='./file0\x00', 0x0) mount(&(0x7f0000900ff8)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) rename(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0/file0\x00') 2018/04/22 16:12:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e9efa8)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) 2018/04/22 16:12:44 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) dup2(r0, r1) 2018/04/22 16:12:44 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) pread64(r0, &(0x7f0000000080)=""/169, 0xa9, 0x0) 2018/04/22 16:12:44 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f00004fd000), 0x4) setsockopt$inet_int(r0, 0x0, 0x40000000000cf, &(0x7f0000000040), 0x4) 2018/04/22 16:12:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x8001) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x19) 2018/04/22 16:12:44 executing program 2: prctl$intptr(0x1c, 0x7) setuid(0x0) 2018/04/22 16:12:44 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x89f1, &(0x7f0000000b00)={'sit0\x00'}) 2018/04/22 16:12:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e9efa8)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) 2018/04/22 16:12:44 executing program 0: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffffc, 0xb00) 2018/04/22 16:12:44 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000001180)=""/4096, 0x1000) dup2(r2, r3) 2018/04/22 16:12:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e9efa8)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) 2018/04/22 16:12:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x8001) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x19) 2018/04/22 16:12:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3, 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000200)={{}, 0x2000001}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000100)) 2018/04/22 16:12:45 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f000001dffc)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x6, 0x3}) 2018/04/22 16:12:45 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) dup2(r0, r1) 2018/04/22 16:12:45 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e9efa8)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) 2018/04/22 16:12:45 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000f65fe4)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x5}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x40000000019, &(0x7f0000d84000), &(0x7f0000ffa000)) 2018/04/22 16:12:45 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f000061af66), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000005540)=[{{&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14}}}}, 0x26, &(0x7f0000002880), 0x0, &(0x7f0000002900)}}, {{&(0x7f0000005240)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000005340), 0x0, &(0x7f0000005380)}}], 0x2, 0x20000001) 2018/04/22 16:12:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000009fc3)={0x26, 'hash\x00', 0x0, 0x0, "637263333200001f000000000000000000000000000000000000000020000063000000000000000f000000000000f3ffffff0000c600"}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f00005f0f3d), 0x3d0f5f20, 0x0, &(0x7f0000a4cfec)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/22 16:12:45 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000001180)=""/4096, 0x1000) dup2(r2, r3) 2018/04/22 16:12:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x81, 0x6, 0xffffffff00000001, 0x8}, 0x2c) unshare(0x40600) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000380)}, 0x10) 2018/04/22 16:12:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @loopback=0x7f000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'syz_tun\x00'}) 2018/04/22 16:12:45 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f000061af66), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000005540)=[{{&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14}}}}, 0x26, &(0x7f0000002880), 0x0, &(0x7f0000002900)}}, {{&(0x7f0000005240)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000005340), 0x0, &(0x7f0000005380)}}], 0x2, 0x20000001) 2018/04/22 16:12:46 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00007a8000)={&(0x7f0000d7efec)={0x14, 0x7, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000100)=0x8) 2018/04/22 