INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. 2018/04/29 19:08:01 fuzzer started 2018/04/29 19:08:01 dialing manager at 10.128.0.26:34153 syzkaller login: [ 48.779774] can: request_module (can-proto-0) failed. [ 48.790604] can: request_module (can-proto-0) failed. 2018/04/29 19:08:09 kcov=true, comps=false 2018/04/29 19:08:12 executing program 0: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000c1d000)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 2018/04/29 19:08:12 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x2) 2018/04/29 19:08:12 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r1, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)='l', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000640)=""/199, 0xc7}], 0x1) sendto$inet6(r1, &(0x7f0000ad6fad)='\x00', 0x1, 0x3fffffd, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/29 19:08:12 executing program 4: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 2018/04/29 19:08:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) 2018/04/29 19:08:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/29 19:08:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x100000000004e24, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x2, 0x0) 2018/04/29 19:08:12 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000000c0)={[], 0x0, 0x100000001, 0xfffffffffffffffa}) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)) [ 53.667390] IPVS: ftp: loaded support on port[0] = 21 [ 53.808783] IPVS: ftp: loaded support on port[0] = 21 [ 53.855851] IPVS: ftp: loaded support on port[0] = 21 [ 53.911280] IPVS: ftp: loaded support on port[0] = 21 [ 54.023447] IPVS: ftp: loaded support on port[0] = 21 [ 54.144820] IPVS: ftp: loaded support on port[0] = 21 [ 54.270807] IPVS: ftp: loaded support on port[0] = 21 [ 54.414327] IPVS: ftp: loaded support on port[0] = 21 [ 55.261093] ip (4656) used greatest stack depth: 54312 bytes left [ 56.058522] ip (4717) used greatest stack depth: 54184 bytes left [ 56.065924] ip (4722) used greatest stack depth: 54000 bytes left [ 56.847543] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.854106] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.869254] device bridge_slave_0 entered promiscuous mode [ 56.891511] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.897972] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.914897] device bridge_slave_0 entered promiscuous mode [ 57.046004] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.052499] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.102438] device bridge_slave_1 entered promiscuous mode [ 57.138718] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.145212] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.165757] device bridge_slave_1 entered promiscuous mode [ 57.197402] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.203845] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.226742] device bridge_slave_0 entered promiscuous mode [ 57.246287] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.252745] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.278159] device bridge_slave_0 entered promiscuous mode [ 57.313391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.324294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.342190] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.348653] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.391431] device bridge_slave_1 entered promiscuous mode [ 57.509398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.519441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.527333] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.533780] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.551463] device bridge_slave_1 entered promiscuous mode [ 57.617415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.626857] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.633353] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.674126] device bridge_slave_0 entered promiscuous mode [ 57.733004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.819249] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.825746] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.868197] device bridge_slave_0 entered promiscuous mode [ 57.889615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.897825] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.904289] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.929529] device bridge_slave_1 entered promiscuous mode [ 57.948468] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.965138] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.971585] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.981334] device bridge_slave_0 entered promiscuous mode [ 58.015793] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.022289] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.046068] device bridge_slave_0 entered promiscuous mode [ 58.057353] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.063811] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.081138] device bridge_slave_1 entered promiscuous mode [ 58.133983] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.149512] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.194097] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.200558] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.252100] device bridge_slave_1 entered promiscuous mode [ 58.277981] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.284442] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.303817] device bridge_slave_1 entered promiscuous mode [ 58.319585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.342957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.366591] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.375161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.384794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.501131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.527927] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.572186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.580395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.618246] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.640959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.650198] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.762146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.771949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.840963] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.850313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.857369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.895672] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.980352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.987303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.099455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.107811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.114743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.129371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.193991] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.254268] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.268462] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.337433] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.346976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.365251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.378254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.438508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.448173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.461856] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.499127] team0: Port device team_slave_0 added [ 59.535093] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.544506] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.613154] ip (4969) used greatest stack depth: 53656 bytes left [ 59.630423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.642210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.658763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.679662] team0: Port device team_slave_0 added [ 59.704831] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.719374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.741453] team0: Port device team_slave_1 added [ 59.782458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.831071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.881168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.890135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.916066] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.942251] team0: Port device team_slave_1 added [ 59.962286] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.977364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.984278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.998115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.022106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.029009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.039721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.070635] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.096140] team0: Port device team_slave_0 added [ 60.101671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.110567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.146209] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.173469] team0: Port device team_slave_0 added [ 60.196110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.205620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.223257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.261831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.272105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.296883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.310895] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.334684] team0: Port device team_slave_1 added [ 60.386790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.399915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.431941] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.444784] team0: Port device team_slave_1 added [ 60.486788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.498440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.514674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.536808] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.557210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.586281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.612696] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.623137] team0: Port device team_slave_0 added [ 60.640270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.654454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.666562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.687920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.704846] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.716650] team0: Port device team_slave_0 added [ 60.722864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.735861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.763715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.773154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.787996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.817745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.831679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.855469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.874641] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.893302] team0: Port device team_slave_1 added [ 60.909872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.916786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.937096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.970338] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.994735] team0: Port device team_slave_1 added [ 61.000801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.008393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.019770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.041065] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.054518] team0: Port device team_slave_0 added [ 61.075733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.083369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.100387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.124422] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.135311] team0: Port