INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.16' (ECDSA) to the list of known hosts. 2018/04/20 22:51:44 fuzzer started 2018/04/20 22:51:44 dialing manager at 10.128.0.26:40315 2018/04/20 22:51:50 kcov=true, comps=false 2018/04/20 22:51:53 executing program 0: 2018/04/20 22:51:53 executing program 1: 2018/04/20 22:51:53 executing program 7: 2018/04/20 22:51:53 executing program 2: 2018/04/20 22:51:53 executing program 3: 2018/04/20 22:51:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000080)="05", 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)='>', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000880)="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", 0x1fb}], 0x1) 2018/04/20 22:51:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) set_mempolicy(0x4001, &(0x7f0000c48000)=0x4, 0x8) r1 = accept4(r0, &(0x7f0000000000)=@llc, &(0x7f00000000c0)=0x80, 0x80800) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x50) ioctl$sock_ifreq(r0, 0x80000089a2, &(0x7f0000000080)={"6272696467653000e7ffffff00", @ifru_mtu=0x7}) 2018/04/20 22:51:53 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='95/'], 0x3) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000d25fef)='/dev/vga_arbiter\x00', 0x20001, 0x0) write$eventfd(r1, &(0x7f00009c2ff8), 0x8) syzkaller login: [ 43.041317] ip (3738) used greatest stack depth: 54944 bytes left [ 43.305618] ip (3762) used greatest stack depth: 54672 bytes left [ 44.339646] ip (3863) used greatest stack depth: 54200 bytes left [ 44.870710] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.877189] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.921015] device bridge_slave_0 entered promiscuous mode [ 45.102313] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.108821] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.161329] device bridge_slave_1 entered promiscuous mode [ 45.169724] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.176200] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.184333] device bridge_slave_0 entered promiscuous mode [ 45.196143] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.202616] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.211199] device bridge_slave_0 entered promiscuous mode [ 45.226990] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.233481] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.266453] device bridge_slave_0 entered promiscuous mode [ 45.290766] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.297242] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.310147] device bridge_slave_0 entered promiscuous mode [ 45.326540] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.333076] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.346077] device bridge_slave_0 entered promiscuous mode [ 45.379980] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.388018] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.394501] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.442063] device bridge_slave_1 entered promiscuous mode [ 45.450089] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.456549] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.478834] device bridge_slave_1 entered promiscuous mode [ 45.501654] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.508154] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.520821] device bridge_slave_1 entered promiscuous mode [ 45.533390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.540923] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.547426] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.579839] device bridge_slave_1 entered promiscuous mode [ 45.597862] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.604363] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.625391] device bridge_slave_0 entered promiscuous mode [ 45.643808] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.650300] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.660777] device bridge_slave_1 entered promiscuous mode [ 45.668330] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.674783] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.685681] device bridge_slave_0 entered promiscuous mode [ 45.700873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.725096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.734647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.745581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.821314] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.827802] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.880093] device bridge_slave_1 entered promiscuous mode [ 45.887227] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.893696] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.904196] device bridge_slave_1 entered promiscuous mode [ 45.922454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.927324] ip (3977) used greatest stack depth: 53960 bytes left [ 45.931769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.944390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.951907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.966860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.109016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.154507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.170411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.326437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.387949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.415578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.625524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.931329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.940160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.953972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.010127] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.122076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.166475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.176935] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.212003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.230509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.278812] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.423500] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.471724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.518629] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.530681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.622744] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.721542] ip (4114) used greatest stack depth: 53640 bytes left [ 47.741705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.968981] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.976276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.992728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.087852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.170617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.177832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.190099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.227616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.238544] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.273657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.292700] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.391119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.459704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.468545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.511543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.524646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.538459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.557836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.594865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.617935] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.627217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.645906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.697322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.704476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.721760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.733725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.742867] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.753342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.762660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.801139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.824610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.832501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.859754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.883470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.892410] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.900509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.915698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.959415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.969678] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.983917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.005569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.016737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.023720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.052333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.086846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.094159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.110746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.137268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.145965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.184852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.229431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.236561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.250753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