16:12:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f000096a000)={0x0, 0x0, &(0x7f0000570000)=""/79, &(0x7f0000000f72)=""/142, &(0x7f00000004c0)=""/231}) [ 141.154758] sctp: [Deprecated]: syz-executor0 (pid 9797) Use of struct sctp_assoc_value in delayed_ack socket option. [ 141.154758] Use struct sctp_sack_info instead 2018/04/22 16:12:47 executing program 6: getrusage(0xfffffffffffffffe, &(0x7f0000000140)) 2018/04/22 16:12:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f000061af66), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000005540)=[{{&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14}}}}, 0x26, &(0x7f0000002880), 0x0, &(0x7f0000002900)}}, {{&(0x7f0000005240)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000005340), 0x0, &(0x7f0000005380)}}], 0x2, 0x20000001) 2018/04/22 16:12:47 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa201}) dup2(r0, r1) 2018/04/22 16:12:47 executing program 1: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f00000006c0)=@ethtool_cmd={0x26, 0x80}}) 2018/04/22 16:12:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x18, 0x0, 0x207, 0x1, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/22 16:12:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sctp\x00') getdents(r0, &(0x7f0000000140)=""/98, 0x2a) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000000)=""/72, 0x48) 2018/04/22 16:12:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000100)=0x8) 2018/04/22 16:12:47 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000001180)=""/4096, 0x1000) dup2(r2, r3) 2018/04/22 16:12:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f000061af66), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000005540)=[{{&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14}}}}, 0x26, &(0x7f0000002880), 0x0, &(0x7f0000002900)}}, {{&(0x7f0000005240)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000005340), 0x0, &(0x7f0000005380)}}], 0x2, 0x20000001) 2018/04/22 16:12:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="0200000000000000", 0x8) 2018/04/22 16:12:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f000051b000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='H\x00\x00\x00\x00\x00\x00\x00'], 0x8}, 0x0) 2018/04/22 16:12:47 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x2) 2018/04/22 16:12:47 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x403, 0x0) 2018/04/22 16:12:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)={0x14, 0x2, 0x1, 0x800000001}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00002e9000)='task\x00') getdents64(r0, &(0x7f0000000180)=""/44, 0x2) 2018/04/22 16:12:47 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x10) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000002c0)={0xd0, 0x80000001, 0x3db2, 0x10, &(0x7f0000000080)=""/16, 0xeb, &(0x7f00000000c0)=""/235, 0xe5, &(0x7f00000001c0)=""/229}) 2018/04/22 16:12:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x35}, {0x200000000006}]}) 2018/04/22 16:12:47 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:47 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_acct\x00') io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002900)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x1}]) [ 141.811163] audit: type=1326 audit(1524413567.809:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9844 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 [ 142.133354] sctp: [Deprecated]: syz-executor0 (pid 9862) Use of struct sctp_assoc_value in delayed_ack socket option. [ 142.133354] Use struct sctp_sack_info instead 2018/04/22 16:12:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)={0x14, 0x2, 0x1, 0x800000001}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000100)=0x8) 2018/04/22 16:12:48 executing program 1: ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) unshare(0x40600) ioctl(r0, 0x20000000002285, &(0x7f0000000000)="53000000012e2a6824") 2018/04/22 16:12:48 executing program 3: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000140)="9ee7bafc7a14a8667a1d6e79", 0xc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000080)) 2018/04/22 16:12:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:48 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:48 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) 