INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2018/04/06 22:41:34 fuzzer started 2018/04/06 22:41:34 dialing manager at 10.128.0.26:38639 2018/04/06 22:41:41 kcov=true, comps=false 2018/04/06 22:41:44 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x81, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="1fc4f5fb020311", 0x7}], 0x1) 2018/04/06 22:41:44 executing program 1: mmap(&(0x7f0000000000/0x7f2000)=nil, 0x7f2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x36c, 0x23c, 0x110, 0xffffffff, 0x23c, 0x110, 0x3d4, 0x3d4, 0xffffffff, 0x3d4, 0x3d4, 0x5, &(0x7f0000000040), {[{{@ip={@broadcast=0xffffffff, @empty, 0x0, 0x0, 'bcsh0\x00', 'syzkaller1\x00'}, 0x0, 0x70, 0x94}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ip={@broadcast=0xffffffff, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, 0x0, 0x0, 'syzkaller1\x00', 'bcsh0\x00'}, 0x0, 0x70, 0xa4}, @MASQUERADE={0x34, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @empty, @rand_addr, @gre_key}}}}, {{@ip={@multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'irlan0\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x3c8) 2018/04/06 22:41:44 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000003c0)) 2018/04/06 22:41:44 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x53, 0x2}, {}], 0x30) 2018/04/06 22:41:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x269) 2018/04/06 22:41:44 executing program 2: r0 = socket(0x1e, 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x80000001) bind(r0, &(0x7f0000000640)=@l2={0x1f, 0x100, {0xfffffffffffffffa, 0x1, 0x4, 0x0, 0x4, 0x101}, 0x90f9, 0x6}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040), 0x0, 0x80000d}, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in=@rand_addr, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0x71, "f614426bab6e731eb216ff6fb8a42813fb6c9a0bf8604bfb772bcaf7d690717395d81ff8d8aa580aa5c13360cd5405880ee5995a1ad05fe0123e6c5f6f7c2b7197f4b4477fbef1032db552afd5c13961bdfae99bdfb0357fdd496b59ef6e4ce92e1fbc900e1f5cbc8ddd04c2931b33df27"}, &(0x7f0000000800)=0x79) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000840)={r2, 0x40, "f13cf136d934532de75f5803a58a85fabe2eca07ad22d3522c40c2f5047739c8be967e175f258d2060094dee9c060ef2b7ae5ffdc527bcd791f2a0d3078db820"}, &(0x7f00000008c0)=0x48) close(r0) getpeername$ax25(r0, &(0x7f0000000540), &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x101, 0x6, 0x8, 0x3, 0x1}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r3, 0x89}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="35048588ee4d26d6989b457d1403ada036e2103077c79215ff4670de2de155d347", 0x21, 0x4000, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000700)={@in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2, 0x4, 0x2, "464c5ae3ce26836b035fc7b626234ce7adb7d56a758ebe82f37bfc1e2a165d617e8f8e96a7d30f4bd7ec559002be40d1647cb25bc65dea3c21db4325d7f1f35d827c3e4fe61dae18982d5e29527b5644"}, 0xd8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000380)={0x9}, 0x1) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000200)=0xfffffffffffff001, &(0x7f0000000240)=0x4) sendmmsg$alg(r0, &(0x7f00000006c0)=[{0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f00000005c0)=ANY=[], 0x0, 0x14000000}], 0x1, 0x4044) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x45, 0x30, 0x8, 0xc457}, &(0x7f0000000400)=0x18) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0xfffffffffffffffc}, 0xffffffffffffff09) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000900)={@dev}, &(0x7f0000000940)=0x14) ioctl(r4, 0x800000000008982, &(0x7f0000000000)) socketpair$inet6(0xa, 0x0, 0x9, &(0x7f0000000040)) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300)=0x7d5, 0x4) 2018/04/06 22:41:44 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) truncate(&(0x7f0000000180)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280), 0x8) fcntl$setlease(r0, 0x400, 0x2) 2018/04/06 22:41:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") getrlimit(0x0, &(0x7f0000000200)) syncfs(r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x7}) syzkaller login: [ 42.337305] ip (3753) used greatest stack depth: 54672 bytes left [ 43.650944] ip (3879) used greatest stack depth: 53960 bytes left [ 