device team_slave_0 added [ 61.142472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.153298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.166902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.191630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.202866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.239916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.256591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.264191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.271529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.285867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.299112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.308964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.334660] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.351926] team0: Port device team_slave_1 added [ 61.360805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.382190] team0: Port device team_slave_1 added [ 61.400587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.409529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.434936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.474901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.482582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.502322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.546142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.559907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.581867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.598070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.620213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.627260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.638932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.660066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.681775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.706734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.713958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.736003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.771113] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.778418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.789565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.822213] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.837678] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.869372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.891833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.911008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.934861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.968651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.983546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.001325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.028546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.038264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.047770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.094906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.106185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.113491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.125591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.167113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.200130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.259918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.272166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.289986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.333977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.345473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.383647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.520621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.527988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.545105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.516511] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.523005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.529922] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.536374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.563226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.570008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.630869] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.637337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.644213] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.650670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.742147] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.042952] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.049443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.056349] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.062802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.106752] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.221306] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.227785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.234646] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.241108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.317886] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.349841] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.356300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.363170] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.369596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.435911] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.608359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.623235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.645969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.660826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.714097] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.720548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.727407] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.733845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.801918] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.812383] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.818809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.825649] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.832120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.847008] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.050934] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.057395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.064269] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.070716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.100664] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.634141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.662297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.693881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.378473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.474853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.985984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.030605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.092691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.131167] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.288721] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.429653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.703760] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.862811] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.870808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.930280] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.939710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.979905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.986195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.007894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.070898] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.078958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.089059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.253441] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.507176] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.686302] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.692583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.703798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.745884] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.752221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.764086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.797940] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.809240] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.817748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.861870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.905276] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.959429] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.105216] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.111768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.122241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.389537] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.431605] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.437850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.446472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.533297] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.583567] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.632980] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.639248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.658250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.946462] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.287536] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.509326] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/29 19:08:41 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x1008000000000004, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/29 19:08:41 executing program 4: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 2018/04/29 19:08:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, 0x144}) 2018/04/29 19:08:41 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) sendmsg$nl_crypto(r0, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x0, 0x1}, 0xfffffdef}, 0x1}, 0x0) 2018/04/29 19:08:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) 2018/04/29 19:08:41 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0/bus\x00', &(0x7f0000000100)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000380)) umount2(&(0x7f0000000540)='./file0\x00', 0x3) 2018/04/29 19:08:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) 2018/04/29 19:08:41 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) [ 81.654162] IPv4: Oversized IP packet from 127.0.0.1 2018/04/29 19:08:41 executing program 4: r0 = socket(0x1e, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000002800)={'bridge0\x00', &(0x7f0000000000)=ANY=[]}) [ 81.706398] IPv4: Oversized IP packet from 127.0.0.1 2018/04/29 19:08:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, 0x144}) 2018/04/29 19:08:41 executing program 3: r0 = socket$inet6(0xa, 0x4000002000000802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) 2018/04/29 19:08:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20020003, &(0x7f0000000b00)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x2df) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/29 19:08:41 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 82.057440] print_req_error: I/O error, dev loop0, sector 0 2018/04/29 19:08:42 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xe80, 0x1c, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/29 19:08:42 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x1274, &(0x7f0000007000)) 2018/04/29 19:08:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) 2018/04/29 19:08:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, 0x144}) 2018/04/29 19:08:42 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000000)='./file0\x00') syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000300)='eth1lo\x00', 0x7, 0x0) dup2(r1, r2) 2018/04/29 19:08:42 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x1c, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/29 19:08:42 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000c8a000)='status\x00') read(r0, &(0x7f0000000000)=""/4096, 0x1000) 2018/04/29 19:08:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) 2018/04/29 19:08:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, 