2018/04/22 16:12:48 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000001180)=""/4096, 0x1000) dup2(r2, r3) [ 142.317948] sd 0:0:1:0: [sg0] tag#5668 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 142.326824] sd 0:0:1:0: [sg0] tag#5668 CDB: Test Unit Ready [ 142.332686] sd 0:0:1:0: [sg0] tag#5668 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 142.342342] sd 0:0:1:0: [sg0] tag#5668 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 142.351346] sd 0:0:1:0: [sg0] tag#5668 CDB[20]: 00 00 00 00 2018/04/22 16:12:48 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) 2018/04/22 16:12:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:48 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x100000000f, &(0x7f00000000c0)=0xfffffffffefffffb, 0x4) bind$inet6(r0, &(0x7f0000876000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, 0x1c) 2018/04/22 16:12:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)={0x14, 0x2, 0x1, 0x800000001}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240), 0x8) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000480)="de", 0x1}], 0x1) 2018/04/22 16:12:48 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2802}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/22 16:12:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:48 executing program 3: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 143.135520] sctp: [Deprecated]: syz-executor0 (pid 9924) Use of struct sctp_assoc_value in delayed_ack socket option. [ 143.135520] Use struct sctp_sack_info instead 2018/04/22 16:12:49 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {0x4}], 0x22d3) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='9', 0x1}], 0x1, &(0x7f0000000140)}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x7ffffffe}, 0x14) sendto(r0, &(0x7f0000000140)="f6", 0x1, 0x0, &(0x7f0000000040)=@rc={0x1f}, 0x80) 2018/04/22 16:12:49 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2802}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/22 16:12:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)={0x14, 0x2, 0x1, 0x800000001}, 0x14}, 0x1}, 0x0) 2018/04/22 16:12:49 executing program 1: r0 = socket$inet(0x2, 0x806, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'bridge0\x00'}}, 0x1e, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 2018/04/22 16:12:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in={0x2, 0x0, @loopback=0x7f000001}], 0x2c) 2018/04/22 16:12:49 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000000)=@bind_ip={0x2, 0x0, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x5) 2018/04/22 16:12:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000100)=0x8) 2018/04/22 16:12:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fstatfs(r0, &(0x7f0000000140)=""/142) 2018/04/22 16:12:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "2b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75f45ba55a3487c83849023d37e037d2d3e3e842e9ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f268f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593bc605c985f56664b84ed3c9f90ffb666e030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e06ad7295e6601f3a5fe9b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5160cd7324c0670c7b3e8980b061e31b1c8461d6f7a63f9e9fd24326924c076e01631a0b9703a6106accfaa064075fa1f16e16c5171b6a324e8642b2ab76618b824110c312ab12d9f65d6a980634a6a7cba8bf89e01a91259f446232476a1c490982636b78d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11491864860c11421a92dae3152eb23106a0c679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c1719bdf668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857522f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b1100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e007"}}}}}}, &(0x7f0000001780)) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0)=""/191, 0x1457, 0x0, 0x0, 0x0) 2018/04/22 16:12:49 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0x81, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) 2018/04/22 16:12:49 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2802}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/22 16:12:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x6}, 