45.986618] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.097921] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.109133] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.121232] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.173260] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.228279] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.276409] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.361975] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.926987] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.941250] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.025536] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.039951] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.199054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.208824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.279261] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.527059] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.641986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.648316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.656706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.690258] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.696509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.708918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.774726] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.781010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.792666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.836738] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.843008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.861614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.949554] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.955860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.966830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.073989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.080380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.092584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.119729] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.130108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.155572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.308968] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.315276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.326705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/06 22:42:02 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) read$eventfd(r0, &(0x7f00000000c0), 0x0) 2018/04/06 22:42:02 executing program 3: r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000d19ff4)) 2018/04/06 22:42:02 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") getrlimit(0x0, &(0x7f0000000200)) syncfs(r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x7}) 2018/04/06 22:42:02 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'reW', 0x0, "35bd00"}}}}}}, &(0x7f0000ae3000)) 2018/04/06 22:42:02 executing program 7: request_key(&(0x7f0000022ff5)='asymmetric\x00', &(0x7f000030fffb)={0x73, 0x79, 0x7a}, &(0x7f000030fff3)="2f6465762f646d6d69643a0005", 0x0) 2018/04/06 22:42:02 executing program 4: r0 = syz_open_dev$tun(&(0x7f000017f000)='/dev/net/tun\x00', 0x0, 0x40003) vmsplice(r0, &(0x7f0000000300)=[{&(0x7f0000000240)}], 0x1, 0x0) 2018/04/06 22:42:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xe02, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="b82a86195399d6cf0acff2cb28e917e9ff23005bdbeb98dba252649ea76e5761792d7b2eea9353eb393486161325aff8b8a4746866ef0e4769ad49d903436c60d25aa0886d1bd9a7ecb8d5b075464b61eb18844f04b319e14525aaaddf48621c18b08868c6216a4d65ac45d29f5a0e4aeaa1837438a72b611a5bceb6d68d2b6fb09aca54891dd3867957f85021c429663ffa485065ddfabecfe676543637f819b965417f740a510c964ac7ab443b68663599591218fe908757d78f5372ab972e5df22f93b8255ba36ae15374daf5f737f57241926fa108585a1d430f2c3b8e51a47db3ed3fcae56a3edd549f94ce9cdf928c8da3f57312c2f454a3175f901de490fe456ae43b4dfe33a8f72ff3dad7e7900bc577", 0x114}], 0x1) sendto$inet(r0, &(0x7f0000000280)="be888bdc61daa6437a5f2a8dfc6b4650bed7e9ea234a6a56dda0c1c16556a5b8adbb758155e23f93cfae387e2ddeaf5b4dd408e1a16c845a2943fb3283b79b129089eb912537d0f466dc2c518a56d47d01707700ee84e595c7cba26b40dfecec760266660a4348dde4c20331a65d6eee020293ce4f940a8c09330db2d4b41210ad81e24305891c06c8cc", 0x8a, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/06 22:42:02 executing program 2: r0 = socket(0x1e, 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x80000001) bind(r0, &(0x7f0000000640)=@l2={0x1f, 0x100, {0xfffffffffffffffa, 0x1, 0x4, 0x0, 0x4, 0x101}, 0x90f9, 