0x144}) 2018/04/29 19:08:42 executing program 7: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 2018/04/29 19:08:42 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000c8a000)='status\x00') read(r0, &(0x7f0000000000)=""/4096, 0x1000) 2018/04/29 19:08:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6"}, 0x58, &(0x7f0000000680)}, 0x0) fchmod(r1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r4, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) 2018/04/29 19:08:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x0) fchmod(r1, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ptrace$peekuser(0x3, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0x0, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r3, 0x4, 0x46000) preadv(r3, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) 2018/04/29 19:08:42 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000240)={@random="fdf555077caf", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "a4a64b", 0x10, 0x2f, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "3c81c0971e5d3b4d"}}}}}}, &(0x7f0000ea3000)) 2018/04/29 19:08:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f0000000000), 0x154, 0x10000002) gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@local, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) 2018/04/29 19:08:42 executing program 7: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0xfeda) listen(r0, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) accept$ipx(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 2018/04/29 19:08:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc)=0x10000, 0x4) r1 = dup(r0) write$eventfd(r1, &(0x7f0000605ff8), 0xffbe) write$sndseq(r1, &(0x7f00000001c0)=[{}], 0x30) write$eventfd(r1, &(0x7f0000000040), 0x1e22) 2018/04/29 19:08:42 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02330f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f0000001340)=ANY=[]}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x800000000000065}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/29 19:08:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f0000477000)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xff89}, 0x1}, 0x0) 2018/04/29 19:08:42 executing program 7: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0xfeda) listen(r0, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) accept$ipx(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) [ 82.719429] sd 0:0:1:0: [sg0] tag#5129 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 82.728309] sd 0:0:1:0: [sg0] tag#5129 CDB: Test Unit Ready [ 82.734162] sd 0:0:1:0: [sg0] tag#5129 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.743115] sd 0:0:1:0: [sg0] tag#5129 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.752145] sd 0:0:1:0: [sg0] tag#5129 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.761127] sd 0:0:1:0: [sg0] tag#5129 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.770158] sd 0:0:1:0: [sg0] tag#5129 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.779099] sd 0:0:1:0: [sg0] tag#5129 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.788100] sd 0:0:1:0: [sg0] tag#5129 CDB[60]: 00 00 00 00 00 [ 82.910440] sd 0:0:1:0: [sg0] tag#5132 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 82.920189] sd 0:0:1:0: [sg0] tag#5132 CDB: Test Unit Ready [ 82.926074] sd 0:0:1:0: [sg0] tag#5132 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.935012] sd 0:0:1:0: [sg0] tag#5132 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.943985] sd 0:0:1:0: [sg0] tag#5132 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.952920] sd 0:0:1:0: [sg0] tag#5132 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.961848] sd 0:0:1:0: [sg0] tag#5132 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.970770] sd 0:0:1:0: [sg0] tag#5132 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 82.979686] sd 0:0:1:0: [sg0] tag#5132 CDB[60]: 00 00 00 00 00 2018/04/29 19:08:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg(r0, &(0x7f0000005580)=[{{0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000000)=[{0xe8, 0x0, 0x0, "9cde5d9ba88687ef38b8767323648319ea364662ad792f65f4c62a7a6f6d40f8d2931059e090d13010d98921eec67cdbedac260536399ece189b06a983145469d0a3f5bffa005aa1f9861205b175f25958f93bdc663110560d75c1390ddd8ada3d09199d4a815bd1ab3cfd3d0137a336fe7d1120dc8d60fcacd18ed329ecee9d05e68feba7f529ef18bfe7d3574cd0b5e6516870bf8f0dae583c23e9ab581cf697c9b1f3d9feac03266a5afd10c9e6c6eca0836cb9081bf8ada6bc7b0ca6dcf848b2e811cb100e6dacb5852b3871825c076cad04"}], 0xe8}}], 0x1, 0x0) 2018/04/29 19:08:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_vif\x00') sendfile(r0, r0, &(0x7f0000000040)=0x800000, 0x800000408) 2018/04/29 19:08:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0xffffffffffffff54, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000080)="c3", 0x1, 0x81, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/29 19:08:43 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0bc5310, &(0x7f0000000180)) 2018/04/29 19:08:43 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02330f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f0000001340)=ANY=[]}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x800000000000065}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/29 19:08:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000015000104000000000000000002000000", @ANYBLOB="1400030076657468d4859a04cdce98e7f2195e1a305f746fa0626f6e64000000"], 0x2}, 0x1}, 0x0) 2018/04/29 19:08:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in=@dev={0xac, 0x14, 0x14}}]}, 0x38}, 0x1}, 0x0) 2018/04/29 19:08:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000748000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) write$rdma_cm(r0, &(0x7f0000000040)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000018c0), 0x111}}, 0x20) [ 83.204323] sd 0:0:1:0: [sg0] tag#5138 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 83.213220] sd 0:0:1:0: [sg0] tag#5138 CDB: Test Unit Ready [ 83.219119] sd 0:0:1:0: [sg0] tag#5138 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 83.228108] sd 0:0:1:0: [sg0] tag#5138 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 83.237146] sd 0:0:1:0: [sg0] tag#5138 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2018/04/29 19:08:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x0, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) timer_create(0x3, &(0x7f0000000d00)={0x0, 0x1f, 0x4, @thr={&(0x7f0000000bc0)="cde81fe37ad013b5abb232d607547db732acfa54af436ff9782545d3032d41ef05c147518dd5a94037ebbadee286925878696c790fe0e65995e8e5b22595beece0", &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82dc916e5223988dc84ef6057e4c55bc4cee11f4e0e714379bb869d04daaf4ddf3556a8329a84508c303b1f944eda22418ca17e8ab9b61060fb09d810c507f26f09309e935978f42d2969a3eb45a4451bc5e2c83caca53e91dd0c39120a093e8d0d27d75c3ecaaf87d407a6c2f52435584ebb5860de28ace33dc"}}, &(0x7f0000000d40)) [ 83.246139] sd 0:0:1:0: [sg0] tag#5138 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 83.255132] sd 0:0:1:0: [sg0] tag#5138 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 83.264107] sd 0:0:1:0: [sg0] tag#5138 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 83.273125] sd 0:0:1:0: [sg0] tag#5138 CDB[60]: 00 00 00 00 00 2018/04/29 19:08:43 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) 2018/04/29 19:08:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000012000)={&(0x7f000000c000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) 2018/04/29 19:08:43 executing program 0: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@loopback=0x7f000001, @multicast1=0xe0000001, r0}, 0xc) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000ea2ffa)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x14) 2018/04/29 19:08:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x1c, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/29 19:08:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0xffffffffffffff54, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000080)="c3", 0x1, 0x81, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/29 19:08:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) 2018/04/29 19:08:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a000000000000000000000000000000000000000000000000000056df1a25cda90137c99b5c"], 0x38}, 0x1}, 0x0) 2018/04/29 19:08:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=ANY=[@ANYBLOB="000204011000000000000000000000000000000000000000"], 0x1) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) 2018/04/29 19:08:43 executing program 0: r0 = gettid() r1 = socket$inet(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @loopback=0x7f000001}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000300)="86", 0x1}], 0x1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 2018/04/29 19:08:43 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10) 2018/04/29 19:08:43 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) 2018/04/29 19:08:43 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r4, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r3, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r5, 0x4, 0x46000) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) setns(0xffffffffffffffff, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) fchmod(r1, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) 2018/04/29 19:08:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x0, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) timer_create(0x3, &(0x7f0000000d00)={0x0, 0x1f, 0x4, @thr={&(0x7f0000000bc0)="cde81fe37ad013b5abb232d607547db732acfa54af436ff9782545d3032d41ef05c147518dd5a94037ebbadee286925878696c790fe0e65995e8e5b22595beece0", &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82dc916e5223988dc84ef6057e4c55bc4cee11f4e0e714379bb869d04daaf4ddf3556a8329a84508c303b1f944eda22418ca17e8ab9b61060fb09d810c507f26f09309e935978f42d2969a3eb45a4451bc5e2c83caca53e91dd0c39120a093e8d0d27d75c3ecaaf87d407a6c2f52435584ebb5860de28ace33dc"}}, &(0x7f0000000d40)) 2018/04/29 19:08:43 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f0000000040)) 2018/04/29 19:08:44 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000fd8000), &(0x7f0000e7fffc), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 2018/04/29 19:08:44 executing program 5: 2018/04/29 19:08:44 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10) 2018/04/29 19:08:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x0, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) timer_create(0x3, &(0x7f0000000d00)={0x0, 0x1f, 0x4, @thr={&(0x7f0000000bc0)="cde81fe37ad013b5abb232d607547db732acfa54af436ff9782545d3032d41ef05c147518dd5a94037ebbadee286925878696c790fe0e65995e8e5b22595beece0", &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82dc916e5223988dc84ef6057e4c55bc4cee11f4e0e714379bb869d04daaf4ddf3556a8329a84508c303b1f944eda22418ca17e8ab9b61060fb09d810c507f26f09309e935978f42d2969a3eb45a4451bc5e2c83caca53e91dd0c39120a093e8d0d27d75c3ecaaf87d407a6c2f52435584ebb5860de28ace33dc"}}, &(0x7f0000000d40)) 2018/04/29 19:08:44 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10) 2018/04/29 19:08:44 executing program 0: 2018/04/29 19:08:44 executing program 5: 2018/04/29 19:08:44 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10) 2018/04/29 19:08:44 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r4, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r3, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r5, 0x4, 0x46000) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) setns(0xffffffffffffffff, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) fchmod(r1, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) 2018/04/29 19:08:44 executing program 0: 2018/04/29 19:08:44 executing program 4: 2018/04/29 19:08:44 executing program 5: 2018/04/29 19:08:44 executing program 0: 2018/04/29 19:08:44 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) 2018/04/29 19:08:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r5, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r4, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x0, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r6, 0x4, 0x46000) preadv(r6, &(0x7f0000000040), 0x41, 0x910000) sendfile(r1, r3, &(0x7f0000000080), 0x102000004) setns(r2, 0x4000000) timer_create(0x3, &(0x7f0000000d00)={0x0, 