INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2018/04/12 09:05:03 fuzzer started 2018/04/12 09:05:04 dialing manager at 10.128.0.26:41677 2018/04/12 09:05:10 kcov=true, comps=false 2018/04/12 09:05:13 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000002}, 0x1c) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)}}], 0x1, 0x0) 2018/04/12 09:05:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891000000390009000a0005250d0000000000000705000000000000dc1338d54400009b136ef75afb83de448daa7227c43ab8220020bdf26fd34ea867ae", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 2018/04/12 09:05:13 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000), 0x4) 2018/04/12 09:05:13 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x24) 2018/04/12 09:05:13 executing program 4: 2018/04/12 09:05:13 executing program 3: 2018/04/12 09:05:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, {@in6, 0xffffffffffffffff, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/12 09:05:13 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000000d00)="e5", 0x1, 0xfffffffffffffffc, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syzkaller login: [ 43.686640] ip (3805) used greatest stack depth: 54200 bytes left [ 45.875949] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.965727] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.986359] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.095380] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.111698] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.251146] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.355244] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.424368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.907213] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.004652] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.148568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.156834] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.250493] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.260136] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.268261] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.428430] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.708181] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.714588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.730743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.774874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.788145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.812852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.965890] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.973177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.991534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.021124] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.027656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.039185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.072545] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.081732] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.091611] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.098840] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.106099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.129647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.163185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.198288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.225705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.248650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.255995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.263939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 09:05:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f00006f2fec)={0x14, 0x1a, 0x10301}, 0x14}, 0x1}, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/135, 0x87}], 0x1) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote={0xfe, 0x80, [], 0xbb}}, 0x5c3) 2018/04/12 09:05:31 executing program 0: 2018/04/12 09:05:31 executing program 7: 2018/04/12 09:05:31 executing program 5: 2018/04/12 09:05:31 executing program 2: 2018/04/12 09:05:31 executing program 4: 2018/04/12 09:05:31 executing program 6: 2018/04/12 09:05:31 executing program 3: 2018/04/12 09:05:31 executing program 1: 2018/04/12 09:05:31 executing program 5: 2018/04/12 09:05:31 executing program 7: 2018/04/12 09:05:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x3) 2018/04/12 09:05:31 executing program 3: 2018/04/12 09:05:31 executing program 4: 2018/04/12 09:05:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000002000)="0d576a5a500f28c131f2477eaf87125e", 0x10) r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x3a) sendmmsg(r0, &(0x7f00004d2f80)=[{{&(0x7f0000236ff0)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000622fd8)}}], 0x1, 0x0) 2018/04/12 09:05:31 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/12 09:05:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "cc90e2", 0x14, 0x6c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 2018/04/12 09:05:31 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x8, {0x2, 0x0, @loopback=0x7f000001}, 'ip_vti0\x00'}) 2018/04/12 09:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="3400000042000b030000000000000000000000000800040000000000100001006b65956bdd917727656d30000800040000000000"], 0x1}, 0x1}, 0x0) 2018/04/12 09:05:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) sendto$inet6(r1, &(0x7f00000000c0)="91", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000000)=0x9) 2018/04/12 09:05:31 executing program 4: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0xfffffffffffffffb, 0x0, 0x29, 0x101000}, 0x9) 2018/04/12 09:05:31 