0x6}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040), 0x0, 0x80000d}, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in=@rand_addr, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0x71, "f614426bab6e731eb216ff6fb8a42813fb6c9a0bf8604bfb772bcaf7d690717395d81ff8d8aa580aa5c13360cd5405880ee5995a1ad05fe0123e6c5f6f7c2b7197f4b4477fbef1032db552afd5c13961bdfae99bdfb0357fdd496b59ef6e4ce92e1fbc900e1f5cbc8ddd04c2931b33df27"}, &(0x7f0000000800)=0x79) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000840)={r2, 0x40, "f13cf136d934532de75f5803a58a85fabe2eca07ad22d3522c40c2f5047739c8be967e175f258d2060094dee9c060ef2b7ae5ffdc527bcd791f2a0d3078db820"}, &(0x7f00000008c0)=0x48) close(r0) getpeername$ax25(r0, &(0x7f0000000540), &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x101, 0x6, 0x8, 0x3, 0x1}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r3, 0x89}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="35048588ee4d26d6989b457d1403ada036e2103077c79215ff4670de2de155d347", 0x21, 0x4000, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000700)={@in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2, 0x4, 0x2, "464c5ae3ce26836b035fc7b626234ce7adb7d56a758ebe82f37bfc1e2a165d617e8f8e96a7d30f4bd7ec559002be40d1647cb25bc65dea3c21db4325d7f1f35d827c3e4fe61dae18982d5e29527b5644"}, 0xd8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000380)={0x9}, 0x1) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000200)=0xfffffffffffff001, &(0x7f0000000240)=0x4) sendmmsg$alg(r0, &(0x7f00000006c0)=[{0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f00000005c0)=ANY=[], 0x0, 0x14000000}], 0x1, 0x4044) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x45, 0x30, 0x8, 0xc457}, &(0x7f0000000400)=0x18) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0xfffffffffffffffc}, 0xffffffffffffff09) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000900)={@dev}, &(0x7f0000000940)=0x14) ioctl(r4, 0x800000000008982, &(0x7f0000000000)) socketpair$inet6(0xa, 0x0, 0x9, &(0x7f0000000040)) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300)=0x7d5, 0x4) 2018/04/06 22:42:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000)={0x0, 0x10, "8252cc7051f5e05e71ee63b76f6c3c92"}, &(0x7f0000000040)=0x18) 2018/04/06 22:42:02 executing program 7: request_key(&(0x7f0000022ff5)='asymmetric\x00', &(0x7f000030fffb)={0x73, 0x79, 0x7a}, &(0x7f000030fff3)="2f6465762f646d6d69643a0005", 0x0) 2018/04/06 22:42:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000aad000)) 2018/04/06 22:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4543(gcm_base(ctr(aes-aesni),ghash-generic)))\x00'}, 0x58) 2018/04/06 22:42:02 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") getrlimit(0x0, &(0x7f0000000200)) syncfs(r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x7}) 2018/04/06 22:42:02 executing program 3: r0 = socket$inet(0x2, 0x3, 0x10) setsockopt$inet_buf(r0, 0x0, 0x3, &(0x7f0000ff4000), 0x0) 2018/04/06 22:42:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xe02, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="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", 0x114}], 0x1) sendto$inet(r0, &(0x7f0000000280)="be888bdc61daa6437a5f2a8dfc6b4650bed7e9ea234a6a56dda0c1c16556a5b8adbb758155e23f93cfae387e2ddeaf5b4dd408e1a16c845a2943fb3283b79b129089eb912537d0f466dc2c518a56d47d01707700ee84e595c7cba26b40dfecec760266660a4348dde4c20331a65d6eee020293ce4f940a8c09330db2d4b41210ad81e24305891c06c8cc", 0x8a, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/06 22:42:02 executing program 2: r0 = socket(0x1e, 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x80000001) bind(r0, &(0x7f0000000640)=@l2={0x1f, 0x100, {0xfffffffffffffffa, 0x1, 0x4, 0x0, 0x4, 0x101}, 0x90f9, 0x6}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040), 0x0, 0x80000d}, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in=@rand_addr, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0x71, "f614426bab6e731eb216ff6fb8a42813fb6c9a0bf8604bfb772bcaf7d690717395d81ff8d8aa580aa5c13360cd5405880ee5995a1ad05fe0123e6c5f6f7c2b7197f4b4477fbef1032db552afd5c13961bdfae99bdfb0357fdd496b59ef6e4ce92e1fbc900e1f5cbc8ddd04c2931b33df27"}, &(0x7f0000000800)=0x79) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000840)={r2, 0x40, "f13cf136d934532de75f5803a58a85fabe2eca07ad22d3522c40c2f5047739c8be967e175f258d2060094dee9c060ef2b7ae5ffdc527bcd791f2a0d3078db820"}, &(0x7f00000008c0)=0x48) close(r0) getpeername$ax25(r0, &(0x7f0000000540), &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x101, 