0x1f, 0x4, @thr={&(0x7f0000000bc0)="cde81fe37ad013b5abb232d607547db732acfa54af436ff9782545d3032d41ef05c147518dd5a94037ebbadee286925878696c790fe0e65995e8e5b22595beece0", &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82dc916e5223988dc84ef6057e4c55bc4cee11f4e0e714379bb869d04daaf4ddf3556a8329a84508c303b1f944eda22418ca17e8ab9b61060fb09d810c507f26f09309e935978f42d2969a3eb45a4451bc5e2c83caca53e91dd0c39120a093e8d0d27d75c3ecaaf87d407a6c2f52435584ebb5860de28ace33dc"}}, &(0x7f0000000d40)) 2018/04/29 19:08:44 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10) 2018/04/29 19:08:45 executing program 3: 2018/04/29 19:08:45 executing program 4: 2018/04/29 19:08:45 executing program 5: 2018/04/29 19:08:45 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r4, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r3, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r5, 0x4, 0x46000) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) setns(0xffffffffffffffff, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) fchmod(r1, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) 2018/04/29 19:08:45 executing program 0: 2018/04/29 19:08:45 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:45 executing program 7: 2018/04/29 19:08:45 executing program 1: 2018/04/29 19:08:45 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:45 executing program 3: 2018/04/29 19:08:45 executing program 0: 2018/04/29 19:08:45 executing program 5: 2018/04/29 19:08:45 executing program 7: 2018/04/29 19:08:45 executing program 4: 2018/04/29 19:08:45 executing program 1: 2018/04/29 19:08:45 executing program 6: 2018/04/29 19:08:45 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:45 executing program 4: 2018/04/29 19:08:45 executing program 7: 2018/04/29 19:08:45 executing program 5: 2018/04/29 19:08:45 executing program 3: 2018/04/29 19:08:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000029000)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0xd19, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x4}]}, 0x24}, 0x1}, 0x0) 2018/04/29 19:08:45 executing program 1: 2018/04/29 19:08:45 executing program 6: [ 85.652756] netlink: 'syz-executor0': attribute type 21 has an invalid length. 2018/04/29 19:08:45 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:45 executing program 4: 2018/04/29 19:08:45 executing program 3: 2018/04/29 19:08:45 executing program 5: 2018/04/29 19:08:45 executing program 1: 2018/04/29 19:08:45 executing program 7: 2018/04/29 19:08:45 executing program 0: 2018/04/29 19:08:45 executing program 6: 2018/04/29 19:08:45 executing program 1: 2018/04/29 19:08:45 executing program 5: 2018/04/29 19:08:45 executing program 7: 2018/04/29 19:08:45 executing program 4: 2018/04/29 19:08:45 executing program 6: 2018/04/29 19:08:45 executing program 0: 2018/04/29 19:08:45 executing program 3: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/29 19:08:46 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)="00edb8eaa72e7ab699c026af022567be2b96f95d08a13955b360b755bc58fd68f14be165b02d945c712a8b3fe1ec2e9b1d0773faef1b993604514af5ff94ccf948dbd5fa1ac2ae2f13df7e0cd77563226eab581910904e4a2c60003b718af9be8331beeba25cca7148b327d3dc4bcbb355ab68d3f9449b6d9c9c7cf771a720511a7c4751d0ef0ff1933d9c11751bb8b2609d5a099552ca71ff76809e6afed3ede98dff16c16e1e4fb4e24233c634930ef12f4bdcd57ff13f53b2a7", 0xbb) r2 = epoll_create1(0x20000080000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)) readv(r0, &(0x7f0000119ff0)=[{&(0x7f000061e000)=""/4096, 0x100cc}], 0x3d) 2018/04/29 19:08:46 executing program 4: mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x5, 0x32, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000001fda)) 2018/04/29 19:08:46 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 2018/04/29 19:08:46 executing program 7: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) pwrite64(r0, &(0x7f0000000140)="db691c66e6bfc0b1", 0x8, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000000), 0x0) 2018/04/29 19:08:46 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:46 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="0f"]}) 2018/04/29 19:08:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 2018/04/29 19:08:46 executing program 3: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/29 19:08:46 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:46 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)="72727effff04099f35fff7020000ab00", 0x275) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x5, 0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=""/143, &(0x7f00000000c0)=0x46d) sendto$inet6(r0, &(0x7f00000000c0), 0xfead, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/29 19:08:46 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:46 executing program 5: 2018/04/29 19:08:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r3, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') preadv(0xffffffffffffffff, &(0x7f0000000040), 0x41, 0x0) sendfile(r0, r2, &(0x7f0000000080), 0x102000004) setns(r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) fchmod(0xffffffffffffffff, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) 2018/04/29 19:08:46 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x101ffffff) [ 86.507784] skbuff: bad partial csum: csum=40713/65333 len=40512 2018/04/29 19:08:46 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:46 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x10400003) 2018/04/29 19:08:46 executing program 5: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000037b000)='./file0\x00', 0x0) lsetxattr(&(0x7f000008eff8)='./file0\x00', &(0x7f000067b000)=@known='user.syz\x00', &(0x7f0000a53ff0)='self&em1\\vmnet1\x00', 0x10, 0x0) rmdir(&(0x7f0000df3ff8)='./file0\x00') 2018/04/29 19:08:46 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast1=0xe0000001, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/29 19:08:46 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x0, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r0, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) 2018/04/29 19:08:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r3, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') preadv(0xffffffffffffffff, &(0x7f0000000040), 0x41, 0x0) sendfile(r0, r2, &(0x7f0000000080), 0x102000004) setns(r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) fchmod(0xffffffffffffffff, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) 2018/04/29 19:08:46 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) 2018/04/29 19:08:46 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:47 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x10400003) 2018/04/29 19:08:47 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:47 executing program 2: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:47 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) 2018/04/29 19:08:47 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r1, 0x707, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 2018/04/29 19:08:47 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23}}, 0x0, 0x0, 0x0, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) fchmod(0xffffffffffffffff, 0x4) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x4, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)}}, &(0x7f0000000d40)) 2018/04/29 19:08:47 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x101ffffff) 2018/04/29 19:08:48 executing program 2: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:48 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:48 executing program 7: clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/29 19:08:48 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) 2018/04/29 19:08:48 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x32}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) 2018/04/29 19:08:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x101ffffff) 2018/04/29 19:08:48 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23}}, 0x0, 0x0, 0x0, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) fchmod(0xffffffffffffffff, 0x4) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x4, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)}}, &(0x7f0000000d40)) 2018/04/29 19:08:48 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:48 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r1 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r1, 0x107, 0xd, &(0x7f0000001000), 0x47e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc4000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r2, 0x0, 0x3c, 0xed, &(0x7f00000000c0)="f81f0f9505cfb52f98271e51f7cd584cac21679e3b7c4e8fb9ae1d41040dddb1a2080460ad5e3f066263a5b7d10eb87ad045b7a62aae41c16f9d43d1", &(0x7f0000000100)=""/237, 0x2000000000000000, 0x1}, 0x28) close(r1) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000700)=@allocspi={0xf8, 0x16, 0x3, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x33}, @in=@rand_addr, {}, {}, {}, 0x70bd26}}}, 0xf8}, 0x1}, 0x0) 2018/04/29 19:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000412fd6)="29000000140007b7ffffffff0300e0eb01001000e0a40e07fff00f06000000ffff0100002a00f3ff09", 0x29) 2018/04/29 19:08:48 executing program 2: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:48 executing program 1: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc35, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000040)) 2018/04/29 19:08:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x4}}}, &(0x7f0000000200)=0x98) 2018/04/29 19:08:49 executing program 2: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:49 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/100) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/97}, 0x69, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080)={0x1}, 0x8, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) msgrcv(0x0, &(0x7f00000005c0)={0x0, ""/94}, 0x66, 0x0, 0x0) msgsnd(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02"], 0x1, 0x0) 2018/04/29 19:08:49 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23}}, 0x0, 0x0, 0x0, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) fchmod(0xffffffffffffffff, 0x4) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x4, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)}}, &(0x7f0000000d40)) 2018/04/29 19:08:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv4_getaddr={0x18, 0x16, 0x305, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) 2018/04/29 19:08:49 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) 2018/04/29 19:08:49 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$setopts(0x4200, r1, 0x3ff, 0x10) 2018/04/29 19:08:49 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x4}}}, &(0x7f0000000200)=0x98) 2018/04/29 19:08:49 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x191, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000018, &(0x7f00000bc000), &(0x7f00006b8ffc)=0x214) 2018/04/29 19:08:49 executing program 3: 2018/04/29 19:08:49 executing program 2: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:49 executing program 1: 2018/04/29 19:08:49 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:49 executing program 1: 2018/04/29 19:08:49 executing program 3: 2018/04/29 19:08:49 executing program 2: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:49 executing program 5: 2018/04/29 19:08:49 executing program 7: 2018/04/29 19:08:49 executing program 4: 2018/04/29 19:08:50 executing program 1: 2018/04/29 19:08:50 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:50 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0xffffffffffffff54, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000080)="c3", 0x1, 0x81, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xd2f0, 0x422800) 2018/04/29 19:08:50 executing program 5: 2018/04/29 19:08:50 executing program 7: 2018/04/29 19:08:50 executing program 4: 2018/04/29 19:08:50 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:50 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:50 executing program 1: 2018/04/29 19:08:50 executing program 7: 2018/04/29 19:08:50 executing program 5: 2018/04/29 19:08:50 executing program 4: 2018/04/29 19:08:50 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:50 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:50 executing program 3: 2018/04/29 19:08:50 executing program 1: 