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000009, &(0x7f0000000000)=0x2f, 0x176) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x200601) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 2018/04/12 09:05:31 executing program 7: unshare(0x8000400) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200100, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x9, 0x100, 0x9, 0x60, 0x3ea, 0x6, 0x7fff, {0x0, @in6={{0xa, 0x4e21, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0x4}}, 0x1ff, 0x2, 0x6, 0x2, 0x8000}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r1, 0x1ff}, 0x8) r2 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f00000000c0), &(0x7f0000000040)=0xffffff14) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x200) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000100)={0x3, r4}) 2018/04/12 09:05:31 executing program 5: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0xfffffd, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000e39ff7)='/dev/sg#\x00', 0x0, 0x142) read(r0, &(0x7f0000000280)=""/36, 0xf0afcb82) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @rand_addr, 0x4e21, 0x0, 'nq\x00', 0x0, 0x200, 0x42}, 0x2c) write(r0, &(0x7f000023b000)="ddc1c992757ba20660367e97d8d9ad86f4b78974721e09ead46d4ccccfd6b790014ff2bd2ca43e7c50a9", 0xe7) 2018/04/12 09:05:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x94}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) mkdir(&(0x7f0000000040)='./control\x00', 0x0) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) r1 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) rename(&(0x7f00000f2ff8)='./file0\x00', &(0x7f0000ab5ff6)='./control\x00') execveat(r1, &(0x7f0000000000)='./control\x00', &(0x7f0000000340), &(0x7f0000000400), 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x7f, 0x0) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x38, 0x6, "8f36c7d8ec7adc624b7a1111fe74c7fd2121b31a99ebb0aa6f4a665797e6fcc235fd5de9f7ffc9474b543ebf8096124d"}, &(0x7f0000000280), 0x1000) setsockopt$ipx_IPX_TYPE(r2, 0x100, 0x1, &(0x7f0000000040)=0x1, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000080)="1670cd0265d6a19b8a4eaee167c87983cfcc387d1a09bc2252ab51d88255cdaa8fc4373d065aa76ac08126d8f8327c7b718952b361ea7fed49ecc11b79522854ee48e711", &(0x7f0000000100)=""/26}, 0x18) 2018/04/12 09:05:31 executing program 6: socketpair(0x0, 0x5, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) futex(&(0x7f0000000100), 0x7, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180), 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) socket$inet_sctp(0x2, 0x1, 0x84) 2018/04/12 09:05:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000423fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) pipe(&(0x7f0000000000)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000178fd0)="d3ab27191a01002300000000000000020000010000000000ffff0000000000000001070097c11ed4c2c4dcd2ffa86eb9", 0x30) 2018/04/12 09:05:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x2011}, {r0}, {r0, 0x10}, {r0, 0xc000}], 0x4, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x4}, 0x8) 2018/04/12 09:05:31 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x103000, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x80840, 0x2b) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"3a06713001000020ee0000b50600", 0x102}) 2018/04/12 09:05:31 executing program 7: unshare(0x8000400) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200100, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x9, 0x100, 0x9, 0x60, 0x3ea, 0x6, 0x7fff, {0x0, @in6={{0xa, 0x4e21, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0x4}}, 0x1ff, 0x2, 0x6, 0x2, 0x8000}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r1, 0x1ff}, 0x8) r2 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f00000000c0), &(0x7f0000000040)=0xffffff14) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x200) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000100)={0x3, r4}) 2018/04/12 09:05:32 executing program 6: socketpair(0x2, 0xa, 0x7718, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) openat(r0, &(0x7f00000004c0)='./file0\x00', 0x101000, 0x20) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x31, &(0x7f00009b9000)=0x80, 0x4) sendto$inet(r2, &(0x7f00003fbf9c), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr}, 0x10) r3 = dup3(r2, r2, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x7fff}}, 0x3ff, 0x5, 0x8, 0xf91, 0x3833b5de}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e24, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x5}}, 0x9, 0x4}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x1, 0x5, 0x1, 0x1, 0xffffffffffffff9c, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xe, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x32}, @ldst={0x0, 0x3, 0x6, 0x5, 0x8, 0xfffffffe, 0x10}, @exit={0x95}, @map={0x18, 0x4, 0x1, 0x0, r3}, @generic={0x4, 0x80000001, 0xaf, 0x7}, @exit={0x95}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000000100)='GPL\x00', 0xe01, 0xff, &(0x7f0000000140)=""/255, 0x41100, 0x1}, 0x48) 2018/04/12 09:05:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f74000)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000b7a000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000760000)={0x0, 0x0, &(0x7f0000397000)=[{&(0x7f0000b22000)="3a8b142321d6ba1cdbdadcf6f6395240c3b054dd5ba26413b8972cab8a54abfdb8887af88b9565ebff5ea63d4f73cac7ed15d7cc3da1f40e8b2cf38c9c1b6ee9b12a6042400b", 0x46}], 0x1}, 0x0) r2 = userfaultfd(0x80000) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) readv(r1, &(0x7f0000d2d000)=[{&(0x7f0000789000)=""/69, 0x45}, {&(0x7f0000f87000)=""/26, 0x1a}], 0x2) 2018/04/12 09:05:32 