0x6, 0x8, 0x3, 0x1}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r3, 0x89}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="35048588ee4d26d6989b457d1403ada036e2103077c79215ff4670de2de155d347", 0x21, 0x4000, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000700)={@in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2, 0x4, 0x2, "464c5ae3ce26836b035fc7b626234ce7adb7d56a758ebe82f37bfc1e2a165d617e8f8e96a7d30f4bd7ec559002be40d1647cb25bc65dea3c21db4325d7f1f35d827c3e4fe61dae18982d5e29527b5644"}, 0xd8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000380)={0x9}, 0x1) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000200)=0xfffffffffffff001, &(0x7f0000000240)=0x4) sendmmsg$alg(r0, &(0x7f00000006c0)=[{0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f00000005c0)=ANY=[], 0x0, 0x14000000}], 0x1, 0x4044) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x45, 0x30, 0x8, 0xc457}, &(0x7f0000000400)=0x18) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0xfffffffffffffffc}, 0xffffffffffffff09) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000900)={@dev}, &(0x7f0000000940)=0x14) ioctl(r4, 0x800000000008982, &(0x7f0000000000)) socketpair$inet6(0xa, 0x0, 0x9, &(0x7f0000000040)) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300)=0x7d5, 0x4) 2018/04/06 22:42:02 executing program 7: request_key(&(0x7f0000022ff5)='asymmetric\x00', &(0x7f000030fffb)={0x73, 0x79, 0x7a}, &(0x7f000030fff3)="2f6465762f646d6d69643a0005", 0x0) 2018/04/06 22:42:02 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") getrlimit(0x0, &(0x7f0000000200)) syncfs(r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x7}) 2018/04/06 22:42:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000)={0x0, 0x10, "8252cc7051f5e05e71ee63b76f6c3c92"}, &(0x7f0000000040)=0x18) 2018/04/06 22:42:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000474fec)={0x1, 0x800000000000003b, 0x7, 0x4}, 0x1c) 2018/04/06 22:42:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000423fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000178fd0)="d3ab27191a01002300000000000000020000010000000000ffff0000000000000001070097c11ed4c2c4dcd2ffa86eb9", 0x30) 2018/04/06 22:42:02 executing program 7: request_key(&(0x7f0000022ff5)='asymmetric\x00', &(0x7f000030fffb)={0x73, 0x79, 0x7a}, &(0x7f000030fff3)="2f6465762f646d6d69643a0005", 0x0) 2018/04/06 22:42:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xe02, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="b82a86195399d6cf0acff2cb28e917e9ff23005bdbeb98dba252649ea76e5761792d7b2eea9353eb393486161325aff8b8a4746866ef0e4769ad49d903436c60d25aa0886d1bd9a7ecb8d5b075464b61eb18844f04b319e14525aaaddf48621c18b08868c6216a4d65ac45d29f5a0e4aeaa1837438a72b611a5bceb6d68d2b6fb09aca54891dd3867957f85021c429663ffa485065ddfabecfe676543637f819b965417f740a510c964ac7ab443b68663599591218fe908757d78f5372ab972e5df22f93b8255ba36ae15374daf5f737f57241926fa108585a1d430f2c3b8e51a47db3ed3fcae56a3edd549f94ce9cdf928c8da3f57312c2f454a3175f901de490fe456ae43b4dfe33a8f72ff3dad7e7900bc577", 0x114}], 0x1) sendto$inet(r0, &(0x7f0000000280)="be888bdc61daa6437a5f2a8dfc6b4650bed7e9ea234a6a56dda0c1c16556a5b8adbb758155e23f93cfae387e2ddeaf5b4dd408e1a16c845a2943fb3283b79b129089eb912537d0f466dc2c518a56d47d01707700ee84e595c7cba26b40dfecec760266660a4348dde4c20331a65d6eee020293ce4f940a8c09330db2d4b41210ad81e24305891c06c8cc", 0x8a, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/06 22:42:02 executing program 2: r0 = socket(0x1e, 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x80000001) bind(r0, &(0x7f0000000640)=@l2={0x1f, 0x100, {0xfffffffffffffffa, 0x1, 0x4, 0x0, 0x4, 0x101}, 0x90f9, 0x6}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040), 0x0, 0x80000d}, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in=@rand_addr, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0x71, "f614426bab6e731eb216ff6fb8a42813fb6c9a0bf8604bfb772bcaf7d690717395d81ff8d8aa580aa5c13360cd5405880ee5995a1ad05fe0123e6c5f6f7c2b7197f4b4477fbef1032db552afd5c13961bdfae99bdfb0357fdd496b59ef6e4ce92e1fbc900e1f5cbc8ddd04c2931b33df27"}, &(0x7f0000000800)=0x79) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000840)={r2, 0x40, "f13cf136d934532de75f5803a58a85fabe2eca07ad22d3522c40c2f5047739c8be967e175f258d2060094dee9c060ef2b7ae5ffdc527bcd791f2a0d3078db820"}, &(0x7f00000008c0)=0x48) close(r0) getpeername$ax25(r0, &(0x7f0000000540), &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x101, 