.282894] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.290356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.316361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.347724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.355720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.379246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.432779] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.439959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.467692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.732436] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.738916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.745797] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.752247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.778767] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.785540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.199697] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.206201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.213088] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.219548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.247410] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.360011] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.366555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.373400] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.379917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.409995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.502444] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.508946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.515836] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.522296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.597533] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.615983] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.622482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.629358] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.635795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.675975] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.686773] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.693255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.700172] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.706634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.754439] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.764490] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.770955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.777854] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.784311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.800254] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.809262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.827343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.844818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.860457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.875298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.882776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.939731] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.946237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.953116] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.959583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.058951] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.832537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.345431] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.591577] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.976937] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.026122] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.034652] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.042239] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.059853] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.077669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.083928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.095120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.415903] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.422897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.434590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.510629] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.782910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.789210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.798958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.834004] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.842339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.851917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.886009] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.897866] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.912641] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.922402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.936898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.968929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.006970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.032723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.055345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.432753] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.439368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.453604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 22:52:19 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_writev(r0, &(0x7f00009c1000)=[{&(0x7f0000a95000)}, {&(0x7f0000bf7fe4)=""/28, 0x1c}, {&(0x7f00002c3ffb)=""/5, 0xfffffffffffffcb2}], 0x131, &(0x7f000009ffa0)=[{&(0x7f000049f000)=""/236, 0xec}], 0x1, 0x0) 2018/04/20 22:52:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = dup(r0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000000)={0x2, 0x1}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x40000004) 2018/04/20 22:52:20 executing program 6: r0 = socket$inet6(0xa, 0x4, 0x7) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/135, &(0x7f0000000140)=0x87) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x8642) [ 67.451590] bridge0: port 3(veth0_to_bridge) entered blocking state [ 67.458245] bridge0: port 3(veth0_to_bridge) entered disabled state [ 67.518988] device veth0_to_bridge entered promiscuous mode [ 67.525313] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 67.537138] bridge0: port 3(veth0_to_bridge) entered blocking state [ 67.543729] bridge0: port 3(veth0_to_bridge) entered forwarding state 2018/04/20 22:52:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="7904000000000000008ac253e71a5e5c4b870088d9bbe150a8946d665ff7f50a0859d10d54fbaa555f2763e38c03733740245295acc142b0ea36840b75cbcdcb6ed31a69ea71f9a61a8b34e23e4f36284b44ecce2050e4348d1297c6fdadd6d33196c9e2fb3d1f72604c3fcb1414358b57f9223891a27d7164fc61bb2b32420922e3167d3856ddbfd37183c0ce4dee65f28c608f5b785f2201cd767debbbce2de77acbd232a81900e838b3a86fe4df6e8c86721a7f1946c7ce8cf50462090031e47e041b3e5d31e0904abfb51f36cacedae97bbdc909930ae87ff3beee6a0052af7a67b0ad9dd59e436e1399", 0x3b3}], 0x1) 2018/04/20 22:52:20 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) socket$nl_xfrm(0x10, 0x3, 0x6) write(r1, &(0x7f0000000080)="f0", 0x1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000140)="9653a37089432151a8ae12f95bbc89a21436b83efcf7c4b04e5b4b21925eda8ddb7807a9b1af6123beab36e07a4b950adf01460776f067e719315413b61797103fe197558d6a2cbed9f62492a6e2d357d127d7baeeb6a5966765a2320a35eaeefb4c33f17351f6bbf87dbff5db014e9a26e88213e9046587b267a6d4c71e", 0x7e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x1, @loopback={0x0, 0x1}, 0x2352473c}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, @in={0x2, 0x4e22, @loopback=0x7f000001}], 0x68) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000300)=""/4096, &(0x7f0000000100)=0x61c6d4e1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x40}, 0x4) 2018/04/20 22:52:20 executing program 6: bind(0xffffffffffffffff, &(0x7f0000bd3000)=@generic={0x0, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) personality(0xbd2182ed6ffdb755) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) sync() r0 = memfd_create(&(0x7f0000000240)="76626f786e657430959500", 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) accept(r0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="83f33ffa8381093a7a4d1313b2543ec242f79cbe9b98e24aef24c1842cd599e1155d215ffb04044bd0aae54f6dd28f30cc43100991f0185ad4c3605f9a9a682e6d475e0b8b5cad12f3b2ac16db113c0ddcc1c6ed90244dc3415754278bd6b6708e59b63650f0733eedfbe32cde2a4893350eca75e0308a33b94b0d2f992dcaa3afd2c681ef667f0bd7872e4befeea14fef250b98a0ee46caa7ed2ce00034277a77eabdd794150a7068e1bd62a0277b08a1df711a251abaaf5d96f618a039a19e947e960000000000"], 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], &(0x7f0000000280)=')\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xebd, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000004c0)={0x20000000}) unshare(0x60000000) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', ')\x00'}, &(0x7f0000000180)=')\x00', 0x2, 0x1) mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x0, 0x31, r1, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000001c0)={0x52, 0x3, 0x2de01d52, {0x7fff, 0x7}, {0x20, 0x1447}, @ramp={0x587673f3, 0x8e, {0x80, 0x6, 0x9, 0x7205}}}) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) gettid() 2018/04/20 22:52:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000aa0000)='./file0\x00', 0x2, 0x10) fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) unshare(0x400) fcntl$dupfd(r0, 0x402, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)) 2018/04/20 22:52:21 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000554ff8)='./file0\x00', 0x0) unshare(0x8001) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x4) r0 = socket$rds(0x15, 