executing program 7: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000800)={0x0, 0x9f, "8ab674fce59e3fe0d812b3c035a1020cc3e7c8f6c2a7a5e3aebfa8f7b5f5f348c688517d678a1778915ca691c505a4bb76eff3c14de23885b752fd581eeedb8eb344e88657455d1ff4b479af9d34684fba44cabec3e95b8f3699925b724f60d38abd23b7f843835a5e184faf747d93c0fbb09a21f4c6567fc4232f3d721ef7a9a86292d62a38920de003f8187c5c7027601266df07ff82e806fcff67689813"}, &(0x7f00000009c0)=0xa7) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000a00)={r1, 0xf4, 0xa6f4}, &(0x7f0000000a40)=0x8) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000200000200000000", 0x14, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x401, 0x9, &(0x7f0000000580)=[{&(0x7f0000000080)="79c4a8b9cbc7082babbd2f9bcae2f0bf6e2907bf14294bc8580d382ad7c70832c331efe177ec2d8d58403e4158bb94fe125a93fdd4605714a578cc23e029a262298fef41f5314cef92864653c81e4a5d9936c3ff36c9821c6b04369667ff644da4549bc9929587f104c3267394486b8553f6d7f4c6913594ba094fbde585e71eb8ba9c315353de55e69c3173429ad9f0f5b6acd23da21a17f708c64c398c60af23af8abbd7fbf4f546ee1366eca01700a9eb91d8f2a378403c628e8c0aa74274633e1b08e587ffad7d389d9de5fa40374c48e83cc1f7f99681", 0xd9, 0x5}, {&(0x7f0000000180)="a0f615064204680bc0cc9a9bdd9d2f8e3c3b55776e1054758e64dd876bd47f0608673da086b5a4aec937a335086a1e184990f4", 0x33, 0x6b8e}, {&(0x7f00000001c0)="768d9acf2f341162e6ff3970296dfd31dfefc6843bba0f3678b794fe894a28090149ed7da3be66fdf255d9858474dcbef363d11e2c7a86a6aaf3f32519f383ddd6ba3703c986311821e758d0e168be2ff70470ea0f2902e336a809521e4e", 0x5e}, {&(0x7f0000000240)="02f51bfb5713a4b1ec7424f648a617d8aecf3d1a5a85a8f1efb5cc483e7e146ff86c834987ab0724dd0567cada960210b317d7515a1692901652d0fcbe4387794a79f86db4176c97bad91d331ea456042f78d01441eda2eb6434995909b63e16180187d4bfd3b44c89fe98a2b7dba398afa3af8af68c33a7cf451c7104c3432bd90575cb95e3a7e059adb92ce469d14e37e06ac4036af319d6", 0x99}, {&(0x7f0000000300)="22c2d83aa7a10f2d770fa1ebf31159a63e9f51e9ce54cc2217f2b49dd5cf80ee9035b7dde20fd696533832da2f126117cfd7c4445f70043d350d529af95fed3d4be2d434526db21e9fe2498f4dc0c779a52cd14645426cb0b0dd199295f60036331cff0b79cf643562935c8f9285931f8df495f2f05caf274a2ab998051fea0941679d11334ba7753b773509946689dcaea5bb6bb91209c77329149bcfca3ee3a7654ee169e6e20897543cc564452ac9", 0xb0, 0x458}, {&(0x7f00000003c0)="a1099703b906c30fbfccaa23671f42888896a8dbf4e2a733ccc5d3c477d9ebab54504bd12f18", 0x26, 0x81}, {&(0x7f0000000400)="817a96e3ab09121cc3ed176bdd676f0d23e442e83ac4d326de358c52e84f4b0218705173d04f8a4561fd6aab14fb9f9ba6af817535e3b844f99c53a593ee37608defb28d913a045ebc29e6ad25ee368564fb31bf9daeae19697f0c784bfa031fce75d8425b05187836ce40a8b60a6fe9b3aee7a6a705da5b96a9da3e332d457cddd91dda4a7285bd8572ed2b3584316462bfacbb6590dc7310c34b5a93e4453534acbe06778b68f10935bcee43bb273fcc8e2efb13e04f9e8ca535d7d48ca16ad9a9dbe84492d33a28f2d167311812ef3426e68e06c485bfc4ccd08b1dc6d2a39b989ac500e0a9d0de71", 0xea, 0x7}, {&(0x7f0000000500)="11313e54dee65a08519fa04f0e5a6f7e", 0x10, 0x7fff}, {&(0x7f0000000540)="283ede208bb99d187b97cc67df6a4d9a950d660fd8927fdba4debd5f1b59692a2b0eae5c662a3deeed7da5ebcdd905c95b7a", 0x32, 0x3}], 0x1000040, &(0x7f0000000680)={[{@gid={'gid', 0x3d, [0x32, 0x34, 0x34, 0x31]}, 0x2c}, {@tz_utc='tz=UTC', 0x2c}, {@debug='debug', 0x2c}, {@dos1xfloppy='dos1xfloppy', 0x2c}, {@discard='discard', 0x2c}, {@usefree='usefree', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x3f, 0x39]}, 0x2c}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000a80)=0x0) ptrace$getsig(0x4202, r2, 0x0, &(0x7f0000000ac0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000008c0)={0x0, @dev, @loopback}, &(0x7f0000000900)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xf, 0x4, &(0x7f0000000740)=@raw=[@ldst={0x3, 0x2, 0x7, 0xa, 0x9, 0x100, 0xfffffffffffffffd}, @generic={0x80000000, 0x100, 0x80800000, 0x8}], &(0x7f0000000780)='syzkaller\x00', 0x4, 0x3b, &(0x7f00000007c0)=""/59, 0x41100, 0x1, [], r3}, 0x48) 2018/04/12 09:05:32 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000200)=""/53, 0x35}, {&(0x7f0000000240)=""/92, 0x5c}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/114, 0x72}, {&(0x7f0000001340)=""/117, 0x75}, {&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/5, 0x5}, {&(0x7f00000014c0)=""/120, 0x78}], 0x9, 0x0) getgid() syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4000000000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000080)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r0}, 0x9) [ 59.121267] syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/12 09:05:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) sendto$inet6(r1, &(0x7f00000000c0)="91", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x2}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x4002, 0x0) 2018/04/12 09:05:32 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_targets\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x1) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x23) fcntl$setown(r1, 0x8, 0x0) prctl$void(0x22) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000200)={@local, @multicast2}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/12 09:05:32 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x121) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000080)="04dd1c5959ddedfb0a2d9e203c28a5dde80b78d628fce9b84aa3d0a44d5805795c4cccdd05284bde110e53cf3e55a52f3488153b4174f223eb367e44df54db689f7e653cf7607f6d523a46f3d08a990d04f02cc8540e0d22564da41beb920c6e8694494c46fd9968c350840185e58a52c1fdcf3f46a9a84ad5409701832001fa6d208cede9a98222623d70b216b66b8a55c0b8e8d31a1d033628db69f6615ce6e280d311cec0524619cc5a9a8c5f53dffc25623f04b91d69c0ead035091ba1eb607ab2f5fc8986bc95fc24f29b359228339acfc41db72bdaab5be59a2e", &(0x7f0000000180)="a7eedfa0855498a227f57463870c45dadb0ee839e0d332d339133ec8a0f7f8100d7c23a39a9461775de128b29c5595c0cf21a3de2400d613bb0c6f5aa57d6d1eb5831c438194105b226a25cfe9ed596805eaaf48589b1b3d4a6200bcefd8901d3a28b84269c9d1c23403c0940bfc52d65f06788da93ed07d4ab8dd2fd7cb4fe8526770db792ebccc9e6e28980f3a026e0899ea9eb05942c2203278ad70ebe1d8cb3ffdcb303e2e4c66c63adb73f8c401b75c50d0c10f12afc1e88a276084cb8191dbeaf39decc31b13d9e58cca2649ec943b0779f8dae228c0d565cb2d"}, 