0x6, 0x8, 0x3, 0x1}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r3, 0x89}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="35048588ee4d26d6989b457d1403ada036e2103077c79215ff4670de2de155d347", 0x21, 0x4000, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000700)={@in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2, 0x4, 0x2, "464c5ae3ce26836b035fc7b626234ce7adb7d56a758ebe82f37bfc1e2a165d617e8f8e96a7d30f4bd7ec559002be40d1647cb25bc65dea3c21db4325d7f1f35d827c3e4fe61dae18982d5e29527b5644"}, 0xd8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000380)={0x9}, 0x1) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000200)=0xfffffffffffff001, &(0x7f0000000240)=0x4) sendmmsg$alg(r0, &(0x7f00000006c0)=[{0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f00000005c0)=ANY=[], 0x0, 0x14000000}], 0x1, 0x4044) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x45, 0x30, 0x8, 0xc457}, &(0x7f0000000400)=0x18) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0xfffffffffffffffc}, 0xffffffffffffff09) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000900)={@dev}, &(0x7f0000000940)=0x14) ioctl(r4, 0x800000000008982, &(0x7f0000000000)) socketpair$inet6(0xa, 0x0, 0x9, &(0x7f0000000040)) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300)=0x7d5, 0x4) 2018/04/06 22:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4543(gcm_base(ctr(aes-aesni),ghash-generic)))\x00'}, 0x58) 2018/04/06 22:42:03 executing program 7: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x3c}) bpf$PROG_LOAD(0x5, &(0x7f000095c000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, [@jmp={0x5, 0x0, 0x1, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f000040dff6)='syzkaller\x00', 0x1, 0x29e, &(0x7f000000a000)=""/195}, 0x48) 2018/04/06 22:42:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x119, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80}}]}, 0x2c}, 0x1}, 0x0) 2018/04/06 22:42:03 executing program 5: r0 = eventfd2(0x800000000000007, 0x80800) write$eventfd(r0, &(0x7f000000aff8)=0xfffffffffffffffa, 0x8) 2018/04/06 22:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4543(gcm_base(ctr(aes-aesni),ghash-generic)))\x00'}, 0x58) 2018/04/06 22:42:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000423fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000178fd0)="d3ab27191a01002300000000000000020000010000000000ffff0000000000000001070097c11ed4c2c4dcd2ffa86eb9", 0x30) 2018/04/06 22:42:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000)={0x0, 0x10, "8252cc7051f5e05e71ee63b76f6c3c92"}, &(0x7f0000000040)=0x18) 2018/04/06 22:42:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xe02, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="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", 0x114}], 0x1) sendto$inet(r0, &(0x7f0000000280)="be888bdc61daa6437a5f2a8dfc6b4650bed7e9ea234a6a56dda0c1c16556a5b8adbb758155e23f93cfae387e2ddeaf5b4dd408e1a16c845a2943fb3283b79b129089eb912537d0f466dc2c518a56d47d01707700ee84e595c7cba26b40dfecec760266660a4348dde4c20331a65d6eee020293ce4f940a8c09330db2d4b41210ad81e24305891c06c8cc", 0x8a, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/06 22:42:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000037c0)="a7118230eef5e420406dc6a099da077d64d054e0293b261fd23e223ac994e771d39076c63413ac4c3797871c905a3788788903cb54e0b814d561537a2e51405ff0b5bbcb5fe7f41a21b44db2d47be29e7e805a6d3d2a98cea5945db9b758fad872a60d0c8531afe1dbf4d5962f155c685eb8975a7feafedf838264a64caf9ed6", 0x80}], 0x1, &(0x7f0000001a00)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000002440)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/06 22:42:03 executing program 7: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00003e6ff8)=@fragment, 0x8) sendmmsg(r0, &(0x7f0000ad9000)=[{{0x0, 0x0, &(0x7f0000bff000), 0x0, &(0x7f0000cc3fe8)=[{0x10}], 0x10}}], 0x1, 0x0) 2018/04/06 22:42:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) 2018/04/06 22:42:03 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="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") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000423fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000178fd0)="d3ab27191a01002300000000000000020000010000000000ffff0000000000000001070097c11ed4c2c4dcd2ffa86eb9", 0x30) 2018/04/06 