0x5, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x1, 0x800) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xfffffffffffffdf5) 2018/04/20 22:52:21 executing program 5: rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) r0 = gettid() pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, &(0x7f0000000140)) tkill(r0, 0x1000000000016) 2018/04/20 22:52:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x100, 0x7f, 0xb}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000039afe0)={r0, &(0x7f000035b000), &(0x7f0000359f9e)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000234000)={r0, &(0x7f000013a000), &(0x7f000039f8f7), 0x1}, 0x20) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 2018/04/20 22:52:21 executing program 6: bind(0xffffffffffffffff, &(0x7f0000bd3000)=@generic={0x0, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) personality(0xbd2182ed6ffdb755) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) sync() r0 = memfd_create(&(0x7f0000000240)="76626f786e657430959500", 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) accept(r0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="83f33ffa8381093a7a4d1313b2543ec242f79cbe9b98e24aef24c1842cd599e1155d215ffb04044bd0aae54f6dd28f30cc43100991f0185ad4c3605f9a9a682e6d475e0b8b5cad12f3b2ac16db113c0ddcc1c6ed90244dc3415754278bd6b6708e59b63650f0733eedfbe32cde2a4893350eca75e0308a33b94b0d2f992dcaa3afd2c681ef667f0bd7872e4befeea14fef250b98a0ee46caa7ed2ce00034277a77eabdd794150a7068e1bd62a0277b08a1df711a251abaaf5d96f618a039a19e947e960000000000"], 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], &(0x7f0000000280)=')\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xebd, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000004c0)={0x20000000}) unshare(0x60000000) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', ')\x00'}, &(0x7f0000000180)=')\x00', 0x2, 0x1) mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x0, 0x31, r1, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000001c0)={0x52, 0x3, 0x2de01d52, {0x7fff, 0x7}, {0x20, 0x1447}, @ramp={0x587673f3, 0x8e, {0x80, 0x6, 0x9, 0x7205}}}) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) gettid() 2018/04/20 22:52:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000b88ff3)='/dev/snd/seq\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1cd, 0x800000100) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x8, 0x70bd28, 0x25dfdbfd, {0x2}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x28}, 0x1, 0x0, 0x0, 0x2400c010}, 0x80) 2018/04/20 22:52:21 executing program 2: bind(0xffffffffffffffff, &(0x7f0000bd3000)=@generic={0x0, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) personality(0xbd2182ed6ffdb755) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) sync() r0 = memfd_create(&(0x7f0000000240)="76626f786e657430959500", 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) accept(r0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="83f33ffa8381093a7a4d1313b2543ec242f79cbe9b98e24aef24c1842cd599e1155d215ffb04044bd0aae54f6dd28f30cc43100991f0185ad4c3605f9a9a682e6d475e0b8b5cad12f3b2ac16db113c0ddcc1c6ed90244dc3415754278bd6b6708e59b63650f0733eedfbe32cde2a4893350eca75e0308a33b94b0d2f992dcaa3afd2c681ef667f0bd7872e4befeea14fef250b98a0ee46caa7ed2ce00034277a77eabdd794150a7068e1bd62a0277b08a1df711a251abaaf5d96f618a039a19e947e960000000000"], 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], &(0x7f0000000280)=')\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xebd, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000004c0)={0x20000000}) unshare(0x60000000) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', ')\x00'}, &(0x7f0000000180)=')\x00', 0x2, 0x1) mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x0, 0x31, r1, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000001c0)={0x52, 0x3, 0x2de01d52, {0x7fff, 0x7}, {0x20, 0x1447}, @ramp={0x587673f3, 0x8e, {0x80, 0x6, 0x9, 0x7205}}}) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) gettid() 2018/04/20 22:52:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000080)="05", 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)='>', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000880)="7ec1ee34978a6c3bee1bd6cb230ba23abefd55c19f9166bcb61076bbbfd4076b9e609b27856d24025cb15a2650ee012fd171954568336ff798b24c4fb7aa6e74e01cd5835cf1ac44c6d2af0e7a3de05c220e43cdfbfc0ad73519d771d7c1aaded7e96fef1ad758d52b7c8b22baeb4b025040f2f3cb729424f77bf2a7cba4ceb72947a3f883de8f00cdd3cc834eca69fbaa602cb48738032a5f0387906cc06f15118f6dfe382be01bdb4866e6959247fe66982cf1cee83acd1833953693e4aec63702fe0c276914e519fc5156d69279760bd5049bc0273af0b46964428a8a9c1eb2d79921b7a85d59b4db4f221745ac3b5dfbca317e817e038c6a656435fc25df6f4ac9ba3a20a9cc5399ccd5635b3adc2f69f4229bc3500b27a0dd3039ccc70dd412f1bee11f9bb6eaef096805b0fc1130268c3f813f441bbcd3df1638d326f3bdf5f775c47825ffdb23aa383155ce1ff431fa782b96d6c98f7a49fa313e3dba54884d81c0ed4787253b6999368c494841a38f3d8e307e4933201b2991923026570da6002e0b5c1e771cd7705c1e9c4fdd9c6acb229d8ddf3481470b5a02d214249aa5f42490bbe3316517fda96169c360f2e63799a2ebeacb77f7e51664ecbd1949dcd7b136bf784ff4e25808bdffe5b36854d0ade946aec192715465fc0208b8ce2a406d9c3e2672f1e34c7006eead5465939448e47cf7f17a83", 0x1fb}], 0x1) 2018/04/20 22:52:21 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = shmget(0x1, 0x3000, 0x54000500, &(0x7f0000003000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000200)=""/236) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x6) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0x4000000fd, &(0x7f0000000100), &(0x7f00000001c0)=0xfffe) 2018/04/20 22:52:21 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080), 0x11c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000808000)=[@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}], 0x1c) 2018/04/20 22:52:21 executing program 7: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@empty, @multicast1=0xe0000001]}, 0x18) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=@delsa={0x34, 0x11, 0x1, 0x0, 0x0, {@in6=@remote={0xfe, 0x80, [], 0xbb}}, [@mark={0xc, 0x15}]}, 0x34}, 0x1}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2=0xe0000002, @loopback=0x7f000001, @rand_addr}, 0xc) close(r0) 2018/04/20 22:52:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) unshare(0xe97d3336c5bcc6ae) setsockopt$packet_int(r0, 0x107, 0x8000000000000008, &(0x7f00000000c0), 0x1) 2018/04/20 22:52:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00007d5000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000c01fdc)={0x7da9}) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000001580)=0x800, 0x4) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000018000)=0x5) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x8000109) 2018/04/20 22:52:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') flock(r0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1008, 0x9c, "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"}, &(0x7f0000001080), 0x400) accept$alg(r0, 0x0, 0x0) 2018/04/20 22:52:21 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'ifb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x4012}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x0, @loopback=0x7f000001}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ifb0\x00', 0xa1fd}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000040)=0x1d) 2018/04/20 22:52:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f95000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept$packet(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0x14) bind$packet(r3, &(0x7f0000000100)={0x11, 0x16, r4, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xfffffffffffffefb) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000000200)) dup3(r5, r0, 0x0) epoll_wait(r0, &(0x7f0000000140)=[{}], 0x98, 0x0) 2018/04/20 22:52:21 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) unshare(0x40604) r1 = memfd_create(&(0x7f00004c1000)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000040)=0x2, 0x4) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)) 2018/04/20 22:52:21 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00009ec000)="1f0000000104ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423fdffdf00", 0x1f) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x8, 0x4) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000040)="1f0000000104ff00fdde45c8f305f0f00800018001fd00dcffdf0000000000", 0x1f) [ 68.917230] device ifb0 entered promiscuous mode [ 68.977607] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.024457] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.069821] netlink: 11 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.106239] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.133678] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.152764] netlink: 11 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/20 22:52:22 executing program 1: timer_create(0xfffffffffffffff1, &(0x7f0000005fb0)={0x4, 0x0, 0x1}, &(0x7f0000002ffc)=0x0) timer_settime(r0, 0xfffffffffffffffe, &(0x7f0000000000), &(0x7f0000000040)) timer_gettime(0x0, &(0x7f0000000fe0)) 2018/04/20 22:52:22 executing program 0: unshare(0x8000004) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000100)={0x0, 0x1, 0x2, 0xfffffffffffffffd, 0x0, 0x1}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 2018/04/20 22:52:22 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) creat(&(0x7f0000000180)='./file0\x00', 0x185) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) accept$inet6(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x20008, &(0x7f00000001c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000080)=0x10000000000000) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) open$dir(&(0x7f00000001c0)='./file0\x00', 0x40280, 0x1) 2018/04/20 22:52:22 