0x20) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000400)={0x0, 0x4, 0x1, 0x90, &(0x7f0000ffe000/0x2000)=nil, 0x101}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000440)={0x3, 0x3, 0xb000}, 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) clock_gettime(0x800000000007, &(0x7f0000000000)) 2018/04/12 09:05:32 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, "6f60abb6694c35a5", "02fc4976758d745f1cb81073833d118a72a579233691d681b500cc52ce79021c"}) process_vm_writev(0x0, &(0x7f0000000180), 0x100000000000004c, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/80, 0x50}, {&(0x7f0000000580)=""/97, 0x3d}, {&(0x7f0000000500)=""/125, 0x7d}, {&(0x7f0000000340)=""/140, 0x8c}, {&(0x7f00000004c0)=""/59, 0x3b}], 0x136, 0x0) sysfs$1(0x1, &(0x7f0000000000)='client1\x00') 2018/04/12 09:05:32 executing program 5: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0xfffffd, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000e39ff7)='/dev/sg#\x00', 0x0, 0x142) read(r0, &(0x7f0000000280)=""/36, 0xf0afcb82) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @rand_addr, 0x4e21, 0x0, 'nq\x00', 0x0, 0x200, 0x42}, 0x2c) write(r0, &(0x7f000023b000)="ddc1c992757ba20660367e97d8d9ad86f4b78974721e09ead46d4ccccfd6b790014ff2bd2ca43e7c50a9", 0xe7) 2018/04/12 09:05:32 executing program 7: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/dev_mcast\x00') readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/11, 0xb) ioctl$VT_ACTIVATE(r1, 0x5606, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) r2 = shmget$private(0x0, 0x1000, 0x5c, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000140)=""/195) socket$inet6_sctp(0xa, 0x5, 0x84) ioprio_set$pid(0x1, r0, 0x0) 2018/04/12 09:05:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x408000) recvmsg$kcm(r0, &(0x7f0000001200)={&(0x7f00000000c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/107, 0x6b}], 0x2, 0x0, 0x0, 0x3}, 0x2) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000000040)) 2018/04/12 09:05:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) sendto$inet6(r1, &(0x7f00000000c0)="91", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:32 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="f7", 0x1}], 0x1, 0x0) writev(r0, &(0x7f0000000180), 0x100000000000026a) 2018/04/12 09:05:32 executing program 6: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) 2018/04/12 09:05:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)) getdents64(r0, &(0x7f0000000180)=""/75, 0x1e) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000271fb8)=""/72, 0xffffffffffffff34) 2018/04/12 09:05:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) sendto$inet6(r1, &(0x7f00000000c0)="91", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) [ 59.746499] capability: warning: `syz-executor7' uses 32-bit capabilities (legacy support in use) 2018/04/12 09:05:32 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r1 = eventfd(0x3f) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x1000000c}) unshare(0x400) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000140)=0x101, 0x4) 2018/04/12 09:05:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvfrom$inet(r0, &(0x7f0000000000)=""/79, 0x4f, 0x20, 0x0, 0x175) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x3c, @loopback=0x7f000001, 0x4e24, 0x0, 'none\x00', 0x30, 0x1, 0x6e}, {@empty, 0x4e20, 0x3, 0x9, 0x40, 0x6}}, 0x44) getsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 2018/04/12 09:05:32 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @multicast2, @local}, &(0x7f0000000640)=0xc) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000680)={r1, 0x1, 0x6, @random="43aa4b21f0a7"}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200402, 0x0) statx(r3, &(0x7f0000000040)='./file0\x00', 0x100, 0x100, &(0x7f0000000140)) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r4, &(0x7f0000000100)=ANY=[], 0x1023c) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$cgroup_int(r4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) fallocate(r4, 0x3, 0x3, 0xffff) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000000c0)=""/26, &(0x7f0000000240)=0x1a) r6 = socket$netlink(0x2, 0x5, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r6, 0x84, 0x4, &(0x7f0000001000), 0x3) 2018/04/12 09:05:32 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) io_setup(0xda13, &(0x7f0000000080)=0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) setreuid(r1, r2) io_destroy(r0) mlock2(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) 2018/04/12 09:05:32 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) 2018/04/12 09:05:33 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x10040, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000240)={0x0, {{0xa, 0x4e22, 0x4, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x400}}}, 0x88) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x100000000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000300)=0x178, 0x1) r3 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x5452, &(0x7f0000000080)={'bcsh0\x00'}) 2018/04/12 09:05:33 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x200, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r2, &(0x7f0000017000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x7ff}, 