0xe) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x1, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)=',', &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/04/22 16:12:49 executing program 1: r0 = socket$inet(0x2, 0x806, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'bridge0\x00'}}, 0x1e, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 2018/04/22 16:12:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0xfffffffffffffe7f) 2018/04/22 16:12:49 executing program 7: r0 = memfd_create(&(0x7f0000001380)='bdev#cgroup@\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575651966e0ca00000000000000000000000000000b00e3001b000000000000000400080000000001000000000000000000000000000000f3feffb20300"}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xa583}, &(0x7f0000000240)=0x18) write$sndseq(r1, &(0x7f00000000c0), 0x24b) [ 144.138624] sctp: [Deprecated]: syz-executor0 (pid 9978) Use of struct sctp_assoc_value in delayed_ack socket option. [ 144.138624] Use struct sctp_sack_info instead 2018/04/22 16:12:50 executing program 6: unshare(0x400) socketpair$inet(0x1e, 0x805, 0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x8) 2018/04/22 16:12:50 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2802}, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/22 16:12:50 executing program 0: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000500)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x88) 2018/04/22 16:12:50 executing program 1: r0 = socket$inet(0x2, 0x806, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'bridge0\x00'}}, 0x1e, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 2018/04/22 16:12:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "2b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75f45ba55a3487c83849023d37e037d2d3e3e842e9ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f268f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593bc605c985f56664b84ed3c9f90ffb666e030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e06ad7295e6601f3a5fe9b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5160cd7324c0670c7b3e8980b061e31b1c8461d6f7a63f9e9fd24326924c076e01631a0b9703a6106accfaa064075fa1f16e16c5171b6a324e8642b2ab76618b824110c312ab12d9f65d6a980634a6a7cba8bf89e01a91259f446232476a1c490982636b78d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11491864860c11421a92dae3152eb23106a0c679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c1719bdf668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857522f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b1100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e007"}}}}}}, &(0x7f0000001780)) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0)=""/191, 0x1457, 0x0, 0x0, 0x0) 2018/04/22 16:12:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)={[0x30]}, 0x2) 2018/04/22 16:12:50 executing program 7: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000d0efee)="120000001200e7ff0a001c0000000000809b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f000029cf40)=[{{0x0, 0x0, &(0x7f0000d61fd0), 0x0, &(0x7f00007ca000)=""/244, 0xf4}}], 0x1, 0x0, &(0x7f0000862000)={0x0, 0x989680}) 2018/04/22 16:12:50 executing program 4: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x7) 2018/04/22 16:12:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000d1c000)=@assoc_value, &(0x7f0000645000)=0x8) 2018/04/22 16:12:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0)=""/191, 0x1457, 0x0, 0x0, 0x0) 2018/04/22 16:12:50 executing program 3: mkdir(&(0x7f000057a000)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000216000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) pwrite64(r0, &(0x7f00000001c0)='n', 0x1, 0x5a) 2018/04/22 16:12:50 executing program 7: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 2018/04/22 16:12:50 executing program 1: r0 = socket$inet(0x2, 0x806, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'bridge0\x00'}}, 0x1e, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 2018/04/22 16:12:50 executing program 0: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000500)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x88) 2018/04/22 16:12:50 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={"6c6f000800000040ffff002000", {0x2, 0x0, @loopback=0x7f000001}}) 2018/04/22 16:12:50 executing program 