2018/04/29 19:08:50 executing program 7: 2018/04/29 19:08:50 executing program 4: 2018/04/29 19:08:51 executing program 5: 2018/04/29 19:08:51 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/29 19:08:51 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:51 executing program 1: 2018/04/29 19:08:51 executing program 7: 2018/04/29 19:08:51 executing program 3: 2018/04/29 19:08:51 executing program 4: 2018/04/29 19:08:51 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:51 executing program 7: 2018/04/29 19:08:51 executing program 5: 2018/04/29 19:08:51 executing program 4: 2018/04/29 19:08:51 executing program 3: 2018/04/29 19:08:51 executing program 1: 2018/04/29 19:08:51 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:51 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:51 executing program 4: 2018/04/29 19:08:51 executing program 3: 2018/04/29 19:08:52 executing program 7: 2018/04/29 19:08:52 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:52 executing program 4: 2018/04/29 19:08:52 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:52 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/29 19:08:52 executing program 3: 2018/04/29 19:08:52 executing program 5: 2018/04/29 19:08:52 executing program 1: 2018/04/29 19:08:53 executing program 1: 2018/04/29 19:08:53 executing program 4: 2018/04/29 19:08:53 executing program 7: 2018/04/29 19:08:53 executing program 5: 2018/04/29 19:08:53 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:53 executing program 3: 2018/04/29 19:08:53 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/29 19:08:53 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:53 executing program 1: 2018/04/29 19:08:53 executing program 7: 2018/04/29 19:08:53 executing program 3: 2018/04/29 19:08:53 executing program 5: 2018/04/29 19:08:53 executing program 4: 2018/04/29 19:08:53 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:53 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:53 executing program 5: 2018/04/29 19:08:53 executing program 7: 2018/04/29 19:08:53 executing program 3: 2018/04/29 19:08:53 executing program 1: 2018/04/29 19:08:53 executing program 4: 2018/04/29 19:08:53 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:53 executing program 7: 2018/04/29 19:08:54 executing program 5: 2018/04/29 19:08:54 executing program 3: 2018/04/29 19:08:54 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:54 executing program 1: 2018/04/29 19:08:54 executing program 4: 2018/04/29 19:08:54 executing program 7: 2018/04/29 19:08:54 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:54 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f000000b000)={&(0x7f000000bfe4)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000000000)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) pipe(&(0x7f0000000040)) 2018/04/29 19:08:54 executing program 5: mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x5, 0x32, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000001fda)) 2018/04/29 19:08:54 executing program 3: signalfd(0xffffffffffffff9c, &(0x7f0000000180), 0x8) pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') read$eventfd(r0, &(0x7f00000000c0), 0x64c) 2018/04/29 19:08:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x2, @rand_addr}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000000080)=[{0xc, 0x1, 0x25}], 0xc}}], 0x2, 0x0) 2018/04/29 19:08:54 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000080)) lremovexattr(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000080)=@random={'osx.', '!cpuset\'selinux\x00'}) 2018/04/29 19:08:54 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:54 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:54 executing program 1: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) dup3(r0, r1, 0x100000080000) 2018/04/29 19:08:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000014, &(0x7f0000beeffc)=0xfffffffffffffffb, 0x4) sendto$inet(r0, &(0x7f0000a2d000), 0xffffffffffffff8e, 0x20000000, &(0x7f00007f4000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/29 19:08:55 executing program 3: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:55 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:55 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/29 19:08:55 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(0xffffffffffffffff, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:55 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:55 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:55 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f0000000240), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:55 executing program 4: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/29 19:08:55 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:55 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:55 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:55 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(0xffffffffffffffff, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:56 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x400) 2018/04/29 19:08:56 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:56 executing program 6: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r0, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:56 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:56 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f0000000240), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:56 executing program 4: capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000002000)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x300) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000100)={{0x3f, @multicast1=0xe0000001, 0x4e22, 0x4, 'lblcr\x00', 0x4, 0x400, 0x25}, {@multicast2=0xe0000002, 0x4e24, 0x0, 0xeba3, 0xfffffffffffff000, 0x8}}, 0x44) unshare(0x400) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000080)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000027fba863e6a0c200"], 0x48) 2018/04/29 19:08:56 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:56 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x0, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:56 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:56 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) ptrace(0x4207, r1) 2018/04/29 19:08:56 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:56 executing program 7: r0 = socket$pppoe(0x18, 0x1, 0x0) lseek(r0, 0x4a, 0x3) r1 = socket$inet6(0xa, 0x7fffd, 0x5) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) prctl$void(0xd) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x1000060) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [], 0x1}}, &(0x7f0000000100)=0x20) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) getuid() 2018/04/29 19:08:56 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000040)=0x2368) r1 = socket$inet6(0xa, 0x3, 0x80000000000004) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x81}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r2, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x200, 0x80000000, 0xff, 0x101, 0x8}, 0x98) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000001680)=@rc, 0x80, &(0x7f0000001940), 0x0, &(0x7f00000019c0)=""/226, 0xe2}}], 0x1, 0x0, &(0x7f0000001bc0)={0x0, 0x1c9c380}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') shutdown(r0, 0x1) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/71) 2018/04/29 19:08:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000002c0)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) r2 = getpgid(0x0) prlimit64(r2, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xc0}, &(0x7f0000000280)) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendfile(r0, r0, &(0x7f0000000240), 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000100)=0x4) ptrace$getsig(0x4202, r2, 0xffffffffffffffc6, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e24, 0xb3, @dev={0xfe, 0x80, [], 0x10}, 0x2}}}, &(0x7f0000000140)=0x84) 2018/04/29 19:08:56 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:57 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x0, r1, 0x0, 0x0) 2018/04/29 19:08:57 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0x0, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:57 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:57 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:57 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0x0, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:57 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x0, 0x0, 0x0, 0x0) 2018/04/29 19:08:57 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f0000000240), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:57 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = semget$private(0x0, 0x1, 0x400) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0xbb, r2, r3, r4, r5, 0x4, 0x80000000}, 0x472, 0x1, 0x3}) socket$inet_dccp(0x2, 0x6, 0x0) get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0xffffffffffff2342, &(0x7f0000ffb000/0x2000)=nil, 0x6) unshare(0x40800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0\x00', 0x4}, 0x18) fgetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)=""/2, 0xfcee) 2018/04/29 19:08:57 executing program 1: inotify_init1(0x0) ptrace$setopts(0x0, 0x0, 0x0, 0x0) 2018/04/29 19:08:57 executing program 7: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000600000000000000000038000000000000000000000000002000010000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000030035d83848623f6a4f9656ce2e254baba432314a5c7c409973c0690b742883629c553e636bb1d715ceb6b608131990e12c814cf7f923f94f52fd0ff85fbe79cf866c9101f8594f515b1434e77615710c3c0df53ccd0e9763aff765e1dd9899e848e94a26dd0e77a3616e79c4bc56471503bd1840a1a7955a6afc7ccfa78964f65bb4b5ab587b28f9a5f25366e66376ed65693ec7cc5db5b8a292167c948ca70c18ea5c30d2445ae4d2997b0a19730f038cc21b1e53896747eec51d3d7a39a3fb5e581e1aae767e5a04aa69bd46835bd71e9525a197eda6645eb62fcce7fe56001c8ae025270488ba00d7c424e26e43b20a11ed0c"], 0x78) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0xb77de9ad37db84f8) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f0000000040)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/29 19:08:57 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0x0, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:57 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) [ 97.608478] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0, syncid = 4, id = 0 [ 98.275663] random: crng init done 2018/04/29 19:08:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:58 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:58 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:58 executing program 1: ptrace$setopts(0x0, 0x0, 0x0, 0x0) 2018/04/29 19:08:58 executing program 7: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f0000000240), 0x8) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:58 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = semget$private(0x0, 0x1, 0x400) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0xbb, r2, r3, r4, r5, 0x4, 0x80000000}, 0x472, 0x1, 0x3}) socket$inet_dccp(0x2, 0x6, 0x0) get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0xffffffffffff2342, &(0x7f0000ffb000/0x2000)=nil, 0x6) unshare(0x40800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0\x00', 0x4}, 0x18) fgetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)=""/2, 0xfcee) 2018/04/29 19:08:58 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:58 executing program 1 (fault-call:0 fault-nth:0): ptrace$setopts(0x0, 0x0, 0x0, 0x0) 2018/04/29 19:08:58 executing program 2 (fault-call:5 fault-nth:0): r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:58 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2000080003, 0x2) getsockopt(r0, 0x0, 0xcf, &(0x7f0000001ff8)=""/8, &(0x7f0000000ffc)=0x8) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x4, 0x5d, [], 0x3, &(0x7f0000000100)=[{}, {}, {}], &(0x7f0000000140)=""/93}, &(0x7f0000000240)=0x78) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/185, 0xb9) 2018/04/29 19:08:58 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) [ 98.675649] FAULT_INJECTION: forcing a failure. [ 98.675649] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 98.687637] CPU: 0 PID: 7675 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 