0x4) sendmsg(r2, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000019fa0), 0x1f2, &(0x7f000001ef08)}, 0x7fffee0e) 2018/04/12 09:05:33 executing program 7: mmap(&(0x7f000053e000/0x2000)=nil, 0x2000, 0x0, 0x84132, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000200)) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(xts(aes),sha384)\x00'}, 0xfffffffffffffccc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) munmap(&(0x7f000053c000/0x1000)=nil, 0x1000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0x7, 0xffff}, 'port0\x00', 0x12, 0x2, 0x9, 0x6, 0x8, 0x5, 0x13df, 0x0, 0x3}) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getpeername$ipx(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) mmap(&(0x7f000053f000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r0, 0xfffffffffffffffc) 2018/04/12 09:05:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x20000000002285, &(0x7f0000000040)="53000000012e2a6824f8fc7300000000000000000000000000000004ce8a") fcntl$getownex(r0, 0x10, &(0x7f0000000000)) close(r0) 2018/04/12 09:05:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = dup(r0) r2 = geteuid() r3 = getegid() fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r3, 0x1000) r4 = accept$alg(r0, 0x0, 0x0) recvmsg(r4, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 09:05:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}, 0x7}}, 0x8, 0xade, 0x8, 0xba, 0x7}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r2, 0x8000, 0x6, 0x7, 0x4, 0x81}, &(0x7f00000001c0)=0x14) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0xe, 0xffffffffffffffd7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @tick, 0xfffffffffffffffe, {}, 0x0, 0xffffffffffffffff}) 2018/04/12 09:05:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) sendto$inet6(r1, &(0x7f00000000c0)="91", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:33 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x200, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r2, &(0x7f0000017000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x7ff}, 0x4) sendmsg(r2, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000019fa0), 0x1f2, &(0x7f000001ef08)}, 0x7fffee0e) 2018/04/12 09:05:33 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)={0xaa}) r1 = epoll_create1(0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) getsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000040), &(0x7f0000012ffc)=0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) fchdir(r1) 2018/04/12 09:05:33 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0), 0xfdc5, 0x0, &(0x7f0000000080)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) r1 = dup3(r0, r0, 0x0) bind$rds(r1, &(0x7f0000000200)={0x2, 0x4e20}, 0xffffffffffffffc4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'irlan0\x00', 0x3}, 0x18) r2 = creat(&(0x7f0000002dc0)='./file0\x00', 0x20000000000018) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000002d00)) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) sendmsg$rds(r1, &(0x7f0000002cc0)={&(0x7f0000000140)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=[@mask_fadd={0x58, 0x114, 0x8, {{0x8000, 0x5c0}, &(0x7f00000001c0)=0x7f, &(0x7f0000001240)=0x7, 0x8, 0x9, 0x100000000000, 0x2, 0x1c}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001280)=""/4096, 0x1000}, &(0x7f0000002280), 0x40}}, @cswp={0x58, 0x114, 0x7, {{0xffffffff, 0x7}, &(0x7f00000022c0)=0x2, &(0x7f0000002300)=0xab6, 0x2, 0x0, 0x101, 0xfff, 0x20, 0x5}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000002340)=""/104, 0x68}, &(0x7f00000023c0)}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000002400)=""/145, 0x91}, &(0x7f00000024c0), 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0xc0, 0x1f}}, @rdma_args={0x48, 0x114, 0x1, {{0x7, 0x5}, {&(0x7f0000002500)=""/66, 0x42}, &(0x7f00000028c0)=[{&(0x7f0000002580)=""/222, 0xde}, {&(0x7f0000002680)=""/11, 0xb}, {&(0x7f00000026c0)=""/212, 0xd4}, {&(0x7f00000027c0)=""/133, 0x85}, {&(0x7f0000002880)=""/1, 0x1}], 0x5, 0x10}}, @mask_fadd={0x58, 0x114, 0x8, {{0x0, 0x6a9}, &(0x7f0000002940)=0x3, &(0x7f0000002980)=0x1, 0x7, 0x1, 0x1, 0x200, 0x30, 0x1f}}, @mask_cswp={0x58, 0x114, 0x9, {{0x6, 0x5}, &(0x7f00000029c0)=0x40, &(0x7f0000002a00)=0x24993438, 0x1eb8, 0xc9, 0x0, 0xd3be, 0x4, 0x1be}}], 0x250, 0x1}, 0x4c085) 2018/04/12 09:05:33 executing program 2: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fcntl$setsig(r0, 0xa, 0x15) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000180)=""/69) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x7, 0x4, 0x4a0, 0x160, 0x278, 0x278, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000200), {[{{@arp={@rand_addr=0xd9, @local={0xac, 0x14, 0x14, 0xaa}, 0xffffffff, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {[0x0, 0xff, 0x0, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x773, 0x100000001, 0x1, 0x80000001, 0x5, 0x4, 'team_slave\x00', 'bcsh0\x00', {0xff}, {}, 0x0, 0x20}, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x10000, 0x6, 0x100000001, 0x1, 0x0, "5b3fd276652aacd242e38186aeb3ed9313d4521a464f1a1626d0940522d44d5f9b8568b5ea04c3b441bcd6856cb3640c2202ea15585af6d90a919582b67c160e"}}}, {{@arp={@loopback=0x7f000001, @multicast1=0xe0000001, 0xffffff00, 0xff000000, @empty, {[0x0, 0xff]}, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {[0x0, 0x0, 0x0, 0xff, 0x0, 0xff]}, 0x1, 0x0, 0x1, 0xffff, 0x100, 0x6, 'sit0\x00', 'teql0\x00', {0xff}, {0xff}, 0x0, 0xa}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x3, 0x800}}}, {{@arp={@rand_addr=0x5, @multicast1=0xe0000001, 0xff000000, 0xffffff00, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}, @mac, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0x8, 