executing program 4: clone(0x9dd1e75f43c4e370, &(0x7f0000000000)="7e0b00a659f7cbb82056d1002485801caf89e804d385b85da5045ff78ad26eabfa6bd66b976fa9be679e22e54b9f80e010f0db1df9b5cac486d78b9f28aa1cf6611a76a8a098b5f7b927e2940e0a4e83365c2b34ce6243fd3c466aa6f051a9d19c020ae3f4f6b7237c594e35f117bda063d09bffb24fb95e7b8797465593fa3c6132c8ac9bc39d3599e4d42b4c9766ab6ebe735b9ff6243ec07c0b95c7714aaabeee1e927f9dc7aee8856d1d349ee2a6846a847c71f1530b991def49fedc297eaad9439ee2cc", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="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") bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x3, 0x4, 0x4, 0x55d, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x30b) 2018/04/20 22:52:22 executing program 7: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x2, 0x44031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000600000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) signalfd(r0, &(0x7f0000000000)={0x200}, 0x8) madvise(&(0x7f000029b000/0x400000)=nil, 0x400000, 0x9) 2018/04/20 22:52:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000f4fc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000edff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001e00210a000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="0000e80382d6de890d6c71f056bdec6d7f89358f951871b06e080a0004000000"], 0x28}, 0x1}, 0x0) r1 = dup(r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000080)=0x3) readv(r1, &(0x7f0000864f80)=[{&(0x7f0000142000)=""/4096, 0x1000}], 0x1) 2018/04/20 22:52:22 executing program 6: bind(0xffffffffffffffff, &(0x7f0000bd3000)=@generic={0x0, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0x80) personality(0xbd2182ed6ffdb755) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) sync() r0 = memfd_create(&(0x7f0000000240)="76626f786e657430959500", 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) accept(r0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="83f33ffa8381093a7a4d1313b2543ec242f79cbe9b98e24aef24c1842cd599e1155d215ffb04044bd0aae54f6dd28f30cc43100991f0185ad4c3605f9a9a682e6d475e0b8b5cad12f3b2ac16db113c0ddcc1c6ed90244dc3415754278bd6b6708e59b63650f0733eedfbe32cde2a4893350eca75e0308a33b94b0d2f992dcaa3afd2c681ef667f0bd7872e4befeea14fef250b98a0ee46caa7ed2ce00034277a77eabdd794150a7068e1bd62a0277b08a1df711a251abaaf5d96f618a039a19e947e960000000000"], 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], &(0x7f0000000280)=')\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xebd, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000004c0)={0x20000000}) unshare(0x60000000) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', ')\x00'}, &(0x7f0000000180)=')\x00', 0x2, 0x1) mmap(&(0x7f0000000000/0x24e000)=nil, 0x24e000, 0x0, 0x31, r1, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000001c0)={0x52, 0x3, 0x2de01d52, {0x7fff, 0x7}, {0x20, 0x1447}, @ramp={0x587673f3, 0x8e, {0x80, 0x6, 0x9, 0x7205}}}) futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) gettid() 2018/04/20 22:52:22 executing program 3: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/1840, 0x730) r1 = dup(r0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000740), 0x4) [ 69.693427] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/20 22:52:22 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ptrace$pokeuser(0x6, r0, 0x4, 0x3) r1 = socket$inet(0x2, 0x4000008805, 0x6) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000794ffc), 0x4) [ 69.761594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 69.826250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/20 22:52:23 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000100)=0x8) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200800, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timerfd_settime(r3, 0x1, &(0x7f00000001c0)={{r4, r5+10000000}, {r6, r7+10000000}}, &(0x7f0000000200)) r8 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x28000, 0x2) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r8, 0x84, 0x7c, &(0x7f0000000080)={r2, 0x1, 0x401}, 0x8) 2018/04/20 22:52:23 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x9a042, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x2, 0x0) mlock2(&(0x7f00003ac000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x8001, &(0x7f0000c28000)=0x800003f, 0x5, 0x0) 2018/04/20 22:52:23 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(seed)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0xae) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x400) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040), 0x4) sendmmsg(r1, &(0x7f0000007300)=[{{&(0x7f0000000a00)=@ipx={0x4, 0x0, 0x0, "a620f402866e"}, 0x80, &(0x7f0000001200), 0x0, &(0x7f0000001280)=ANY=[]}}], 0x1, 0x8000) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x2, &(0x7f0000000340)=""/80, 0x50}, 0x0) 2018/04/20 22:52:23 executing program 5: unshare(0x40000000) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x400, 0x0) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="020dff051200000041115e1e04dbdf250b00180007014d00b0e2c11d054a784bdaa8606551f48f9563c54fc4a8f34e298d6f377b56d15bc1a8034c1521cce2ee53c1c20fd621ed3b3603d07e79977fc85d30fb51a3f2cb105baff646cfd4edff27d2353fac000000010016004e20000004000200a0000000018000000000000005000000000000007f00000000000000"], 0x90}, 0x1}, 0x20000000) socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) getsockname(r1, &(0x7f00000000c0)=@sco, &(0x7f0000000100)=0x8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x4000, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r3, 0x0, 0x29, &(0x7f0000000000)=""/16, &(0x7f0000fae000)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000003c0)={r4, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) r5 = accept(r1, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000140)=@req={0xfffffffffffffffc, 0xdb1, 0x10001, 0x1}, 0x10) 2018/04/20 22:52:23 executing program 2: socket$kcm(0x29, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c3000000000000000000000006966623000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d8000000000000000000000000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2f8) bind$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 2018/04/20 22:52:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00003eb000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/90, 0x5a, 0x0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) epoll_wait(r2, &(0x7f00009e5000)=[{}], 0x155556d0, 0xff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000bd000)={0x1000090000001}) sendmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f000036bf70), 0x0, &(0x7f00000000c0)}}], 0x1, 0x0) 2018/04/20 22:52:23 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x48000, 0x40) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x6, &(0x7f0000000080)=[{}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000001c0)={r1}) r2 = socket$netlink(0x10, 0x3, 0x200000017) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, 0x7ffff}]}, 0x28}, 0x1}, 0x0) 2018/04/20 22:52:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a2c000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x400000100) ioctl$TCXONC(r1, 0x540a, 0x2) 2018/04/20 22:52:23 executing program 0: setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3f, 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000300)="951568519c1f71bb8b4c54f4a43d6b679cb5bc61e76af828f423a297fbe3438990e1421bbd0e7dcf476fd4178ef43c1e2c54f1a8e239ae923d6e755258dada6652099362f9b3856df38b9de499d9fc25f23f918ccc55d807490992ea553aac532c3986a5e4437fa7ca08105cec9969920ff2c3c742c3ceed65aa87def336addbab541edc4275cc904d0fd18d4e3899b5ecd54b4d75244f05c8bf4be6b6b8a6c2dfa9029711d785", 0xa7) getrandom(&(0x7f00000000c0)=""/208, 0xd0, 0x3) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) socketpair$inet(0x2, 0x4, 0x5, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000900)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000b80)={r3, @multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xfffffed1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x1, 'nr0\x00', 0x20000000000003}, 0x18) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000008c0), 0x10) accept$ax25(r4, &(0x7f0000000400), &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x8, 0x200}, &(0x7f0000000280)=0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, &(0x7f0000000540)={0x5, &(0x7f0000000500)=[{0x1f, 0xfffffffffffffffc, 0xf15c, 0xff}, {0x6, 0x2, 0x2, 0x7fff}, {0x20000, 0x80000001, 0xaaad, 0x400}, {0x0, 0xfffffffffffffff9, 0x0, 0x800}, {0xffffffffffff2fc1, 0xc4, 0x800, 0xfffffffffffff001}]}) fstat(0xffffffffffffffff, &(0x7f0000000940)) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x100000000) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000001c0)) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000780)="e4c79cd18a504cf088fdc787dcf5f3bc2b02d498a34ab45907bd75db905743eb322b901d209b4484e0f0c2a1b667a45f453ff2f9c3a028ebbabd8d105b89d3b820042ea3d0c39736e4f2bd0414cc323edb43ee041cef2dcc294354dbb7f600be9810e861351a40cec70aa5fc6382993f8b6aea71d9b1972cd82d5482d34ac1fede5cbad57ae0f507e658df374c50718340c088ed4bb1e143cf531a745d34a48b1c4528ca", 0xa4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r5, 0x4}, 0x8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000bc0)=""/226) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000680)="90388e3d1a7c6e6b8e588f008e22897c03f705cb24577fbffb89699a48942b57433bdb2ebd52cc89630e01dc9b2a9c771d552c91d912283ef0bb844a8e9b25a54ca747d41e9c87f97b928874349f669a83d71e79c74d2544b82a6e3cf4a616ba4d181c7b07a786a2d3c7d1c89398e2690a2e9e8fbe8d12989c937348d30b6dda48f82284cbb226e75a819cbd94d5bbef7d9defd988fd55ec9dbb40735a25ed2bae282c75ac0dcd874f2b27af6c897a9f1d154184745f555c2f73d590dc9465e3b2b4056a5b0057db5bb251183104377aa161d7418ce4824d0cfaf4a617a87e3d33", 