22:42:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000)={0x0, 0x10, "8252cc7051f5e05e71ee63b76f6c3c92"}, &(0x7f0000000040)=0x18) 2018/04/06 22:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4543(gcm_base(ctr(aes-aesni),ghash-generic)))\x00'}, 0x58) 2018/04/06 22:42:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='smaps\x00') io_setup(0x7, &(0x7f00000002c0)) r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000080), 0x80000003) 2018/04/06 22:42:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) 2018/04/06 22:42:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb703) 2018/04/06 22:42:03 executing program 7: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00003e6ff8)=@fragment, 0x8) sendmmsg(r0, &(0x7f0000ad9000)=[{{0x0, 0x0, &(0x7f0000bff000), 0x0, &(0x7f0000cc3fe8)=[{0x10}], 0x10}}], 0x1, 0x0) 2018/04/06 22:42:03 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="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") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="6d617073004825d4f99062d857d0fdd852295fdf8d8a73e9dfedc34ac4ef25f232c029a2ca6e6361068e0d6a62529679b5aa6a713b56577bdffca934fd2f1beb669feec6d8f81ad88b2b98b111bf69d73059f44f113f4e0ca41f40b4e265062f5bef45034318bc89c0ef9e1103bb86e85822248c01feeadabe78c65da0a0ef016775b0ba752f43559369576fbede3eb4e925cb82f52ef29a55edb45ac831995065e938214e31efa2c62ed041fd97b9768915bcd4e9979c06fe31d5825a71b413b4229a8220fade2d3cca80e8c427ada6010f6bc29484d0d61da4841d733e14f7b0a0855ae5266e180f82da04d602d00b71f8ab8161d1220dee5d7f16748a01000000000000003f12e20ab17257") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:03 executing program 0: r0 = memfd_create(&(0x7f0000000000)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x200) 2018/04/06 22:42:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000423fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000178fd0)="d3ab27191a01002300000000000000020000010000000000ffff0000000000000001070097c11ed4c2c4dcd2ffa86eb9", 0x30) 2018/04/06 22:42:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) 2018/04/06 22:42:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='smaps\x00') io_setup(0x7, &(0x7f00000002c0)) r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000080), 0x80000003) 2018/04/06 22:42:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb703) 2018/04/06 22:42:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="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") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:04 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="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") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:04 executing program 3: unshare(0x40600) bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x3, &(0x7f00000affc8)=@framed={{0x18}, [], {0x95}}, &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00003a6ff0)={r0, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/06 22:42:04 executing program 7: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00003e6ff8)=@fragment, 0x8) sendmmsg(r0, &(0x7f0000ad9000)=[{{0x0, 0x0, &(0x7f0000bff000), 0x0, &(0x7f0000cc3fe8)=[{0x10}], 0x10}}], 0x1, 0x0) 2018/04/06 22:42:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) fchmod(r0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r1, 0x104, &(0x7f0000000500)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000100), 0xffffff13}]) fallocate(r0, 0x2, 0x0, 0x4) 2018/04/06 22:42:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb703) 2018/04/06 22:42:04 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="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") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) 2018/04/06 22:42:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000940)="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") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x40003b) sendfile(r2, r1, 0x0, 0x80) 2018/04/06 22:42:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) fchmod(r0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r1, 0x104, &(0x7f0000000500)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000100), 0xffffff13}]) fallocate(r0, 0x2, 0x0, 0x4) 2018/04/06 22:42:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000d6af50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000c03000)={{0x20000000000080}, "0a4ceaa05dad126e00000002a1569b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42d576589701a4", 