0xff47, 0x6, 0x38, 0x18000000000000, 0x111d, '\x00', 'bond0\x00', {}, {}, 0x0, 0x51}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0x18}, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x3, 0x101, 0x7a7a, 0x9, 0xffffffffffffffff, 0x4}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xffffffff00000001, 0x0, 0x1d3, 0x80000001}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x6e05}, &(0x7f0000000140)=0x8) 2018/04/12 09:05:34 executing program 5: r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz1', "15a634ae854290b9b054c77a2f280987ac21d252b51a76dd93065a25016fda6aa88d0e6ab76fc448bb6df28cd74728fb1e22589c8f4a9cf846d4246103db26a1094f5c313638a7fc4ed4965e86d84ea7a8ec992b33b80db21679d0892cae73e1985e0d5169cea5a9efdc70ad78028afc5bd0c303e742b053eb3bccbd756edee2a95718f67a6916af8448d72f067682ccb9bb72f35a1cc70a"}, 0x9c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fgetxattr(r1, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f0000000080)=""/2, 0xd233dc1cb9b89ab7) 2018/04/12 09:05:34 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x35, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) write$cgroup_pid(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="c000000036"], 0x5) getsockopt$inet_udp_int(r0, 0x11, 0x64, &(0x7f0000000ffc), &(0x7f0000012000)=0x4) 2018/04/12 09:05:34 executing program 7: timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f00000001c0)}}, &(0x7f0000000300)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bind(r0, &(0x7f0000000080)=@llc={0x1a, 0x306, 0x28, 0x7, 0x6, 0x2, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f00000004c0)=@generic={0x0, "54140bf8d58a31fcf976acdc3f1b8cef31aa1e40ffe813905b7ec85f1c91537adb5e935a46df64813c66df29c47b16e2ed10955f40be666cb0951ecdb1afc908cb9eafb20b4d3f013ea1f03013ec61afa7225d9bf811826bbacdc9a7a158c620e904dc7e70eb13e98e660ea94926dab56782eead5c762dff82b9a5cb6b79"}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000000)}}], 0x2, 0x0) 2018/04/12 09:05:34 executing program 1: unshare(0x400) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@mcast2={0xff, 0x2, [], 0x1}, 0x54, r1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) 2018/04/12 09:05:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:34 executing program 2: unshare(0x400) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000008ff1)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0xc0046d00, &(0x7f0000007000)) 2018/04/12 09:05:34 executing program 6: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xd, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x8, 0x200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000180)=""/129) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00000d9ffc)=""/4, &(0x7f0000000040)=0xffffffffffffff5d) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x4, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ptrace(0x4218, r3) syz_open_procfs(r3, &(0x7f000047d000)='pagemap\x00') 2018/04/12 09:05:34 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x1, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$kcm(0x29, 0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) close(r0) [ 61.693699] QAT: Invalid ioctl [ 61.693810] audit: type=1326 audit(1523523934.692:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5304 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x0 [ 61.729236] QAT: Invalid ioctl 2018/04/12 09:05:34 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0x1a, 0x4) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000080)=0x905276c35f4f28c8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r1) 2018/04/12 09:05:34 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000)=0x2, 0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='schedstat\x00') ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000080)) 2018/04/12 09:05:34 executing program 0: unshare(0x40600) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x401) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0xfffffffffffffd83) 2018/04/12 09:05:34 executing program 5: r0 = dup(0xffffffffffffff9c) ioctl$KDDELIO(r0, 0x4b35, 0xfffffffffffffff9) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x15, "1aab3ae083ae0c6866cdf3908290797d9cf064a23b"}, &(0x7f0000000040)=0x1d) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x6}, 0x8) r2 = socket$inet(0x10, 0x3, 0x101) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000100)={0x5, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, {0x2, 0x4e23}, {0x2, 0x4e22, @multicast2=0xe0000002}, 0x12, 0x1, 0xe0, 0x34a0bb17, 0xffffffffffff8000, &(0x7f0000000080)='syzkaller0\x00', 0x0, 0x1ff, 0x7ff}) 2018/04/12 09:05:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000300), 0x22, 0xc0) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000b06ffc), 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x10000, 0x0) mknodat(r2, &(0x7f0000000280)='./file0\x00', 0xc000, 0x9) set_thread_area(&(0x7f0000000200)={0x5, 0x1000, 0x0, 0x8, 0x80, 0x401, 0x7fff, 0x100, 0xfffffffffffffff9, 0x6}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) truncate(&(0x7f00000002c0)='./file0\x00', 0x3ff) getpeername(r0, &(0x7f0000000080)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x80) socketpair(0x9, 0x1, 0x6000000000000000, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000001c0)=0x8, 0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000140)={@mcast2={0xff, 0x2, [], 0x1}, 0x72, r3}) 2018/04/12 09:05:34 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x2) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000480)="90b8e5b0f3f2e7eb", 0x8}], 0x1) ioctl(r0, 