0xe1}], 0x1, 0x0, 0x0, 0x40000}, 0xc0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000005c0)='tls\x00', 0x4) timerfd_create(0x3, 0x80000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)="2e2f6367726f75702fb8a0da7a71b84eab58d86b414591563c79c3ad5ab41a4e21d66160e6c29bcc91a4eed45ff1a3e0f4e5b2b7114ca985ba09926fd86e72acf426e9f9022f93c2c9b9e80b968d5ca7cb7a40000000000000008af7a91b09bc91f28f201f91b772543a1336cfe67a02f2ee0b75cc50c6c90943f5116d144c19b74bce65eeeb76d01878bfe88967d0293d5ea4f58a98820f7cb352d31f84f99122ecebe9f095d9a0152c460c0fe1f053459428b7e2c3", 0x1ff) 2018/04/20 22:52:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)=ANY=[@ANYBLOB="0201000000315bef0000000000000000"], 0x10}, 0x1}, 0x0) 2018/04/20 22:52:23 executing program 2: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x1fe) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r1, r2/1000+10000}, {0x0, 0x2710}}) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9) socket$inet(0x2, 0x80003, 0x80) 2018/04/20 22:52:23 executing program 3: prctl$intptr(0x26, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='net/ip6_tables_targets\x00') socketpair$inet(0x2, 0x1, 0x1fffffffe000000, &(0x7f0000000000)) 2018/04/20 22:52:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000100)={'teql0\x00', @ifru_names='teql0\x00'}) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000040), 0x4) r1 = socket(0x1, 0x80800, 0x100080000007) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000003c0)) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000240)=@get={0x1, &(0x7f0000000140)=""/231, 0x4}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000340)) 2018/04/20 22:52:23 executing program 2: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000d5ffc)=0x1c, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000eedffc)=0x7fe, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@filter={'filter\x00', 0xe, 0x2, 0x3d0, [0x0, 0x20000040, 0x20000070, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x1, 0x60, 'ip6gretap0\x00', 'ipddp0\x00', 'veth1_to_bridge\x00', 'team_slave_0\x00', @random="72b720f8318c", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0x0, 0xff], 0x118, 0x190, 0x1d8, [@rateest={'rateest\x00', 0x48, {{'eql\x00', 'ifb0\x00', 0x1, 0x0, 0x200, 0x100, 0x6, 0x80, 0x6, 0x4}}}, @mac={'mac\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xe}}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"81433e2654b3558bb6939b2eee9c5e84e08783bf19d645f6d219fffebb81"}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"137fc63a48137d3f85fbdec163060c79c533934873c4644288919e172272"}}}, {{{0x5, 0x10, 0x88b5, 'bond_slave_1\x00', 'veth0_to_bond\x00', 'ifb0\x00', 'ip6tnl0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0xff], 0xe0, 0x130, 0x168, [@rateest={'rateest\x00', 0x48, {{'erspan0\x00', 'yam0\x00', 0x30, 0x1, 0x8, 0x7, 0x3d07, 0x6, 0x2, 0x5}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0xe000000000000, 'syz1\x00', 0x4}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x448) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x80, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000640)={0xe4, &(0x7f0000000540)="bd8d9b3f09cc45c631107d1e7b20a96f36c56fe44fb487e498c891ee4e5665cf1ce30a74169d0f89341b3c8d084df58680c373267b014efe8e47fe897f1dbdd2144f38519a3f9fe6aa375918040b5e9d642d6df6b0803aac24c294eb164076669a2642266e2047b1ef2384358212f8187554b06341c8697a14c4a6c73c70723cf00c44528b963456f9cf54f5897bca7f6c54f79482ef8d9cf96b4836989a394ce120baa17dbd7337628263292e08d153a2c1f3f221d9697be150f85a9d9edd916af6046695ecb16aaf2344e9e6748e33e0dca15ad34b9ed0cfa629ec74c168c19743c74d"}) sendfile(r0, r0, &(0x7f00000004c0), 0xffffffff7fffffff) sendto$inet(r0, &(0x7f0000dcfffe), 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f000024cf9f)='-', 0x1) recvmsg(r0, &(0x7f0000e92000)={0x0, 0x0, &(0x7f0000eec000), 0x0, &(0x7f0000fd5faf)=""/81, 0x51}, 0x41002106) 2018/04/20 22:52:23 executing program 1: unshare(0x60000000) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000012c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@timestamp={0xd}}}}}, &(0x7f0000ea3000)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x1a3) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 2018/04/20 22:52:23 executing program 7: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2100, 0x0) mkdir(&(0x7f0000554ff8)='./file0\x00', 0x0) r0 = open(&(0x7f00006c69d0)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) r1 = open(&(0x7f00004a3000)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x80000008) fcntl$notify(r0, 0x402, 0x1) [ 71.190523] sctp: [Deprecated]: syz-executor6 (pid 5967) Use of struct sctp_assoc_value in delayed_ack socket option. [ 71.190523] Use struct sctp_sack_info instead [ 71.339871] sctp: [Deprecated]: syz-executor6 (pid 5970) Use of struct sctp_assoc_value in delayed_ack socket option. [ 71.339871] Use struct sctp_sack_info instead 2018/04/20 22:52:24 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4002}) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x20200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x5) write$tun(r1, &(0x7f0000000080)={@void, @hdr, @arp=@generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @empty, "a586ba13b3225dacfe2fe2c0c6ff9bcd"}}, 0x2e) 2018/04/20 22:52:24 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000502ff3)="230d05031700ad031d076900ec", 0xd) getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/20 22:52:24 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0xfffffffffffffeea) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000180), 0x4) 2018/04/20 22:52:24 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000000)="1f0000000104ff00fd437f0000005deff30501000800030052d80000fdff00", 0x1f) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000080)) 2018/04/20 22:52:24 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendto$llc(r0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x802, 0x10) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000000040)=[{}, {}, {0x0}]}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="6b0000002b0bbc164263682a7660216fd66ca27fa4d436b2f3d6337d9cf7669261957e7721d670d9a6bf688850d9710aaaa18ac6e333cc403af58dd4c782cc159f915bbcfc05e6cb1533f932eebf0d935fe905f3aae3d0428b1d041d7995d6ee021e8b39d7d6d68fdfb3a2f51e5aac"], &(0x7f0000000080)=0x73) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r3, 0x0, 0x1, 0x2}, &(0x7f0000000200)=0x10) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f00000000c0)={r2, 0x10}) 2018/04/20 22:52:24 executing program 3: bind(0xffffffffffffffff, &(0x7f0000557130)=@generic={0x0, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a53a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f1622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x3000, 0xffffffffffffffff, &(0x7f0000a4b000/0x3000)=nil) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x4, 0x2000c0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0x8000, 0x4) 2018/04/20 22:52:24 executing program 7: syz_emit_ethernet(0xd4, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c20000000a01bbd0b46757f0314fb99a7bef5b6da0b8a680ecd9d862aa5be8bdfe43c54c4623ad53b03693c65f8cc4100c19b319554329b93b99fa374d786d323950dbb6e73851cc0bc9b8288dc5709aaa849f1c4742c2b488cb4b1289c1e786afaedef30f4b80f7c62a277c3de46cd8b8f42237374fc2f81375a4f0d56349dff756afa95f4663646e9e9742cb816ed467bee4e08d2b7a0f040000005c6bac92df5326489929868c47190eb64caa505fbeeb390eb5028d7fc707d40e647586a90bb0bfb539ce394faf2b4a13"], &(0x7f00000002c0)={0x80000000, 0x0, [0x0, 0x0, 0x294, 0x771]}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x151) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip_vti0\x00', 0x10) 2018/04/20 22:52:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000925000)=[{0x0, 0x0, &(0x7f00007e0000), 0x0, &(0x7f00001d7fd0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000040)={0x7, 0x6fe4, 0x2, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, 'team0\x00'}) read(r1, &(0x7f0000000140)=""/158, 0x9e) [ 71.644282] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/20 22:52:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) timerfd_create(0x3, 0x800) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={r3, 0x8000, 0x1, 0x7ff}, 0x10) sendfile(r1, r2, &(0x7f0000e64ff8), 0x8e18) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) sendfile(r1, r2, &(0x7f0000000080), 0x8000000002b) fstatfs(r2, &(0x7f00000000c0)=""/106) 2018/04/20 22:52:24 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000040)) alarm(0x0) r1 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) ptrace$setsig(0x4203, r2, 0x2, &(0x7f0000000180)={0x1d, 0x9, 0x3, 0x7fffffff}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000100)={0x1, 0x100}) ioctl(r1, 0x20000000002201, &(0x7f0000000000)) 2018/04/20 22:52:24 executing program 3: syz_emit_ethernet(0x42, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaa8aaaaa7dce08d0375a0800480000340000000000009000ffefff009406000100000000000000000000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 2018/04/20 22:52:25 executing program 1: uname(&(0x7f0000000140)=""/108) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x3, 0x81}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x40901, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x7, 0x1, 0x9, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$KIOCSOUND(r1, 0x4b2f, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x3fffffd) write$vnet(r0, &(0x7f0000a8d000)={0x1, {&(0x7f0000c91000)=""/24, 0x18, &(0x7f0000a5df9b)=""/101, 0x1002, 0x2}}, 0x68) 2018/04/20 