98.694499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.703867] Call Trace: [ 98.706495] dump_stack+0x185/0x1d0 [ 98.710162] should_fail+0x87b/0xab0 [ 98.713929] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 98.718723] ? __wake_up_common+0x123/0xa60 [ 98.723133] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 98.728569] ? update_cfs_rq_load_avg+0x662/0x1aa0 [ 98.733589] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 98.738981] ? update_load_avg+0x218c/0x2c20 [ 98.743438] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.748934] alloc_pages_current+0x6b5/0x970 [ 98.753400] pte_alloc_one+0x56/0x110 [ 98.757240] do_huge_pmd_anonymous_page+0x825/0x2520 [ 98.762452] handle_mm_fault+0x428f/0x7e50 [ 98.766754] __do_page_fault+0xec4/0x1a10 [ 98.771009] ? page_fault+0x25/0x50 [ 98.774709] do_page_fault+0xd3/0x260 [ 98.778557] page_fault+0x25/0x50 [ 98.782068] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 98.787966] RSP: 0018:ffff88014f7bfca0 EFLAGS: 00010206 [ 98.793361] RAX: ffff880154011a40 RBX: ffff88014f0de198 RCX: 0000000000000200 [ 98.800656] RDX: 0000000000000200 RSI: 0000000020000080 RDI: ffff880154011a40 [ 98.807949] RBP: ffff88014f7bfd40 R08: 0000000000000000 R09: 0000000000000002 [ 98.815239] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88014f7bfca8 2018/04/29 19:08:58 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xffffffffffff0000, 0x2) r1 = dup(r0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x4000) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000100)=0x1) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x6) r3 = gettid() ptrace(0x4207, r3) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10) [ 98.822521] R13: 0000000000000000 R14: ffff880154011a40 R15: 0000000000000000 [ 98.829865] ? xfpregs_set+0x1d7/0x480 [ 98.833837] ? xfpregs_get+0x2c0/0x2c0 [ 98.837810] arch_ptrace+0xa41/0x1230 [ 98.841697] ? xfpregs_get+0x2c0/0x2c0 [ 98.845656] SYSC_ptrace+0x309/0x850 [ 98.849420] SyS_ptrace+0x66/0x90 [ 98.852902] do_syscall_64+0x309/0x430 [ 98.856832] ? ptrace_regset+0x840/0x840 [ 98.860937] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.866153] RIP: 0033:0x455979 [ 98.869365] RSP: 002b:00007f0ebe09fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 98.877111] RAX: ffffffffffffffda RBX: 00007f0ebe0a06d4 RCX: 0000000000455979 [ 98.884404] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000f [ 98.891696] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 98.898988] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000014 [ 98.906287] R13: 00000000000004cf R14: 00000000006fb408 R15: 0000000000000000 2018/04/29 19:08:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:59 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:08:59 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:59 executing program 2 (fault-call:5 fault-nth:1): r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:08:59 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x87c, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0)=0x7, 0x4) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x3, r1}) 2018/04/29 19:08:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffff7a) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x90c27443ffc9e01a, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'erspan0\x00', 0x0}) r3 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x98) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000240)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@rand_addr=0x1000000, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) getsockopt$inet6_buf(r3, 0x29, 0x30, &(0x7f0000001000)=""/144, &(0x7f0000001ffc)=0x90) connect$packet(r1, &(0x7f0000000140)={0x11, 0xf7, r2, 0x1, 0x9, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'syzkaller0\x00'}, 0x18) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x4, 0x604f00) 2018/04/29 19:08:59 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:08:59 executing program 7: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev={0xac, 0x14, 0x14, 0xa}, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x4e24, 0x2, 0x4e20, 0x9, 0x2, 0x0, 0xa0, 0x7e, 0x0, r1}, {0x0, 0x7, 0xfffffffffffffffa, 0x6aa, 0x1, 0x1000, 0x100000000, 0x9800000000000000}, {0x4, 0x6, 0x5, 0x6}, 0x2, 0x6e6bb3, 0x3, 0x1, 0x1}, {{@in=@broadcast=0xffffffff, 0x4d3, 0x32}, 0xa, @in6=@loopback={0x0, 0x1}, 0x3506, 0x0, 0x1, 0x5, 0x2, 0x8, 0x4}}, 0xe8) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f000000f000)="240000001a00030207fffd946fa283bc04eee6d87986c49727008568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 99.416438] FAULT_INJECTION: forcing a failure. [ 99.416438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 99.428289] CPU: 1 PID: 7721 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 99.435125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.444474] Call Trace: [ 99.447074] dump_stack+0x185/0x1d0 [ 99.450705] should_fail+0x87b/0xab0 [ 99.454427] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 99.459187] ? kernel_poison_pages+0x40/0x360 [ 99.463684] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 99.469052] ? kernel_poison_pages+0x1a0/0x360 [ 99.473635] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 99.479089] ? get_page_from_freelist+0xab28/0xb600 [ 99.484106] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 99.489466] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 99.494921] ? update_stack_state+0x885/0xa40 [ 99.499423] ? page_counter_try_charge+0x205/0x5c0 [ 99.504354] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.509723] ? page_counter_uncharge+0xa7/0x160 [ 99.514390] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.514399] IPVS: Unknown mcast interface: syzkaller0 [ 99.524943] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 99.529874] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.535240] ? try_charge+0x26ce/0x2fd0 [ 99.539219] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 99.544673] ? __msan_poison_alloca+0x15c/0x1d0 [ 99.549350] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.554717] ? memcg_kmem_charge+0x703/0xa30 [ 99.559129] kmsan_alloc_page+0x82/0xe0 [ 99.563112] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 99.564538] IPVS: Unknown mcast interface: syzkaller0 [ 99.567866] ? __wake_up_common+0x123/0xa60 [ 99.567883] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 99.567900] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 99.567915] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 99.567932] ? kmsan_set_origin_inline+0x6b/0x120 [ 99.567947] ? kmsan_set_origin+0x9e/0x160 [ 99.567961] ? fsnotify+0x493/0x18f0 [ 99.567987] alloc_pages_current+0x6b5/0x970 [ 99.610059] pte_alloc_one+0x56/0x110 [ 99.613860] do_huge_pmd_anonymous_page+0x825/0x2520 [ 99.618973] handle_mm_fault+0x428f/0x7e50 [ 99.623210] ? kmsan_set_origin_inline+0x6b/0x120 [ 99.628064] __do_page_fault+0xec4/0x1a10 [ 99.632220] ? page_fault+0x25/0x50 [ 99.635845] do_page_fault+0xd3/0x260 [ 99.639650] page_fault+0x25/0x50 [ 99.643111] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 99.648989] RSP: 0018:ffff88014ac8fca0 EFLAGS: 00010206 [ 99.654347] RAX: ffff880154011a40 RBX: ffff88014f0da698 RCX: 0000000000000200 [ 99.661611] RDX: 0000000000000200 RSI: 0000000020000080 RDI: ffff880154011a40 [ 99.668879] RBP: ffff88014ac8fd40 R08: 0000000000000000 R09: 0000000000000002 [ 99.676142] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88014ac8fca8 [ 99.683409] R13: 0000000000000000 R14: ffff880154011a40 R15: 0000000000000000 [ 99.690693] ? xfpregs_set+0x1d7/0x480 [ 99.694589] ? xfpregs_get+0x2c0/0x2c0 [ 99.698481] arch_ptrace+0xa41/0x1230 [ 99.702282] ? xfpregs_get+0x2c0/0x2c0 [ 99.706172] SYSC_ptrace+0x309/0x850 [ 99.709890] SyS_ptrace+0x66/0x90 [ 99.713348] do_syscall_64+0x309/0x430 [ 99.717244] ? ptrace_regset+0x840/0x840 [ 99.721311] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 99.726496] RIP: 0033:0x455979 [ 99.729684] RSP: 002b:00007f0ebe09fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 99.737393] RAX: ffffffffffffffda RBX: 00007f0ebe0a06d4 RCX: 0000000000455979 [ 99.744661] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000f [ 99.751930] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 99.759197] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000014 [ 99.766457] R13: 00000000000004cf R14: 00000000006fb408 R15: 0000000000000001 2018/04/29 19:09:00 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:00 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) inotify_init1(0x800) 2018/04/29 19:09:00 executing program 7: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x40000) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000180)=""/3) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) r2 = shmget(0x1, 0x7000, 0x3, &(0x7f0000ff8000/0x7000)=nil) r3 = msgget(0x3, 0x447) msgctl$IPC_RMID(r3, 0x0) connect$unix(r1, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000000)=""/150) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x4e20, @local={0xac, 0x14, 0x0, 0xaa}}, @in={0x2, 0x0, @broadcast=0xffffffff}], 0x20) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100)) 2018/04/29 19:09:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:00 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6"}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:00 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffff7a) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x90c27443ffc9e01a, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'erspan0\x00', 0x0}) r3 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x98) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000240)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@rand_addr=0x1000000, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) getsockopt$inet6_buf(r3, 0x29, 0x30, &(0x7f0000001000)=""/144, &(0x7f0000001ffc)=0x90) connect$packet(r1, &(0x7f0000000140)={0x11, 0xf7, r2, 0x1, 0x9, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'syzkaller0\x00'}, 0x18) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x4, 0x604f00) 2018/04/29 19:09:00 executing program 2 (fault-call:5 fault-nth:2): r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) [ 100.307850] IPVS: Unknown mcast interface: syzkaller0 [ 100.310760] FAULT_INJECTION: forcing a failure. [ 100.310760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.325304] CPU: 0 PID: 7749 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 100.332136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.341483] Call Trace: [ 100.344074] dump_stack+0x185/0x1d0 [ 100.347703] should_fail+0x87b/0xab0 [ 100.351425] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 100.356185] ? kernel_poison_pages+0x40/0x360 [ 100.360685] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 100.366052] ? kernel_poison_pages+0x1a0/0x360 [ 100.370637] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 100.376093] ? get_page_from_freelist+0xab28/0xb600 [ 100.381115] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 100.386484] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 100.391939] ? update_stack_state+0x885/0xa40 [ 100.396443] ? page_counter_try_charge+0x205/0x5c0 [ 100.401373] ? __msan_metadata_ptr_for_load_8+0x10/0x20 2018/04/29 19:09:00 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) [ 100.406739] ? page_counter_uncharge+0xa7/0x160 [ 100.411412] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 100.416429] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 100.421796] ? try_charge+0x26ce/0x2fd0 [ 100.425777] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 100.431235] ? __msan_poison_alloca+0x15c/0x1d0 [ 100.435910] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 100.441283] ? memcg_kmem_charge+0x703/0xa30 [ 100.445696] kmsan_alloc_page+0x82/0xe0 [ 100.449678] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 100.454443] ? __wake_up_common+0x123/0xa60 [ 100.458770] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 100.463445] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 100.468895] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 100.474260] ? kmsan_set_origin_inline+0x6b/0x120 [ 100.479410] ? kmsan_set_origin+0x9e/0x160 [ 100.483647] ? fsnotify+0x493/0x18f0 [ 100.487363] alloc_pages_current+0x6b5/0x970 [ 100.491776] pte_alloc_one+0x56/0x110 [ 100.495589] do_huge_pmd_anonymous_page+0x825/0x2520 [ 100.500714] handle_mm_fault+0x428f/0x7e50 2018/04/29 19:09:00 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) [ 100.504947] ? kmsan_set_origin_inline+0x6b/0x120 [ 100.509800] __do_page_fault+0xec4/0x1a10 [ 100.513950] ? page_fault+0x25/0x50 [ 100.517574] do_page_fault+0xd3/0x260 [ 100.521376] page_fault+0x25/0x50 [ 100.524827] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 100.530706] RSP: 0018:ffff8801ad88fca0 EFLAGS: 00010206 [ 100.536067] RAX: ffff880154011a40 RBX: ffff88014f0da698 RCX: 0000000000000200 [ 100.543340] RDX: 0000000000000200 RSI: 0000000020000080 RDI: ffff880154011a40 [ 100.550609] RBP: ffff8801ad88fd40 R08: 0000000000000000 R09: 0000000000000002 [ 100.557874] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801ad88fca8 [ 100.565141] R13: 0000000000000000 R14: ffff880154011a40 R15: 0000000000000000 [ 100.572426] ? xfpregs_set+0x1d7/0x480 [ 100.576326] ? xfpregs_get+0x2c0/0x2c0 [ 100.580215] arch_ptrace+0xa41/0x1230 [ 100.584028] ? xfpregs_get+0x2c0/0x2c0 [ 100.587924] SYSC_ptrace+0x309/0x850 [ 100.591650] SyS_ptrace+0x66/0x90 [ 100.595105] do_syscall_64+0x309/0x430 [ 100.598997] ? ptrace_regset+0x840/0x840 [ 100.603070] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/04/29 19:09:00 executing program 7: unshare(0x20000400) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="6e732f6d6e74006b905700570465833d020254e1e8ae7c") ioctl$VT_RELDISP(r0, 0xb702) getsockname$inet(r0, &(0x7f0000000000)={0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) 2018/04/29 19:09:00 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x2) unshare(0x40600) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000001780)={{0x0, 0x0, 0x0, 0x0, "0e70fc86ea55c5b82e4dd3a22546398e1921d0f490fa5a696cd1397cbc02c1248ba4f81b1c06a7403e698c15"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9de14c7aabd6241f4760b4f324d348d5c44f33519794e1c84f147ed1102ef79702171cbf4abec0af81ac57425b39bf36ccfab52900cd62663a79868ed6bbe3d0", &(0x7f0000001740)='eth0\x00', 0x5}) 2018/04/29 19:09:00 executing program 5: unshare(0x40600) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x4100) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x3, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000480), 0x4) [ 100.608252] RIP: 0033:0x455979 [ 100.611431] RSP: 002b:00007f0ebe09fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 100.619142] RAX: ffffffffffffffda RBX: 00007f0ebe0a06d4 RCX: 0000000000455979 [ 100.626410] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000f [ 100.633677] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 100.640942] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000014 [ 100.648209] R13: 00000000000004cf R14: 00000000006fb408 R15: 0000000000000002 2018/04/29 19:09:00 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/213, 0xd5, &(0x7f0000000140)=""/237, 0x2, 0x2}}, 0x68) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 2018/04/29 19:09:00 executing program 3: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:01 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80001, 0x0) perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffefffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x2}, 0x165) 2018/04/29 19:09:01 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680)}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:01 executing program 4: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/200, 0xc8}, {&(0x7f00000001c0)}], 0x2, &(0x7f0000000240)=""/139, 0x8b, 0x460d5143}, 0x21) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), 0x4) 2018/04/29 19:09:01 executing program 3: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000004c0)={r6, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x12}}}, 0x3, 0x80000001, 0x100000001, 0x80000001, 0x10}, 0x98) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4640, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x8, 0x2, 0x9, 0x6, [], [], [], 0x18f418ae, 0x7f8000000, 0x0, 0x8, "7c70f7272a76776a82ec9e7fcfb7dde4"}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 2018/04/29 19:09:01 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:01 executing program 2 (fault-call:5 fault-nth:3): r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:01 executing program 3: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:01 executing program 2: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20000800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x6, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket(0xd, 0x6, 0x8) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r1, 0xfffffffffffffff7, 0xed6e) 2018/04/29 19:09:01 executing program 4: r0 = socket$inet6(0xa, 0xf, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x290) 2018/04/29 19:09:01 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x0) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:01 executing program 1: ptrace$setopts(0x4206, 0x0, 0xc, 0xffffffffffffffff) 2018/04/29 19:09:01 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680)}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000004c0)={r6, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x12}}}, 0x3, 0x80000001, 0x100000001, 0x80000001, 0x10}, 0x98) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:01 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:01 executing program 2: r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x16c00, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040)=0x1000, 0x4) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/150, 0x96) 2018/04/29 19:09:01 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getcwd(&(0x7f0000000000)=""/216, 0xd8) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x88800, 0x0) openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) 2018/04/29 19:09:01 executing program 4: r0 = socket(0x1e, 0x2000000000000005, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffff01) pkey_alloc(0x0, 0x1) 2018/04/29 19:09:02 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) waitid(0x2, r1, &(0x7f0000000000), 0x0, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:02 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(0xffffffffffffffff, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000004c0)={r6, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x12}}}, 0x3, 0x80000001, 0x100000001, 0x80000001, 0x10}, 0x98) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:02 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_setscheduler(r0, 0x7, &(0x7f0000000080)=0x1f) 2018/04/29 19:09:02 executing program 7: r0 = epoll_create1(0x0) ppoll(&(0x7f0000005640)=[{r0}], 0x1, &(0x7f00000056c0)={0x77359400}, &(0x7f0000005700), 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000a7eff4)) epoll_pwait(r0, &(0x7f0000643fb8)=[{}], 0x1, 0xfffffffffffffffb, &(0x7f000006bff8), 0x8) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x40300, 0x0) getpeername$unix(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000e8c000)={0x7}) 2018/04/29 19:09:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback={0x0, 0x1}, 0x400, 0x0, 0xff, 0x1, 0x0, 0x0, 0x10001000}, 0x11) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x400, 0x2, 0x3, 0x0, 0x0, 0x200000000000, 0x80000000000}, 0xfffffffffffffd1c) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x511242) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x9, 0x4) 2018/04/29 19:09:02 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:02 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:02 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:02 executing program 4: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:02 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0xc004, 0x3a) 2018/04/29 19:09:02 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$inet(0x2, 0x1, 0x401, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 2018/04/29 19:09:02 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000004c0)={r6, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x12}}}, 0x3, 0x80000001, 0x100000001, 0x80000001, 0x10}, 0x98) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:03 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:03 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:03 executing program 1: r0 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x7fffffffffffffff, r0, 0x0, 0x3) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1ff, 0x40000) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x2e2000, 0x21) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000040)=@req) ioprio_set$pid(0x1, r0, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x78, "520fea318bc22728db0723c1012acf6d1cfeae0494bf1322b9f1ee19c0de8435c100754f027204b4d016845156cbd3674e4b55c971e86a0b667dd3031fdb25e23d9513e9255166b97720ca9b09ab7369a59ef4be92d391567bbb390fa1f5f4ab9adcb265b02858fe97c7aebed837a4315f7c23472464b742"}, &(0x7f0000000180)=0x80) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r4, 0x8, 0xd8, "89e0aa1f7f4484c59c9de4653e72a88cee7af481be7cdb5730aa28dbb2c12c6ee16798b2a6c759a3ef439b703f18be0aab678a44942a39be818adb086258956e8bf3ad10da458fbd30753c1ceaf95637d9bcd6a8a1029b1e020156e9bea232cbcd63d61b8e6289f3edb2a3ef2c6abd94aef2cfabe7a149bdad1f4ee3a6eeab1a277c5653460d04dc6c358b8e63f2f627535802eb849f743f982003319a396cacbb0c9bce65e1793ea5a7ef5f8c4c1cfc9f7f6758c6e96362765f0093b51362ac89f3604fd054192ec7a27d0690daac471900895055761305"}, 0xe0) 2018/04/29 19:09:03 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = dup3(r0, r0, 0x80000) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x100014) ptrace(0x4203, r1) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040), 0x4) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:03 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f00000002c0)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:03 executing program 4: r0 = epoll_create1(0x0) ppoll(&(0x7f0000005640)=[{r0}], 0x1, &(0x7f00000056c0)={0x77359400}, &(0x7f0000005700), 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000a7eff4)) epoll_pwait(r0, &(0x7f0000643fb8)=[{}], 0x1, 0xfffffffffffffffb, &(0x7f000006bff8), 0x8) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x40300, 0x0) getpeername$unix(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000e8c000)={0x7}) 2018/04/29 19:09:03 executing program 7: r0 = epoll_create1(0x0) ppoll(&(0x7f0000005640)=[{r0}], 0x1, &(0x7f00000056c0)={0x77359400}, &(0x7f0000005700), 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000a7eff4)) epoll_pwait(r0, &(0x7f0000643fb8)=[{}], 0x1, 0xfffffffffffffffb, &(0x7f000006bff8), 0x8) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x40300, 0x0) getpeername$unix(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000e8c000)={0x7}) 2018/04/29 19:09:03 executing program 1: prctl$setmm(0x23, 0x4, &(0x7f0000ffc000/0x3000)=nil) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x9, 0x30, 0xd04c, 0xfffffffffffffff8}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r1, 0x354, &(0x7f0000000100)}, &(0x7f00000001c0)=0x10) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x9, 0x8}, 0xc) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000000)=0x3, 0x2fa) 2018/04/29 19:09:03 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:03 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:03 executing program 1: r0 = getpgid(0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={r2, 0x57, "b7268316634873b49cc12b9e73d837ee47234ee8544f1bdc2d70fc5a7f2ab4aee011bf7e10aa4caf21a8413556f536d4f155110f6649c59eb3b036d45327b8ef6804b00cfc56f9951cc647f6cf777c159f71fb21f959b7"}, &(0x7f00000000c0)=0x23d) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r3, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000440)={r3, 0xb7, "485b0ae7d66fc49e74e9a2f417b72c7c7af1edf059be88744af0f24572b8c71b79eda91b1331fa78d4883bd3c9e0b4de6ec5e153626b6eb6f59703645b9b007ce4429757b387f9d467310e9669e08319ba18c2e4f09fd5c4a169a52c4fa9d848a68299738ee58d3a86b54d2166d8033e60e455fe30d3b0b8bca3fc032cf87b9538f29ad26e19f58a0f972d5b279b5e69bac687e8362079d2183d787bc6b21cab077ab5d7da223681f380528bbbd7c7759a22a881a7c9c5"}, &(0x7f0000000500)=0xbf) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x100, &(0x7f0000000000)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000003c0)={0x0, r4}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}, 0xfff, 0x2, 0x7fffffff, 0x8, 