7: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 2018/04/22 16:12:50 executing program 2: ppoll(&(0x7f0000000380)=[{}, {}], 0x200000000000001f, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140), 0x8) 2018/04/22 16:12:50 executing program 0: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000500)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x88) 2018/04/22 16:12:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x80045430, &(0x7f0000000200)) 2018/04/22 16:12:51 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00007b5000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) write$selinux_create(0xffffffffffffffff, &(0x7f0000000000)=@objname={'system_u:object_r:hald_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x0, 0x0, 0x20, './file0\x00'}, 0x3e) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7e, 0x0) 2018/04/22 16:12:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "2b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75f45ba55a3487c83849023d37e037d2d3e3e842e9ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f268f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593bc605c985f56664b84ed3c9f90ffb666e030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e06ad7295e6601f3a5fe9b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5160cd7324c0670c7b3e8980b061e31b1c8461d6f7a63f9e9fd24326924c076e01631a0b9703a6106accfaa064075fa1f16e16c5171b6a324e8642b2ab76618b824110c312ab12d9f65d6a980634a6a7cba8bf89e01a91259f446232476a1c490982636b78d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11491864860c11421a92dae3152eb23106a0c679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c1719bdf668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857522f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b1100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e007"}}}}}}, &(0x7f0000001780)) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0)=""/191, 0x1457, 0x0, 0x0, 0x0) 2018/04/22 16:12:51 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6={{0xa}}}, &(0x7f000064b000)=0xa0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r1}, &(0x7f0000000140)=0x8) 2018/04/22 16:12:51 executing program 7: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 2018/04/22 16:12:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x37, &(0x7f0000000000)="0ecdba0060dea310", 0x8) 2018/04/22 16:12:51 executing program 2: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000100000d00000000", 0x14, 0x0) 2018/04/22 16:12:51 executing program 0: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000500)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x88) 2018/04/22 16:12:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) 2018/04/22 16:12:51 executing program 7: r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000ed6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d0000e6000200000100000053ad000023f7b7d6ea76afe6330ee739b31904e2635cd58d1443474410e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a5408c1c149b7b83579f6a41c51f7d51933223e82ab867dac761faf"}) 2018/04/22 16:12:51 executing program 3: symlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000140)='./file0\x00') lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f0000000200)=""/55, 0x37) 2018/04/22 16:12:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00002b8ff6), 0x0) 2018/04/22 16:12:51 executing program 2: fchdir(0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f000000f000)="240000001a00030207fffd946fa283bc04eee6d87986c49727008568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) r2 = socket$nl_generic(0xa, 0x3, 0x10) recvmsg(r1, &(0x7f0000000540)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/224, 0xe0}], 0x1, &(0x7f00000004c0)=""/120, 0x78, 0x401}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x29, 0x1b, &(0x7f0000000340)={0x0, 0x0, 0x3cc2000, 0x8}, 0x10) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000007c0)}, 0x0) r3 = inotify_init1(0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route(r4, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0xa08300}, 0xc, &(0x7f00000007c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001400000000004af77700eeff00000000000000"], 0x1}, 0x1}, 