0x81, &(0x7f0000000000)="38de8716f18901f27694dc66e44344fd5220b345e125947f389ee9f7b3b224e05bdb74ccdbbf2edc8f5e00ebb9536695a9eee2f0603530cb8fa355a3f66334b9912cb5a4acb7d5327388ed38f8f356e2fc46343a6a44e5548a3b094b376c7923e5e53400776c0caee10f2b2f124e22fa43274c880bf62ed0e5dc30b172458477187852efa2311ff3653ba6f14ffea497a0cd97b0b3e19e") 2018/04/12 09:05:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:35 executing program 2: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}], 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000002c0)={@remote={0xfe, 0x80, [], 0xbb}, 0x80, r1}) socketpair(0x1, 0x805, 0xfff, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000540)={0x77359400}, 0x10) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 2018/04/12 09:05:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="97", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x3c}, 0xb) recvmmsg(r0, &(0x7f0000002780)=[{{&(0x7f0000002600)=@hci, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=""/15, 0xf}}], 0x1, 0x2, &(0x7f0000000280)) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000000)=0x54) [ 62.598994] audit: type=1326 audit(1523523935.597:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5304 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x0 2018/04/12 09:05:35 executing program 6: io_setup(0xba, &(0x7f0000000000)=0x0) r1 = socket(0x15, 0x1, 0x8) fcntl$getflags(r1, 0xb) r2 = socket(0x2, 0x803, 0xff) io_submit(r0, 0x1, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000100)}]) 2018/04/12 09:05:35 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$void(r0, 0x5451) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) fcntl$addseals(r1, 0x409, 0xa) 2018/04/12 09:05:35 executing program 1: r0 = memfd_create(&(0x7f0000000000)='sit0\x00', 0x3) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = socket$inet6(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002580)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000025c0)={@mcast2={0xff, 0x2, [], 0x1}, 0x0, r2}) 2018/04/12 09:05:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) sendmsg$nl_generic(r0, &(0x7f00009f2000)={&(0x7f000007cff4)={0x10}, 0xc, &(0x7f00000012c0)={&(0x7f0000000140)={0x1c, 0x18, 0x2ff, 0x0, 0x0, {0xa, 0x0, 0x4b9}, [@nested={0x8, 0x0, [@generic="36b9"]}]}, 0x1c}, 0x1}, 0x0) 2018/04/12 09:05:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x204000, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x8001, 0x400, 0x76, 0x9, 0x0, 0x0, 0x14000, 0x8, 0x6, 0x5, 0x47d955e6, 0x2, 0x1, 0x6, 0x2, 0x6, 0x1, 0xef, 0x25, 0x2, 0x6, 0x2, 0x7fff, 0x65, 0x2, 0x101, 0x7, 0x2, 0x3, 0x3, 0x9, 0x5, 0x3, 0xffffffffffffdd04, 0x80000000, 0xfffe000000, 0x0, 0x2, 0x4, @perf_bp, 0x0, 0x8, 0x408, 0x5, 0x8, 0xd2, 0x140000000000000}, r1, 0x1, r2, 0x8) ppoll(&(0x7f0000000180)=[{}, {r0}], 0x20000000000001a5, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200), 0x8) 2018/04/12 09:05:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:35 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000480)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:35 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x1, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$kcm(0x29, 0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) close(r0) [ 62.878936] audit: type=1326 audit(1523523935.877:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5365 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455279 code=0x0 2018/04/12 09:05:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/9) r2 = dup3(r1, r0, 0x0) pwritev(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/12 09:05:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="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", 0x9d0}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) read(r1, &(0x7f0000000300)=""/180, 0xb4) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/12 09:05:36 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) io_setup(0x9, &(0x7f00000010c0)=0x0) io_destroy(r2) ptrace$getregset(0x4204, r1, 0x400001, &(0x7f0000000000)={&(0x7f0000000040)=""/4096, 0xffffff12}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000001080)={0x800}, 0x4) 2018/04/12 09:05:36 executing program 1: socketpair(0x1e, 0x201, 0xfffffffffffff1dc, &(0x7f0000000140)={0x0, 0x0}) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080)=0x9, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0x10, &(0x7f0000000040)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000000)=""/105, 0xfd78}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) close(r1) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/04/12 09:05:36 executing program 6: r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2, 0x80) recvfrom$ax25(r1, &(0x7f00000000c0)=""/70, 0x46, 0x2000, &(0x7f0000000140)={0x3, {"ee83d4ec75217c"}}, 0x10) 2018/04/12 09:05:36 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff7fffffff, 0x410000) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x4f, @dev={0xfe, 0x80, [], 0xe}, 0x1}, {0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}, 0x1f}, 0x15, [0x7f, 0x2, 0x3, 0x32, 0x8, 0x6, 0x5, 0x6da]}, 0x5c) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0x4}, 0x8) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) ioprio_set$uid(0x2, r3, 0x0) 2018/04/12 09:05:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x10) listen(r0, 0x43) socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r1 = accept4(r0, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 2018/04/12 09:05:36 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) sendmmsg$inet_sctp(r0, &(0x7f0000001d40), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7) 2018/04/12 09:05:36 executing