0x80}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000340)={0x100000001, 0x1, 0x8000, 0x8001, 0x8, 0x1, 0x0, 0xfffffffffffffff8, r5}, &(0x7f0000000380)=0x20) 2018/04/29 19:09:03 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) r0 = syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r1, &(0x7f0000000240), 0x8) sendfile(r0, r1, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:03 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) [ 103.641274] device bridge_slave_1 left promiscuous mode [ 103.647121] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.702293] device bridge_slave_0 left promiscuous mode [ 103.708127] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.779264] team0 (unregistering): Port device team_slave_1 removed [ 103.789443] team0 (unregistering): Port device team_slave_0 removed [ 103.800225] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 103.817439] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 103.846436] bond0 (unregistering): Released all slaves 2018/04/29 19:09:04 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:04 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:04 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:04 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1000000000000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x81, 0x9, 0x8008, 0x8, 0x467, 0xffffffff, 0xfff, 0x5, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x1b9af5c5, 0x1, 0x81, 0x1f, r2}, &(0x7f0000000140)=0x10) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x6, 0x200}) 2018/04/29 19:09:04 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xd, r1, 0x9, &(0x7f0000000040)="835f642a04b49e27ad62d3ce3020c86d1403b28a30ff97c37a82ecd2c2b545f55946e61f8b0ecc32bc038d7b40d5bf0433e08ec5ff19c0086dc1ec53c714eec83947cb43b28ae766d3687692a4678353057d192cad776064e0afe078b5fcf00fbf55d440ec169dce626216f48bfc781c52fc4356a5707c34d46c") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:04 executing program 4: r0 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x7fffffffffffffff, r0, 0x0, 0x3) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1ff, 0x40000) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x2e2000, 0x21) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000040)=@req) ioprio_set$pid(0x1, r0, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x78, "520fea318bc22728db0723c1012acf6d1cfeae0494bf1322b9f1ee19c0de8435c100754f027204b4d016845156cbd3674e4b55c971e86a0b667dd3031fdb25e23d9513e9255166b97720ca9b09ab7369a59ef4be92d391567bbb390fa1f5f4ab9adcb265b02858fe97c7aebed837a4315f7c23472464b742"}, &(0x7f0000000180)=0x80) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r4, 0x8, 0xd8, "89e0aa1f7f4484c59c9de4653e72a88cee7af481be7cdb5730aa28dbb2c12c6ee16798b2a6c759a3ef439b703f18be0aab678a44942a39be818adb086258956e8bf3ad10da458fbd30753c1ceaf95637d9bcd6a8a1029b1e020156e9bea232cbcd63d61b8e6289f3edb2a3ef2c6abd94aef2cfabe7a149bdad1f4ee3a6eeab1a277c5653460d04dc6c358b8e63f2f627535802eb849f743f982003319a396cacbb0c9bce65e1793ea5a7ef5f8c4c1cfc9f7f6758c6e96362765f0093b51362ac89f3604fd054192ec7a27d0690daac471900895055761305"}, 0xe0) 2018/04/29 19:09:04 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000744000), &(0x7f00000001c0), &(0x7f0000000100)) mknod(&(0x7f00000006c0)='./file0\x00', 0x13ad9e113c1e2d, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='syscall\x00') read$eventfd(r0, &(0x7f0000000240), 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x1) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x62101, 0x0) 2018/04/29 19:09:04 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f00000002c0)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:04 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:04 executing program 1: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x3aa, 0x80000003) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 2018/04/29 19:09:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(0xffffffffffffffff, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:04 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x0, 0x10001, 0x36, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6", 0xf}, 0x58, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x10}, 0x4044000) fchmod(r1, 0xfffffffffffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x81006) ptrace$peekuser(0x3, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) timer_create(0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0, @thr={&(0x7f0000000bc0), &(0x7f0000000c40)="e1251ff276b61567fc084acdb8e4c0cf0c9fe525111a7b9322dfb0f3a4f0bfd8963c2afd37727c5fd0543f11d24da8e2b1b05d3a82"}}, &(0x7f0000000d40)) 2018/04/29 19:09:04 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:04 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000580)=@random={'osx.', 'crc32-generic\x00'}, &(0x7f00000005c0)='%selinux\x00', 0x9, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}, &(0x7f0000000480)=0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, &(0x7f0000000340)='\x00\x00?', 0x3, r2) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x2fe, r0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f00000002c0)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/29 19:09:04 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ptrace$setopts(0xfffffffffffffffe, r0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x103001) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) 2018/04/29 19:09:04 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) 2018/04/29 19:09:04 executing program 4: r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x16c00, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040)=0x1000, 0x4) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/150, 0x96) [ 105.083765] IPVS: ftp: loaded support on port[0] = 21 [ 105.600425] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.606850] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.614266] device bridge_slave_0 entered promiscuous mode [ 105.650239] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.656640] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.663979] device bridge_slave_1 entered promiscuous mode [ 105.698327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 105.733673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 105.833720] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.871332] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 106.033218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 106.040753] team0: Port device team_slave_0 added [ 106.075253] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 106.082868] team0: Port device team_slave_1 added [ 106.117660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.155410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.187920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.225589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.574532] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.580943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.587754] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.594152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.602239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 107.488682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.860328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.977739] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 108.110666] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 108.116873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.124912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.241853] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.970883] ================================================================== [ 108.978280] BUG: KMSAN: uninit-value in arch_uprobe_exception_notify+0x20f/0x220 [ 108.985807] CPU: 1 PID: 8044 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 108.992630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.001958] Call Trace: [ 109.004522] dump_stack+0x185/0x1d0 [ 109.008139] ? arch_uprobe_exception_notify+0x20f/0x220 [ 109.013476] kmsan_report+0x142/0x240 [ 109.017254] __msan_warning_32+0x6c/0xb0 [ 109.021293] arch_uprobe_exception_notify+0x20f/0x220 [ 109.026457] ? arch_uprobe_post_xol+0x500/0x500 [ 109.031110] notify_die+0x247/0x3e0 [ 109.034715] math_error+0x150/0x600 [ 109.038320] do_coprocessor_error+0x29/0x30 [ 109.042617] coprocessor_error+0x1b/0x40 [ 109.046653] RIP: 0010:fpu__drop+0x27f/0x4f0 [ 109.050946] RSP: 0000:ffff8801718cfc98 EFLAGS: 00010202 [ 109.056282] RAX: ffff88015401d500 RBX: ffff880154015501 RCX: ffff880000000000 [ 109.063525] RDX: ffff880154025504 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 109.070771] RBP: ffff8801718cfce8 R08: 0000000001080020 R09: 0000000000000002 [ 109.078022] R10: 0000000000000000 R11: ffff8801718c0000 R12: 0000000000000000 [ 109.085271] R13: ffff880154014418 R14: ffff880154015504 R15: 0000000000000000 [ 109.092522] ? fpu__drop+0x267/0x4f0 [ 109.096212] ? do_signal+0x168a/0x1c80 [ 109.100077] fpu__clear+0x56/0x2f0 [ 109.103594] do_signal+0x168a/0x1c80 [ 109.107283] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 109.112619] ? kmsan_set_origin_inline+0x6b/0x120 [ 109.117442] prepare_exit_to_usermode+0x271/0x3a0 [ 109.122260] ? page_fault+0x2f/0x50 [ 109.125859] retint_user+0x8/0x8 [ 109.129199] RIP: 0033:0x402030 [ 109.132362] RSP: 002b:0000000000a3e4f8 EFLAGS: 00000246 [ 109.137701] RAX: 0000000000000000 RBX: 04bfd5407b8d03bc RCX: 0ff0fcb578e0afe0 [ 109.144945] RDX: 0000000000a3e500 RSI: 0000000000a3e630 RDI: 000000000000000b [ 109.152189] RBP: 32cc0e8b1fe64659 R08: 538367a4927668d3 R09: 66e78ab243cb4739 [ 109.159435] R10: c8ee14c753ecc16d R11: 08c019ffc58ee033 R12: f545b5c2d2ec827a [ 109.166679] R13: c397ff308ab20314 R14: 6dc82030ced362ad R15: 279eb4042a645f83 [ 109.173922] [ 109.175525] Local variable description: ----env.i@copy_fpstate_to_sigframe [ 109.182506] Variable was created at: [ 109.186195] copy_fpstate_to_sigframe+0x6d/0x980 [ 109.190925] do_signal+0xbe4/0x1c80 [ 109.194522] ================================================================== [ 109.201852] Disabling lock debugging due to kernel taint [ 109.207272] Kernel panic - not syncing: panic_on_warn set ... [ 109.207272] [ 109.214610] CPU: 1 PID: 8044 Comm: syz-executor2 Tainted: G B 4.16.0+ #87 [ 109.222723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.232052] Call Trace: [ 109.234619] dump_stack+0x185/0x1d0 [ 109.238223] panic+0x39d/0x940 [ 109.241409] ? arch_uprobe_exception_notify+0x20f/0x220 [ 109.246754] kmsan_report+0x238/0x240 [ 109.250545] __msan_warning_32+0x6c/0xb0 [ 109.254593] arch_uprobe_exception_notify+0x20f/0x220 [ 109.259758] ? arch_uprobe_post_xol+0x500/0x500 [ 109.264401] notify_die+0x247/0x3e0 [ 109.268017] math_error+0x150/0x600 [ 109.271634] do_coprocessor_error+0x29/0x30 [ 109.275931] coprocessor_error+0x1b/0x40 [ 109.279969] RIP: 0010:fpu__drop+0x27f/0x4f0 [ 109.284262] RSP: 0000:ffff8801718cfc98 EFLAGS: 00010202 [ 109.289598] RAX: ffff88015401d500 RBX: ffff880154015501 RCX: ffff880000000000 [ 109.296842] RDX: ffff880154025504 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 109.304088] RBP: ffff8801718cfce8 R08: 0000000001080020 R09: 0000000000000002 [ 109.311331] R10: 0000000000000000 R11: ffff8801718c0000 R12: 0000000000000000 [ 109.318576] R13: ffff880154014418 R14: ffff880154015504 R15: 0000000000000000 [ 109.325827] ? fpu__drop+0x267/0x4f0 [ 109.329515] ? do_signal+0x168a/0x1c80 [ 109.333379] fpu__clear+0x56/0x2f0 [ 109.336895] do_signal+0x168a/0x1c80 [ 109.340584] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 109.345922] ? kmsan_set_origin_inline+0x6b/0x120 [ 109.350744] prepare_exit_to_usermode+0x271/0x3a0 [ 109.355568] ? page_fault+0x2f/0x50 [ 109.359168] retint_user+0x8/0x8 [ 109.362506] RIP: 0033:0x402030 [ 109.365676] RSP: 002b:0000000000a3e4f8 EFLAGS: 00000246 [ 109.371020] RAX: 0000000000000000 RBX: 04bfd5407b8d03bc RCX: 0ff0fcb578e0afe0 [ 109.378270] RDX: 0000000000a3e500 RSI: 0000000000a3e630 RDI: 000000000000000b [ 109.385513] RBP: 32cc0e8b1fe64659 R08: 538367a4927668d3 R09: 66e78ab243cb4739 [ 109.392758] R10: c8ee14c753ecc16d R11: 08c019ffc58ee033 R12: f545b5c2d2ec827a [ 109.400007] R13: c397ff308ab20314 R14: 6dc82030ced362ad R15: 279eb4042a645f83 [ 109.407729] Dumping ftrace buffer: [ 109.411247] (ftrace buffer empty) [ 109.414929] Kernel Offset: disabled [ 109.418529] Rebooting in 86400 seconds..