22:52:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000aa0000)='./file0\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001400)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000c9113a83d6486bf5000004000000d8040000ffffffff000300004801000000000000ffffffffffffffff080400000804000008040000ffffffff04000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000"], @ANYBLOB="ff020000000000000000000000000001ff010000000000000000000000000001ffffff00ff0000ffffffffffffffffffffffff00ffffffffffffff00ffffffff6c6f000000000000000000000000000065716c00000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008700070620000000000000000000000000000000200148010000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000031c00000000000030007372680000000000000000000000000000000000000000000000000000002f1f8003810001044000000000000000280053594e50524f5859000000000000000000000000000000000000000000000700080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005801b801000000000000000000000000000000000000000000000000480068626800000000000000000000000000000000000000000000000000000008000000040107000500010005000000fffff9ffffff000004000700560000004000ffff07000b0048006862680000000000000000000000000000000000000000000000000000000200000001010000040003000000070081000600000107000600fc00000003000000080000100a006000484d41524b00000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000ffffffff5f9b3047ffffffff000000004e224e204e234e2003000000800000000100000000010000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800080100000000000000000000000000000000000000000000000040004552524f520000000000000000000000000000000000000000000000000021551d409712a7b4009aaba3208a92986a3590e0b1a260b02d6d4f07a81c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x538) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendto$unix(r1, &(0x7f0000000080)="616a408eefc8f4214d668854d0bf76b94a2db9b61214023dba9acd1dbb8af3e02392c38c89fd20635f32dfcc3578e7", 0x2f, 0xbba339a8af0025c9, &(0x7f00000000c0)=@file={0x1, './file1\x00'}, 0x6e) accept4$bt_l2cap(r1, &(0x7f0000000300), &(0x7f0000000340)=0xe, 0x800) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x81, 0x2, 0x9}}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r2) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000002c0)={&(0x7f0000ffa000/0x3000)=nil, 0x9, 0x2, 0x60, &(0x7f0000ffc000/0x3000)=nil, 0x1f}) readv(r0, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) 2018/04/20 22:52:25 executing program 5: r0 = gettid() r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f000000cfe4)={0xa}, 0x1c) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x800000000005e20}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x2b}}, @udp={0x0, 0x4e20, 0x8}}}}}, &(0x7f00000000c0)) r3 = syz_open_procfs(r0, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000100)=""/207) pread64(r3, &(0x7f0000000080)=""/26, 0x1a, 0x0) 2018/04/20 22:52:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") readv(r0, &(0x7f000005a000)=[{&(0x7f0000d1d000)=""/203, 0x52e}], 0x1) mount(&(0x7f0000000080)='.', &(0x7f0000000040)='./file0\x00', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f00000000c0)="e440f5e00f19dceb50") preadv(r0, &(0x7f0000000240)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/20 22:52:25 executing program 4: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) close(r0) ioctl$int_out(r0, 0x2, &(0x7f0000000180)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) 2018/04/20 22:52:25 executing program 6: unshare(0x8000400) r0 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x800) r1 = accept4(r0, &(0x7f0000000200)=@ipx, &(0x7f0000000340)=0x72, 0x80804) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001980)={@empty, @loopback, 0x0}, &(0x7f00000019c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a00)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001b40)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000001c40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000022c0)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000006300)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000006340)={@dev, @broadcast, 0x0}, &(0x7f0000006380)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000066c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000006700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000006780)=0x14, 0x80800) accept$packet(0xffffffffffffffff, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000006800)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006840)={'bond0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f00000068c0)={@loopback, 0x0}, &(0x7f0000006900)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000006e40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000006e00)={&(0x7f0000006940)={0x4b0, r2, 0x20, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r4}, {0x1d0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x2c, 0x4, [{0x5, 0x877c, 0xf25}, {0x80000000, 0x8f23, 0x6, 0x200}, {0x6, 0x4, 0xff, 0xfffffffffffffffb}, {0x3, 0x100, 0xa8, 0x3d}, {0x1, 0x8, 0x3, 0x3}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x1c, 0x4, [{0x52dc, 0x8, 0x3ff, 0x8}, {0x101, 0x2, 0x1, 0x9}, {0x8, 0x2, 0x7fffffff, 0x1}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xd9d}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xc000000000000000}}}]}}, {{0x8, 0x1, r7}, {0x138, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xdd43}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x138, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r13}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}]}}]}, 0x4b0}, 0x1, 0x0, 0x0, 0x80}, 0x1) r14 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl(r14, 0x440000000000127f, &(0x7f0000000000)) r15 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)='\'eth0:\x00', 0xfffffffffffffff8) keyctl$setperm(0x5, r15, 0x80b02) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCDELRT(r14, 0x890c, &(0x7f0000000100)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @remote={0xfe, 0x80, [], 0xbb}, @loopback={0x0, 0x1}, 0x6, 0x6f9, 0xca, 0x100, 0xc2, 0x880000, r16}) 2018/04/20 22:52:25 executing program 7: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0xa, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x3}}, 0x178) 2018/04/20 22:52:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000925000)=[{0x0, 0x0, &(0x7f00007e0000), 0x0, &(0x7f00001d7fd0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000040)={0x7, 0x6fe4, 0x2, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, 'team0\x00'}) read(r1, &(0x7f0000000140)=""/158, 0x9e) [ 72.105758] QAT: Invalid ioctl [ 72.152395] QAT: Invalid ioctl 2018/04/20 22:52:25 executing program 7: getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000), &(0x7f000005c000)=0xfffffffffffffe37) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x1, &(0x7f000005bff8)) accept4$nfc_llcp(r0, 0x0, &(0x7f0000000040), 0x0) 2018/04/20 22:52:25 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) madvise(&(0x7f000090b000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f000090b000/0x4000)=nil, 0x4000) munmap(&(0x7f000090e000/0x2000)=nil, 0x2000) read(r0, &(0x7f0000000300)=""/100, 0x64) 2018/04/20 22:52:25 executing program 0: r0 = socket(0x1e, 0x1, 0x0) r1 = accept$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x5, 0x0) dup2(r0, r2) sendmsg(r2, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000d0bfd0), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/20 22:52:25 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000200)='./file0\x00') getpeername(r0, &(0x7f0000000240)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=@ipv6_getroute={0x134, 0x1a, 0x0, 0x0, 0x25dfdbff, {0xa, 0x10, 0x20, 0x5, 0xff, 0x7, 0x0, 0x7, 0x200}, [@RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x1}}, @RTA_EXPIRES={0x8, 0x10, 0x57d}, @RTA_PREF={0x8, 0x14}, @RTA_GATEWAY={0x14, 0x5}, @RTA_OIF={0x8, 0x4, r1}, @RTA_METRICS={0xc4, 0x8, "b0b35151a11f7cc7ee1dca2cf537db9a7dc195b1e7085951a5f501fd0359c558c102246caa098d7619f0b0ac52144d85bbde4706efdf7528faf5e7ec04221919a683c05a3e7f10e465b1318d5b932a3cb40992c0a2d4dc9f61f2c9be0a5c4d19fc103a71ec6ff90709d1a28e56b5ac8e6bcf12226f2aa6ac5c9a657edcd8403b68968436bfcc75d053d5f93bced85ffd59d372634beb57658e2b4e0d7d827e614ca1905fe3b86fdfd27e942e15237c5aa47f43a8acb415793212ce84a01939"}, @RTA_GATEWAY={0x14, 0x5, @remote={0xfe, 0x80, [], 0xbb}}]}, 0x134}, 0x1, 0x0, 0x0, 0x80}, 0x91) umount2(&(0x7f0000000180)='../file0\x00', 0x2) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) setpgid(r3, r4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001380)) 2018/04/20 22:52:25 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4002, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)=r3) getsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000ffc), &(0x7f0000013000)=0xfffffffffffffe03) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) ioctl$sock_ipx_SIOCIPXCFGDATA(r3, 0x89e2, &(0x7f0000000180)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x80200, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r5, 0x28, 0x2, &(0x7f0000000140)=0x1000, 0x8) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=ANY=[@ANYBLOB="3c010002000000070000000000000000fe8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000004c00120063636d5f626173652870636263286165732d6165736e69292c736d332d67656e65726963290000000000000000000000000000000000000000000000000000000000000000000000"], 0xfd6a}, 0x1}, 0x0) 2018/04/20 22:52:25 executing program 6: unshare(0x40600) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x3, 0x200}) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000000)={0x1, "6d855f"}, 0xfffffffffffffc72) 2018/04/20 22:52:25 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000000)=0x1) r1 = socket$packet(0x11, 0x7, 0x300) accept4$netrom(r0, 0x0, &(0x7f0000000080), 0x80000) unshare(0x40600) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000040), 0x4) 2018/04/20 22:52:25 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file1\x00', 