0x77, 0x10000a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000b65000)='/dev/sequencer2\x00', 0x1, 0x0) 2018/04/06 22:42:04 executing program 7: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00003e6ff8)=@fragment, 0x8) sendmmsg(r0, &(0x7f0000ad9000)=[{{0x0, 0x0, &(0x7f0000bff000), 0x0, &(0x7f0000cc3fe8)=[{0x10}], 0x10}}], 0x1, 0x0) 2018/04/06 22:42:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000051d000)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb703) 2018/04/06 22:42:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='smaps\x00') io_setup(0x7, &(0x7f00000002c0)) r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000080), 0x80000003) 2018/04/06 22:42:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ffefa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe000225070097c11ed4c2c4dc42ffa86eb978b2d18c1619", 0x36) 2018/04/06 22:42:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) fchmod(r0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r1, 0x104, &(0x7f0000000500)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000100), 0xffffff13}]) fallocate(r0, 0x2, 0x0, 0x4) 2018/04/06 22:42:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000fb9000)=ANY=[], 0x0, &(0x7f0000e9c000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000000)=""/142, 0x8e}, {&(0x7f0000ba9fd5)=""/43, 0x2b}, {&(0x7f0000820000)=""/185, 0xb9}, {&(0x7f0000a77000)=""/243, 0xf3}, {&(0x7f00001b1ffd)=""/53, 0x1f}], 0x6, &(0x7f0000000100)=""/81, 0x51}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 2018/04/06 22:42:04 executing program 4: mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) r0 = inotify_init1(0x80800) inotify_add_watch(r0, &(0x7f0000f25ff6)='./control\x00', 0x480000000) rmdir(&(0x7f0000349000)='./control\x00') readv(r0, &(0x7f000059afbf)=[{&(0x7f0000b35f09)=""/247, 0xf7}], 0x1) 2018/04/06 22:42:04 executing program 4: mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) r0 = inotify_init1(0x80800) inotify_add_watch(r0, &(0x7f0000f25ff6)='./control\x00', 0x480000000) rmdir(&(0x7f0000349000)='./control\x00') readv(r0, &(0x7f000059afbf)=[{&(0x7f0000b35f09)=""/247, 0xf7}], 0x1) 2018/04/06 22:42:04 executing program 7: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) clone(0x8000, &(0x7f0000000680)="11fc3d677819c5fd3ced30772692c922a63195f4d5324df3c529e766c729b0c9e5b16a445f0806704d126f46df29a55cd179ee140026c45dce7b7bc635c61cf244f1ff7de9a4b459c91981191fb2ad1eee4850046b0e99581a178d7d2900f516d3dd5cb7a92528cc49b2826a12fe7af568ef4bd6cb615680d021d5f21d8cb5280027320750b0a08312b6a5ed8e7993c57bcf072e3ecfd3c6edb49f1fcb28dbdec8644ac4f84cca6964c599fc60996c9b95f1d29d411a65c06a44cce339e1f6dd5aedfe7e8d937f23e3538f38f7cedc53c70deed22a35fd5a311c0115d00024c67f13637f6fa130332ddd3ca6702f69aadf2134d4fb00fa3960c2efea963d2a5f4a2c86d806e4ac3b0c153a13ee2b5582bfb0857dc465d310f231cbf51475096254d3", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) futex(&(0x7f000000cffc), 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x0, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000300)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x0, 0x1, 'none\x00', 0x0, 0x0, 0x55}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:tpm_device_t:s0', 0x20, '/sbin/dhclient', 0x20}, 0x34) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/06 22:42:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x4, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000000000)="7f93"}, 0x20) 2018/04/06 22:42:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) fchmod(r0, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r1, 0x104, &(0x7f0000000500)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000100), 0xffffff13}]) fallocate(r0, 0x2, 0x0, 0x4) 2018/04/06 22:42:04 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@empty, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}}) 2018/04/06 22:42:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000fb9000)=ANY=[], 0x0, &(0x7f0000e9c000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000000)=""/142, 0x8e}, {&(0x7f0000ba9fd5)=""/43, 0x2b}, {&(0x7f0000820000)=""/185, 0xb9}, {&(0x7f0000a77000)=""/243, 0xf3}, {&(0x7f00001b1ffd)=""/53, 0x1f}], 0x6, &(0x7f0000000100)=""/81, 0x51}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 2018/04/06 22:42:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='smaps\x00') io_setup(0x7, &(0x7f00000002c0)) r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000080), 