program 7: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x82) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x1, 0x0, 0xffff, 0x800, 0x7ff, 0xe522, 0x9, 0x6, 0x6, 0x4, 0x7000000000000000, 0x6}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f000021d000)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) syz_emit_ethernet(0x234, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 63.310938] ================================================================== [ 63.318371] BUG: KMSAN: uninit-value in __crypto_memneq+0x2f9/0x490 [ 63.324786] CPU: 1 PID: 5394 Comm: syz-executor5 Not tainted 4.16.0+ #83 [ 63.331623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.340979] Call Trace: [ 63.343585] dump_stack+0x185/0x1d0 [ 63.347226] ? __crypto_memneq+0x2f9/0x490 [ 63.351467] kmsan_report+0x142/0x240 [ 63.355288] __msan_warning_32+0x6c/0xb0 [ 63.359364] __crypto_memneq+0x2f9/0x490 [ 63.363440] ? kernel_fpu_end+0x2c/0x1d0 [ 63.367509] ? gcmaes_decrypt+0x874/0xea0 [ 63.371662] ? kernel_fpu_end+0xba/0x1d0 [ 63.375728] gcmaes_decrypt+0x8d5/0xea0 [ 63.379719] generic_gcmaes_decrypt+0x181/0x1e0 [ 63.384391] ? generic_gcmaes_encrypt+0x1e0/0x1e0 [ 63.389233] gcmaes_wrapper_decrypt+0x2f5/0x340 [ 63.393907] ? gcmaes_wrapper_encrypt+0x2d0/0x2d0 [ 63.398750] aead_recvmsg+0x25b5/0x2960 [ 63.402743] ? aead_sendmsg+0x1b0/0x1b0 [ 63.406729] sock_read_iter+0x405/0x480 [ 63.410723] ? kernel_sock_ip_overhead+0x350/0x350 [ 63.415660] __vfs_read+0x6fb/0x8e0 [ 63.419298] vfs_read+0x36c/0x6c0 [ 63.422758] SYSC_read+0x172/0x360 [ 63.426308] SyS_read+0x55/0x80 [ 63.429599] do_syscall_64+0x309/0x430 [ 63.433494] ? vfs_write+0x8d0/0x8d0 [ 63.437223] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 63.442408] RIP: 0033:0x455279 [ 63.445589] RSP: 002b:00007f2f39c4fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.453306] RAX: ffffffffffffffda RBX: 00007f2f39c506d4 RCX: 0000000000455279 2018/04/12 09:05:36 executing program 1: pipe2(&(0x7f0000b9d000)={0x0, 0x0}, 0x0) accept4$packet(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000540)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'yam0\x00', r1}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0800000000009ce7299bf2f542f9d58bc17f120000"], &(0x7f0000000180), 0x1400) [ 63.460573] RDX: 00000000000000b4 RSI: 0000000020000300 RDI: 0000000000000014 [ 63.467839] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 63.475106] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 63.482380] R13: 0000000000000487 R14: 00000000006f9d48 R15: 0000000000000000 [ 63.489652] [ 63.491275] Local variable description: ----authTag@gcmaes_decrypt [ 63.497579] Variable was created at: [ 63.501307] gcmaes_decrypt+0xd6/0xea0 [ 63.505198] generic_gcmaes_decrypt+0x181/0x1e0 2018/04/12 09:05:36 executing program 7: r0 = socket$inet(0x2, 0x803, 0x81) sendmsg(r0, &(0x7f0000001480)={&(0x7f0000001180)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000001240), 0x0, &(0x7f0000001600)}, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x3, 0x4) r1 = memfd_create(&(0x7f0000000040)='[\x00', 0x3) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080)={0xffff, 0xd5, 0x6, 0x1f}, 0x6) recvmsg(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000002ac0)=""/89, 0x59}, 0x0) [ 63.509862] ================================================================== [ 63.517212] Disabling lock debugging due to kernel taint [ 63.522664] Kernel panic - not syncing: panic_on_warn set ... [ 63.522664] [ 63.530038] CPU: 1 PID: 5394 Comm: syz-executor5 Tainted: G B 4.16.0+ #83 [ 63.538176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.547529] Call Trace: [ 63.550134] dump_stack+0x185/0x1d0 [ 63.553771] panic+0x39d/0x940 [ 63.556992] ? __crypto_memneq+0x2f9/0x490 [ 63.561228] kmsan_report+0x238/0x240 [ 63.565036] __msan_warning_32+0x6c/0xb0 [ 63.569105] __crypto_memneq+0x2f9/0x490 [ 63.573174] ? kernel_fpu_end+0x2c/0x1d0 [ 63.577236] ? gcmaes_decrypt+0x874/0xea0 [ 63.581387] ? kernel_fpu_end+0xba/0x1d0 [ 63.585453] gcmaes_decrypt+0x8d5/0xea0 [ 63.589444] generic_gcmaes_decrypt+0x181/0x1e0 [ 63.594121] ? generic_gcmaes_encrypt+0x1e0/0x1e0 [ 63.598972] gcmaes_wrapper_decrypt+0x2f5/0x340 [ 63.603645] ? gcmaes_wrapper_encrypt+0x2d0/0x2d0 [ 63.608492] aead_recvmsg+0x25b5/0x2960 2018/04/12 09:05:36 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@ipx, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x7, 0xf4c}, {0x3, 0x904}], 0x2) connect$ipx(r0, &(0x7f0000000180)={0x4, 0xb0, 0x20000, "b25f4c54bee4", 0x80000000}, 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040), 0x8) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'irlan0\x00'}) [ 63.612486] ? aead_sendmsg+0x1b0/0x1b0 [ 63.616472] sock_read_iter+0x405/0x480 [ 63.620460] ? kernel_sock_ip_overhead+0x350/0x350 [ 63.625388] __vfs_read+0x6fb/0x8e0 [ 63.629021] vfs_read+0x36c/0x6c0 [ 63.632477] SYSC_read+0x172/0x360 [ 63.636027] SyS_read+0x55/0x80 [ 63.639306] do_syscall_64+0x309/0x430 [ 63.643194] ? vfs_write+0x8d0/0x8d0 [ 63.646919] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 63.652102] RIP: 0033:0x455279 [ 63.655284] RSP: 002b:00007f2f39c4fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.662999] RAX: ffffffffffffffda RBX: 00007f2f39c506d4 RCX: 0000000000455279 [ 63.670268] RDX: 00000000000000b4 RSI: 0000000020000300 RDI: 0000000000000014 [ 63.677540] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 63.684817] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 63.692087] R13: 0000000000000487 R14: 00000000006f9d48 R15: 0000000000000000 [ 63.700096] Dumping ftrace buffer: [ 63.703626] (ftrace buffer empty) [ 63.707311] Kernel Offset: disabled [ 63.710920] Rebooting in 86400 seconds..