0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000300)={0xaa}) stat(&(0x7f0000000540)='./control\x00', &(0x7f0000000580)) sendmsg$unix(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1, &(0x7f0000000600), 0x0, 0x8000}, 0x81) inotify_add_watch(r3, &(0x7f000003cff6)='./control\x00', 0x220001a1) sendto(0xffffffffffffffff, &(0x7f0000018000), 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000058fef)=""/32, 0x20) creat(&(0x7f0000031ff0)='./control/file0\x00', 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000000, 0x8, 0x10fff) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f00000018c0)='./file1\x00') setsockopt(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000016c0)="25e11ed4c2e46decc38ec698f32088c63e71595cf82bb870df3e90c0e584b736d1437b75186df94dd4ba7c53b232ac18ca05174edeea010eda80ec55c7a8793362d3c23be5492992e9d8b11a979a49ec6eee2760feac3d6a64df5366f8b4616d44db0e2b1187d2513b43f65db37cd67451e2e499949fc538f46e36957699f92e504dc46de180453845fdf542cbb9725a77881ec7aed6aad5a29e6f1b250401c4b325b4f9bff1e34303241a4ac6bab27cbedc3f4e1856b430a92d92982008eb08a2d6b0e8b621ec50fda2273fd3965965a70e03949052e498195ec4c9b1", 0xdd) chdir(&(0x7f0000f95000)='./file0\x00') 2018/04/22 16:12:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000d0cffb)="e6558f1a", 0x4) 2018/04/22 16:12:51 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x100000001}}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/14, 0xe}], 0x1) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 2018/04/22 16:12:51 executing program 4: mmap(&(0x7f0000000000/0x59000)=nil, 0x59000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 145.686792] mmap: syz-executor2 (10068) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/22 16:12:51 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000480)="de", 0x1}], 0x1) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa}}}, &(0x7f0000000080)=0x90) 2018/04/22 16:12:51 executing program 5: r0 = socket(0x10, 0x8000000803, 0x0) mmap(&(0x7f0000000000/0x8d8000)=nil, 0x8d8000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000000)=""/1, &(0x7f0000e00ffc)=0x1) 2018/04/22 16:12:51 executing program 3: symlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000140)='./file0\x00') lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f0000000200)=""/55, 0x37) 2018/04/22 16:12:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) recvmsg(r0, &(0x7f0000fa3000)={&(0x7f0000d0b000)=@ax25, 0x10, &(0x7f00002e6f80), 0x0, &(0x7f0000878000)}, 0x0) 2018/04/22 16:12:51 executing program 0: mmap(&(0x7f0000000000/0xfc2000)=nil, 0xfc2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7ff, &(0x7f0000000000), &(0x7f0000000140)) 2018/04/22 16:12:51 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) fcntl$dupfd(r0, 0x0, r0) lseek(r0, 0x0, 0x0) 2018/04/22 16:12:51 executing program 4: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) 2018/04/22 16:12:51 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) read(r0, &(0x7f0000000040)=""/1, 0x1) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x2, 0x6, 0x919, 0x4}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r2, 0x7) 2018/04/22 16:12:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x4, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/22 16:12:53 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) read(r0, &(0x7f0000000040)=""/1, 0x1) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x2, 0x6, 0x919, 0x4}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r2, 0x7) 2018/04/22 16:12:53 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x100000001}}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/14, 0xe}], 0x1) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 2018/04/22 16:12:53 executing program 3: symlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000140)='./file0\x00') lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f0000000200)=""/55, 0x37) 2018/04/22 16:12:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net\x00', 0x200002, 0x0) fstat(r0, &(0x7f0000000680)) 2018/04/22 16:12:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000dd000)=0x1, 0x4) connect$inet(r0, &(0x7f0000d9dff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/22 16:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/22 16:12:53 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x12}}}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 