0x0, 0xc}, 0x10) link(&(0x7f0000000080)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file1\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getresgid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) fchownat(r0, &(0x7f0000000300)='./file0/file1\x00', r1, r3, 0x1800) r4 = semget(0x1, 0x3, 0x8) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000500)={{0x10001, r2, r3, r1, r3, 0x8, 0x5}, 0x8, 0x5d5, 0x3f}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x68, "46f0f7e4db0bc94b645043542517548e9cd3e82ea5e8f5add5ff2ab6412c3e8b57a6a370828a3f445b9d60f9abf5ec394d7725bc6db516f255707f987ec5008326570c9da4831e0da76900516ab00b8ac4e2cd3e5611c4ba71d83f826a3d2023311d3eaec86745a6"}, &(0x7f00000001c0)=0x70) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000004c0)={0x4, 0x2, 0x81}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r5, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, 0x100000000, 0x5}, &(0x7f00000002c0)=0x90) 2018/04/20 22:52:25 executing program 6: r0 = socket$inet(0x2, 0x1, 0x80000001) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000de9000), 0x4) 2018/04/20 22:52:25 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x400000, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) unshare(0x8000000) r1 = mq_open(&(0x7f0000000000)='^procwlan1\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x3, 0x2}) mq_getsetattr(r1, &(0x7f0000fc5fc0), &(0x7f0000000fc0)) r2 = socket(0x8, 0x0, 0x6) bind$netlink(r2, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe, 0x400000}, 0xc) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2=0xe0000002}, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x6, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 'ip6gre0\x00'}) 2018/04/20 22:52:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) recvmmsg(r0, &(0x7f0000008540)=[{{&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001380)=""/4096, 0x1000}], 0x1}}], 0x1, 0x2, &(0x7f00000086c0)) sendto(r0, &(0x7f00001a6000)="f1", 0x1, 0x1, &(0x7f000020ffa0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75296811812f17fcb15b854768b106479b8744cc07f4ef85104f214b714432d6b762b606b112d7bdfaa9811dffe7e6bf498b64cded3bcd7ee27eb2bed57758"}, 0x80) 2018/04/20 22:52:26 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000180)="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") mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0x4, 0x20000000036, r1, 0x0) write(r1, &(0x7f0000000340)='\b', 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x4, 0x1f, 0xd, 0x6, 0x2, 0x6, 0xfff, 0x7, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r2, @in6={{0xa, 0x4e23, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4b7}}, 0x0, 0x9, 0x0, 0x2, 0x53}, &(0x7f0000000140)=0x98) 2018/04/20 22:52:26 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x19) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x1, 'dummy0\x00', 0x1}, 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) wait4(r2, &(0x7f0000000180), 0x20000008, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xffffffff) 2018/04/20 22:52:26 executing program 3: r0 = open(&(0x7f0000085000)='./control\x00', 0x28046, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x80000c0e) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000001240)=""/4096}, {&(0x7f0000002240)=""/76}, {&(0x7f00000022c0)=""/68}, {&(0x7f0000002340)=""/128}, {&(0x7f00000023c0)=""/3}, {&(0x7f0000002400)=""/239}, {&(0x7f0000002500)=""/54}], 0x1091) 2018/04/20 22:52:26 executing program 4: get_mempolicy(&(0x7f0000000080), &(0x7f0000000040), 0x400000d3, &(0x7f0000ffb000/0x4000)=nil, 0x8) [ 73.230267] QAT: Invalid ioctl 2018/04/20 22:52:26 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000003500)='/dev/vcs#\x00', 0x1000, 0x800) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000003580)={0x0, {0x2, 0x4e22, @multicast2=0xe0000002}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23, @rand_addr=0x9}, 0x205, 0x2, 0x100000001, 0x0, 0x100000001, &(0x7f0000003540)='gretap0\x00', 0x7a1c, 0x0, 0x9}) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x0, 0xa}, 0x20) [ 73.307351] QAT: Invalid ioctl 2018/04/20 22:52:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x381a41, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000140)={0x2004}) 2018/04/20 22:52:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1082a0}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x40) fchdir(r0) syslog(0x0, &(0x7f0000000980)=""/215, 0xd7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ioctl$void(r3, 0x0) ftruncate(0xffffffffffffffff, 0x8000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000001340), &(0x7f0000001380)=0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000002}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x1c, r2, 0x8, 0x70bd25, 0x25dfdbfb, {0x3}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1d7e4dd7a96d6ce0}, 0x40000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0xffffffffffffffc0, 0x200, 0x0, 0x2}, &(0x7f0000000100)=0x14) read(r3, &(0x7f0000000240)=""/4096, 0x1000) r6 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14}}, {0x2, 0x4e23, @loopback=0x7f000001}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)='syzkaller1\x00', 0x8001}) epoll_wait(r6, &(0x7f0000000200)=[{}, {}], 0x2, 0x10000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000013c0)={r5, 0x96, "b445a718f6dce2846c14724f941a72ae1245c4d376c05a2d96e6b4735ad26efbc11b2d3047bd5d91d5820ebb01541b22d0347735a09c54bdd6d1670450e2dfaeb8e3dea94600924051f3e79cde69b54c791f4e5385747ac526f322a0519137156f24b22aa3e0d36a7ad2b0878bbbff6fcb093e69080d713dbfa00e1c595873b7100e9aa853a9cdf9012dba2bd0f75f3fb370924371a0"}, &(0x7f00000012c0)=0x9e) fcntl$setstatus(r6, 0x4, 0x6000) pread64(r6, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000540), 0x4) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r7) request_key(&(0x7f0000000680)='dns_resolver\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000006c0)="7b2d23776c616e3076626f786e657431766d6e657430142400", r7) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000440), 0x4) 2018/04/20 22:52:26 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 2018/04/20 22:52:26 executing program 0: r0 = socket$inet6(0xa, 0xf, 0x8000000000020) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eaed000000000000000500000000000000000000000000000000000000000000000000000000000000000001000000000000000a00000000000000fe8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3d4c) [ 73.592784] mmap: syz-executor2 (6124) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/20 22:52:27 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x40002) ioctl(r0, 0x6, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000180)={0x3a, 0x0, {0x0, 0x6, 0xa2, 0x3, 0x6}}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) clone(0x2080100, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5317f4090ae76c82083497dce46ff7993b50a7c6053b83d3610bf16642f3fb1358b56cc0becf1833635915b9b6514e4e043a69e40bc61850692aa658b3877411f324d5b689fa3d9962cd99e900b2cecc8823d46814be978524") 2018/04/20 22:52:27 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="dad64a550f77b02fa587186a296b97972a214bcd5052c46fe0009418b792612a2100000000bbde7d364cca50ba4f0cd8e500005ad4000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2}, 0x14) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000003000)={0x0, 0x0, 0x2}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TIOCLINUX5(r3, 0x541c, &(0x7f0000000200)={0x5, 0xfffffffffffffffe, 0x3, 0x2}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0}) r6 = memfd_create(&(0x7f0000000080)='+[mime_type\x00', 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000140)={r5, 0x80000, r6}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000003000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000001500)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x108) 2018/04/20 22:52:27 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) recvfrom$inet6(r0, &(0x7f0000000000)=""/81, 0x51, 0x21, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/04/20 22:52:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x401ffd) accept4$alg(r1, 0x0, 0x0, 0x80800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000040)={0x8b7, 0x7, 0x25f2}) accept$packet(r0, 0x0, &(0x7f0000000140)) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @rand_addr=0x3}], 0x10) 2018/04/20 22:52:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000600)=ANY=[]) umount2(&(0x7f0000000000)='./file0\x00', 0x8) 2018/04/20 22:52:27 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sco\x00') ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000000c0)={0x1, 0x0, 0x9, 0x1, 0x80000001, 0x6}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000300)={r2, 0x7, &(0x7f0000000200)=[0xf6, 0x1, 0x8, 0x9, 0x6, 0x8, 0x7], &(0x7f0000000240)=[0x6, 0x3, 0x9], 0x1, 0x7, 0x5, &(0x7f0000000280)=[0x8000000000000000, 0x2, 0x7ff, 0x5, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x4]}) getsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f0000000340)=""/52, &(0x7f0000000380)=0x34) ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f0000000100)) getsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000440)={'NETMAP\x00'}, &(0x7f0000000480)=0x1e) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000004ff0), &(0x7f0000004ff8)={0x1}, 0x8) 2018/04/20 22:52:27 executing program 7: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000580)="240000002400ff2b3200000800367700f4ffffff01000000000000a3c76bf2cc9189db2d", 0x24) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={r1, r2/1000+30000}, 0x10) 2018/04/20 22:52:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1082a0}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x40) fchdir(r0) syslog(0x0, &(0x7f0000000980)=""/215, 