147.156960] ================================================================== [ 147.164399] BUG: KMSAN: uninit-value in inet_getpeer+0x1567/0x1e70 [ 147.170725] CPU: 1 PID: 10129 Comm: syz-executor1 Not tainted 4.16.0+ #86 [ 147.177644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.186995] Call Trace: [ 147.189595] dump_stack+0x185/0x1d0 [ 147.193225] ? inet_getpeer+0x1567/0x1e70 [ 147.197375] kmsan_report+0x142/0x240 [ 147.201183] __msan_warning_32+0x6c/0xb0 2018/04/22 16:12:53 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x311, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 147.205247] inet_getpeer+0x1567/0x1e70 [ 147.209235] ? __msan_poison_alloca+0x15c/0x1d0 [ 147.213912] ? kmsan_set_origin_inline+0x6b/0x120 [ 147.218759] ? __msan_poison_alloca+0x15c/0x1d0 [ 147.223427] ? inet_frag_find+0x7da/0x1610 [ 147.227662] ? ip4_frag_init+0x59/0x740 [ 147.231640] ip4_frag_init+0x4d1/0x740 [ 147.235530] ? ip4_hashfn+0x170/0x170 [ 147.239330] inet_frag_find+0x7da/0x1610 [ 147.243387] ? ipqhashfn+0x77/0x2f0 [ 147.247021] ip_defrag+0x4ba/0x6860 [ 147.250657] ? skb_copy_bits+0xc66/0xdc0 2018/04/22 16:12:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/sockcreate\x00') unshare(0x400) close(r0) perf_event_open(&(0x7f00000016c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) [ 147.254720] ? kmsan_set_origin_inline+0x6b/0x120 [ 147.259565] ? kmsan_set_origin+0x9e/0x160 [ 147.263808] ip_check_defrag+0x76b/0xd90 [ 147.267880] packet_rcv_fanout+0x2a8/0x8d0 [ 147.272119] ? packet_direct_xmit+0xbf0/0xbf0 [ 147.276622] dev_queue_xmit_nit+0x111a/0x11e0 [ 147.281135] dev_hard_start_xmit+0x27c/0xc70 [ 147.285556] __dev_queue_xmit+0x27ee/0x3520 [ 147.289894] dev_queue_xmit+0x4b/0x60 [ 147.293695] neigh_resolve_output+0xac6/0xb60 [ 147.298199] ? neigh_event_ns+0x360/0x360 [ 147.302347] ip_finish_output2+0x1344/0x1470 2018/04/22 16:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/22 16:12:53 executing program 3: symlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000140)='./file0\x00') lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f0000000200)=""/55, 0x37) [ 147.306764] ip_do_fragment+0x3748/0x3f80 [ 147.310916] ? ip_fragment+0x3f0/0x3f0 [ 147.314828] ip_fragment+0x248/0x3f0 [ 147.318568] ip_finish_output+0xd1b/0xff0 [ 147.322724] ip_mc_output+0x1029/0x15e0 [ 147.326700] ? ip_mc_finish_output+0x3b0/0x3b0 [ 147.331289] ? ip_build_and_send_pkt+0xec0/0xec0 [ 147.336049] ip_send_skb+0x173/0x350 [ 147.339771] udp_send_skb+0xeb6/0x1310 [ 147.343670] udp_sendmsg+0x2d47/0x33f0 [ 147.347561] ? ip_copy_metadata+0xee0/0xee0 [ 147.351900] ? udp_send_skb+0x1310/0x1310 [ 147.356055] inet_sendmsg+0x48d/0x740 [ 147.359859] ? security_socket_sendmsg+0x9e/0x210 [ 147.364704] ? inet_getname+0x500/0x500 [ 147.368688] SYSC_sendto+0x6c3/0x7e0 [ 147.372412] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 147.377864] ? prepare_exit_to_usermode+0x149/0x3a0 [ 147.382895] SyS_sendto+0x8a/0xb0 [ 147.386351] do_syscall_64+0x309/0x430 [ 147.390244] ? SYSC_getpeername+0x560/0x560 [ 147.394575] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.399765] RIP: 0033:0x455389 2018/04/22 16:12:53 executing program 4: syz_emit_ethernet(0x87, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x6, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x4], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) [ 147.402952] RSP: 002b:00007f33a4118c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 147.410665] RAX: ffffffffffffffda RBX: 00007f33a41196d4 RCX: 0000000000455389 [ 147.417936] RDX: 000000000000fdc7 RSI: 0000000020762fff RDI: 0000000000000013 [ 147.425210] RBP: 000000000072bea0 R08: 000000002057bff0 R09: 0000000000000010 [ 147.432481] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 147.439839] R13: 0000000000000500 R14: 00000000006fa8a0 R15: 0000000000000000 [ 147.447110] [ 147.448735] Uninit was created at: [ 147.452282] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 147.457385] kmsan_kmalloc+0x94/0x100 [ 147.461189] kmem_cache_alloc+0xaab/0xb90 [ 147.465345] inet_getpeer+0xed8/0x1e70 [ 147.469235] ip4_frag_init+0x4d1/0x740 [ 147.473120] inet_frag_find+0x7da/0x1610 [ 147.477183] ip_defrag+0x4ba/0x6860 [ 147.480807] ip_local_deliver+0x18f/0x4e0 [ 147.484955] ip_rcv_finish+0xa36/0x1d00 [ 147.488926] ip_rcv+0x118f/0x16d0 [ 147.492384] __netif_receive_skb_core+0x47df/0x4a90 [ 147.497578] netif_receive_skb_internal+0x49d/0x630 [ 147.502596] netif_receive_skb+0x230/0x240 [ 147.506834] tun_get_user+0x740f/0x7c60 [ 147.510809] tun_chr_write_iter+0x1d4/0x330 [ 147.515139] do_iter_readv_writev+0x84d/0xa00 [ 147.519641] do_iter_write+0x30d/0xd40 [ 147.523528] do_writev+0x3c9/0x830 [ 147.527073] SYSC_writev+0x9b/0xb0 [ 147.530613] SyS_writev+0x56/0x80 [ 147.534064] do_syscall_64+0x309/0x430 [ 147.537949] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.543133] ================================================================== [ 147.550481] Disabling lock debugging due to kernel taint 2018/04/22 16:12:53 executing program 3: llistxattr(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)=""/113, 0x71) get_mempolicy(&(0x7f0000000100), &(0x7f0000000140), 0x40, &(0x7f0000ffa000/0x1000)=nil, 0x2) 2018/04/22 16:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 147.555924] Kernel panic - not syncing: panic_on_warn set ... [ 147.555924] [ 147.563295] CPU: 1 PID: 10129 Comm: syz-executor1 Tainted: G B 4.16.0+ #86 [ 147.571517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.580867] Call Trace: [ 147.583463] dump_stack+0x185/0x1d0 [ 147.587096] panic+0x39d/0x940 [ 147.590310] ? inet_getpeer+0x1567/0x1e70 [ 147.594461] kmsan_report+0x238/0x240 [ 147.598270] __msan_warning_32+0x6c/0xb0 [ 147.602336] inet_getpeer+0x1567/0x1e70 [ 147.606324] ? __msan_poison_alloca+0x15c/0x1d0 [ 147.610994] ? kmsan_set_origin_inline+0x6b/0x120 [ 147.615871] ? __msan_poison_alloca+0x15c/0x1d0 [ 147.620544] ? inet_frag_find+0x7da/0x1610 [ 147.624790] ? ip4_frag_init+0x59/0x740 [ 147.628769] ip4_frag_init+0x4d1/0x740 [ 147.632663] ? ip4_hashfn+0x170/0x170 [ 147.636469] inet_frag_find+0x7da/0x1610 [ 147.640533] ? ipqhashfn+0x77/0x2f0 [ 147.644173] ip_defrag+0x4ba/0x6860 [ 147.647816] ? skb_copy_bits+0xc66/0xdc0 [ 147.651881] ? kmsan_set_origin_inline+0x6b/0x120 2018/04/22 16:12:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x9) sendfile(r1, r2, &(0x7f0000e64ff8), 0x6) [ 147.656727] ? kmsan_set_origin+0x9e/0x160 [ 147.660967] ip_check_defrag+0x76b/0xd90 [ 147.665039] packet_rcv_fanout+0x2a8/0x8d0 [ 147.669283] ? packet_direct_xmit+0xbf0/0xbf0 [ 147.673781] dev_queue_xmit_nit+0x111a/0x11e0 [ 147.678288] dev_hard_start_xmit+0x27c/0xc70 [ 147.682722] __dev_queue_xmit+0x27ee/0x3520 [ 147.687055] dev_queue_xmit+0x4b/0x60 [ 147.690857] neigh_resolve_output+0xac6/0xb60 [ 147.695361] ? neigh_event_ns+0x360/0x360 [ 147.699518] ip_finish_output2+0x1344/0x1470 [ 147.703934] ip_do_fragment+0x3748/0x3f80 [ 147.708085] ? ip_fragment+0x3f0/0x3f0 [ 147.711988] ip_fragment+0x248/0x3f0 [ 147.715719] ip_finish_output+0xd1b/0xff0 [ 147.719871] ip_mc_output+0x1029/0x15e0 [ 147.723847] ? ip_mc_finish_output+0x3b0/0x3b0 [ 147.728439] ? ip_build_and_send_pkt+0xec0/0xec0 [ 147.733195] ip_send_skb+0x173/0x350 [ 147.736910] udp_send_skb+0xeb6/0x1310 [ 147.740809] udp_sendmsg+0x2d47/0x33f0 [ 147.744706] ? ip_copy_metadata+0xee0/0xee0 [ 147.749054] ? udp_send_skb+0x1310/0x1310 [ 147.753203] inet_sendmsg+0x48d/0x740 [ 147.757005] ? security_socket_sendmsg+0x9e/0x210 [ 147.761853] ? inet_getname+0x500/0x500 [ 147.765828] SYSC_sendto+0x6c3/0x7e0 [ 147.769543] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 147.774990] ? prepare_exit_to_usermode+0x149/0x3a0 [ 147.780015] SyS_sendto+0x8a/0xb0 [ 147.783471] do_syscall_64+0x309/0x430 [ 147.787359] ? SYSC_getpeername+0x560/0x560 [ 147.791687] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.796871] RIP: 0033:0x455389 [ 147.800055] RSP: 002b:00007f33a4118c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 147.807764] RAX: ffffffffffffffda RBX: 00007f33a41196d4 RCX: 0000000000455389 [ 147.815033] RDX: 000000000000fdc7 RSI: 0000000020762fff RDI: 0000000000000013 [ 147.822302] RBP: 000000000072bea0 R08: 000000002057bff0 R09: 0000000000000010 [ 147.829567] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 147.836835] R13: 0000000000000500 R14: 00000000006fa8a0 R15: 0000000000000000 [ 147.844568] Dumping ftrace buffer: [ 147.848087] (ftrace buffer empty) [ 147.851770] Kernel Offset: disabled [ 147.855379] Rebooting in 86400 seconds..