0xd7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ioctl$void(r3, 0x0) ftruncate(0xffffffffffffffff, 0x8000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000001340), &(0x7f0000001380)=0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000002}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x1c, r2, 0x8, 0x70bd25, 0x25dfdbfb, {0x3}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1d7e4dd7a96d6ce0}, 0x40000) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0xffffffffffffffc0, 0x200, 0x0, 0x2}, &(0x7f0000000100)=0x14) read(r3, &(0x7f0000000240)=""/4096, 0x1000) r6 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14}}, {0x2, 0x4e23, @loopback=0x7f000001}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)='syzkaller1\x00', 0x8001}) epoll_wait(r6, &(0x7f0000000200)=[{}, {}], 0x2, 0x10000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000013c0)={r5, 0x96, "b445a718f6dce2846c14724f941a72ae1245c4d376c05a2d96e6b4735ad26efbc11b2d3047bd5d91d5820ebb01541b22d0347735a09c54bdd6d1670450e2dfaeb8e3dea94600924051f3e79cde69b54c791f4e5385747ac526f322a0519137156f24b22aa3e0d36a7ad2b0878bbbff6fcb093e69080d713dbfa00e1c595873b7100e9aa853a9cdf9012dba2bd0f75f3fb370924371a0"}, &(0x7f00000012c0)=0x9e) fcntl$setstatus(r6, 0x4, 0x6000) pread64(r6, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000540), 0x4) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r7) request_key(&(0x7f0000000680)='dns_resolver\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000006c0)="7b2d23776c616e3076626f786e657431766d6e657430142400", r7) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000440), 0x4) [ 74.429598] program syz-executor1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 74.480511] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 74.510117] program syz-executor1 is using a deprecated SCSI ioctl, please convert it to SG_IO 2018/04/20 22:52:27 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x1, 0x7fff}, 0x8) r1 = dup2(r0, r0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0xe4, @local={0xfe, 0x80, [], 0xaa}, 0x3f}, 0x1c) close(r0) 2018/04/20 22:52:27 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x20080522, r0}, &(0x7f0000000080)={0x0, 0xb34, 0x200, 0xffffffffffffff65, 0x3, 0x3}) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)=[0x80, 0x4]) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000140)) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000001c0)={0x9, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000002c0)={0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x15c}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e21, 0x9, @loopback={0x0, 0x1}, 0x4}}}, 0x84) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x101080) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) connect$ax25(r1, &(0x7f0000000540)={0x3, {"1600b344a83e50"}, 0x401}, 0x10) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000580)={0x1, 0x10000, 0x4219, 0x9, 0x1, 0xffffffffffffffc8, 0x0, 0x3f, 0x3, 0x5}) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f00000005c0)="d8a0a74d96e158531b8ab19d95241e35e07ef50ebcc643e15536dd7c3193f7e2075545bbe84b53e074fa", 0x2a) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000600)={r2, 0x2, 0x20}, &(0x7f0000000640)=0xc) read$eventfd(r1, &(0x7f0000000680), 0x8) getpeername$ipx(r1, &(0x7f00000006c0), &(0x7f0000000700)=0x10) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x8) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0x4) chroot(&(0x7f00000007c0)='./file0\x00') getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000001840)=""/119, &(0x7f00000018c0)=0x77) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001900)={r3, 0x4}, 0x8) r4 = shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000001940)=""/152) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001a00)={'rose0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}) bind$ax25(r1, &(0x7f0000001a40)={0x3, {"763e14cdc110b5"}, 0x7fff}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) connect$bt_rfcomm(r1, &(0x7f0000001a80)={0x1f, {0x9, 0x5, 0x8, 0x2, 0x5, 0xa6}, 0x4f20}, 0xa) 2018/04/20 22:52:27 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_aout(r0, &(0x7f0000000000)={{0x1cf, 0xffffffff, 0x80000000, 0x3c0, 0x14c, 0x7, 0x201, 0x9}, "419c9f5f5a958dcb0aacd66ca7387d516ecaf8266f2615050c51c444a0bc9be33da1e4f5b1cb511d280f8bc85c96ccca5187c8b3b46b7c311e5ee0d058d629009b380f4a31e7ab7bad", [[], [], [], []]}, 0x469) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f00000f8000)={@random="cd390b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "a2fbe8", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/04/20 22:52:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000d06000)=0x1, 0x4) clock_gettime(0x7, &(0x7f0000000140)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{}, {0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)={r2, 0x1}) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000000)=0xffffffff80000001, 0x167) getsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000015, &(0x7f0000d1dffc), &(0x7f0000246000)=0x4) [ 74.570726] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/20 22:52:27 executing program 0: r0 = socket(0x4, 0x3, 0x50000000000000ff) shutdown(r0, 0x1) sendto$inet(r0, &(0x7f0000dc2fe8)="d704000000000000000100000000040009001e88", 0x14, 0x0, &(0x7f0000000ff0)={0x2}, 0x10) getsockname$netrom(r0, &(0x7f0000000100)=@full, &(0x7f0000000180)=0x48) accept4$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) 2018/04/20 22:52:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x10) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000040000)={0x0, 0x100000001}, 0x1e2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0}, &(0x7f0000000d00)=0x8) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0xffffffffffff7fff, @ipv4={[], [0xff, 0xff], @rand_addr=0x6}}, 0x1c) fstat(r0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x400}, 0x8) 2018/04/20 22:52:27 executing program 3: r0 = socket$inet(0x2, 0x2, 0x6000000088) truncate(&(0x7f0000000080)='./file0\x00', 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={"6c6f0000000000000000000054fe00", &(0x7f0000000140)=@ethtool_cmd={0xa}}) recvfrom(r0, &(0x7f0000000100)=""/209, 0xd1, 0x10002, &(0x7f0000000340)=@hci={0x1f}, 0x80) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000000)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952fe0abfd18822d2c783fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) [ 74.808599] ================================================================== [ 74.816117] BUG: KMSAN: uninit-value in sctp_do_bind+0x60f/0xdc0 [ 74.822273] CPU: 1 PID: 6196 Comm: syz-executor2 Not tainted 4.16.0+ #84 [ 74.829117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.838473] Call Trace: [ 74.841171] dump_stack+0x185/0x1d0 [ 74.844811] ? sctp_do_bind+0x60f/0xdc0 [ 74.848787] kmsan_report+0x142/0x240 [ 74.852608] __msan_warning_32+0x6c/0xb0 [ 74.856768] sctp_do_bind+0x60f/0xdc0 [ 74.860581] sctp_bind+0x149/0x190 [ 74.864135] ? sctp_recvmsg+0x1190/0x1190 [ 74.868294] inet6_bind+0x1fd/0x1820 [ 74.872015] ? security_socket_bind+0x5d/0x210 [ 74.876609] ? ipv6_mod_enabled+0x60/0x60 [ 74.880763] SYSC_bind+0x3f2/0x4b0 [ 74.884314] ? syscall_return_slowpath+0xe9/0x700 [ 74.889166] SyS_bind+0x54/0x80 [ 74.892464] do_syscall_64+0x309/0x430 [ 74.896365] ? SYSC_socketpair+0x14a0/0x14a0 [ 74.900785] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.905976] RIP: 0033:0x455379 [ 74.909163] RSP: 002b:00007f60d41d6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 74.916872] RAX: ffffffffffffffda RBX: 00007f60d41d76d4 RCX: 0000000000455379 [ 74.924181] RDX: 0000000000000010 RSI: 000000002067efe4 RDI: 0000000000000013 [ 74.931482] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 74.938755] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 74.946026] R13: 0000000000000026 R14: 00000000006f3430 R15: 0000000000000000 [ 74.953304] [ 74.954932] Local variable description: ----address@SYSC_bind [ 74.960820] Variable was created at: [ 74.964548] SYSC_bind+0x6f/0x4b0 [ 74.968005] SyS_bind+0x54/0x80 [ 74.971280] ================================================================== [ 74.978631] Disabling lock debugging due to kernel taint [ 74.984081] Kernel panic - not syncing: panic_on_warn set ... [ 74.984081] [ 74.991457] CPU: 1 PID: 6196 Comm: syz-executor2 Tainted: G B 4.16.0+ #84 [ 74.999600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.008956] Call Trace: [ 75.011555] dump_stack+0x185/0x1d0 [ 75.015194] panic+0x39d/0x940 [ 75.018417] ? sctp_do_bind+0x60f/0xdc0 [ 75.022399] kmsan_report+0x238/0x240 [ 75.026206] __msan_warning_32+0x6c/0xb0 [ 75.030289] sctp_do_bind+0x60f/0xdc0 [ 75.034102] sctp_bind+0x149/0x190 [ 75.037645] ? sctp_recvmsg+0x1190/0x1190 [ 75.041796] inet6_bind+0x1fd/0x1820 [ 75.045513] ? security_socket_bind+0x5d/0x210 [ 75.050093] ? ipv6_mod_enabled+0x60/0x60 [ 75.054235] SYSC_bind+0x3f2/0x4b0 [ 75.057777] ? syscall_return_slowpath+0xe9/0x700 [ 75.062607] SyS_bind+0x54/0x80 [ 75.065869] do_syscall_64+0x309/0x430 [ 75.069763] ? SYSC_socketpair+0x14a0/0x14a0 [ 75.074172] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.079350] RIP: 0033:0x455379 [ 75.082518] RSP: 002b:00007f60d41d6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 75.090206] RAX: ffffffffffffffda RBX: 00007f60d41d76d4 RCX: 0000000000455379 [ 75.097457] RDX: 0000000000000010 RSI: 000000002067efe4 RDI: 0000000000000013 [ 75.104710] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 75.111967] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 75.119230] R13: 0000000000000026 R14: 00000000006f3430 R15: 0000000000000000 [ 75.126978] Dumping ftrace buffer: [ 75.130516] (ftrace buffer empty) [ 75.134207] Kernel Offset: disabled [ 75.137808] Rebooting in 86400 seconds..