0x80000003) 2018/04/06 22:42:04 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000080), 0x2) [ 60.890850] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 2018/04/06 22:42:04 executing program 6: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) 2018/04/06 22:42:04 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) ftruncate(r0, 0x0) 2018/04/06 22:42:05 executing program 4: mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) r0 = inotify_init1(0x80800) inotify_add_watch(r0, &(0x7f0000f25ff6)='./control\x00', 0x480000000) rmdir(&(0x7f0000349000)='./control\x00') readv(r0, &(0x7f000059afbf)=[{&(0x7f0000b35f09)=""/247, 0xf7}], 0x1) 2018/04/06 22:42:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000600)={'ip6gretap0\x00'}) 2018/04/06 22:42:05 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000fb9000)=ANY=[], 0x0, &(0x7f0000e9c000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000000)=""/142, 0x8e}, {&(0x7f0000ba9fd5)=""/43, 0x2b}, {&(0x7f0000820000)=""/185, 0xb9}, {&(0x7f0000a77000)=""/243, 0xf3}, {&(0x7f00001b1ffd)=""/53, 0x1f}], 0x6, &(0x7f0000000100)=""/81, 0x51}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 2018/04/06 22:42:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00001ca000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390d006dc80000009d4d54", 0x10) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000019c0)=[{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001740)="e8010f759df376728fd8724f8ea3b29e7a2a4f25c9b198ecf98664da9c5a557c211cb0df0bc423db97e4eb", 0x2b}, {&(0x7f0000001880)="991f4fc02f", 0x5}], 0x2}], 0x1, 0x0) 2018/04/06 22:42:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00007daff4)={0x0, 0x0, 0x80000000020}, 0xc) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000180)="de", 0x1}], 0x1) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)='+', 0x1}], 0x1) shutdown(r0, 0x1) close(r0) 2018/04/06 22:42:05 executing program 7: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) clone(0x8000, &(0x7f0000000680)="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", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) futex(&(0x7f000000cffc), 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x0, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000300)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x0, 0x1, 'none\x00', 0x0, 0x0, 0x55}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:tpm_device_t:s0', 0x20, '/sbin/dhclient', 0x20}, 0x34) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/06 22:42:05 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000bbeff4)) shutdown(r0, 0x1) ppoll(&(0x7f0000bc0fd0)=[{r1}], 0x1, &(0x7f0000c03ff0), &(0x7f0000a1bff8), 0x8) 2018/04/06 22:42:05 executing program 4: mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) r0 = inotify_init1(0x80800) inotify_add_watch(r0, &(0x7f0000f25ff6)='./control\x00', 0x480000000) rmdir(&(0x7f0000349000)='./control\x00') readv(r0, &(0x7f000059afbf)=[{&(0x7f0000b35f09)=""/247, 0xf7}], 0x1) 2018/04/06 22:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=@bridge_newneigh={0x30, 0x1a, 0x1, 0x0, 0x0, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}]}, 0x30}, 0x1}, 0x0) 2018/04/06 22:42:05 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000fb9000)=ANY=[], 0x0, &(0x7f0000e9c000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000000)=""/142, 0x8e}, {&(0x7f0000ba9fd5)=""/43, 0x2b}, {&(0x7f0000820000)=""/185, 0xb9}, {&(0x7f0000a77000)=""/243, 0xf3}, {&(0x7f00001b1ffd)=""/53, 0x1f}], 0x6, &(0x7f0000000100)=""/81, 0x51}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 2018/04/06 22:42:05 executing program 0: set_mempolicy(0xffffffffffffffff, &(0x7f0000000000), 0x0) 2018/04/06 22:42:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r0, &(0x7f0000000980)=[{&(0x7f00000008c0)=""/136, 0x88}], 0x1, 0x20000000) 2018/04/06 22:42:05 executing program 6: r0 = socket(0x2000000000000010, 0x803, 0x0) write(r0, &(0x7f0000000080)="240000001a0025f0806bd104feff001c020b49ff6e10b500000700eb08000300a5000000", 0x24) 2018/04/06 22:42:05 executing program 0: unshare(0x40600) pipe(&(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x8) 2018/04/06 22:42:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="1b", 0x1}], 0x1, &(0x7f0000000340)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000940)=""/92, 0x5c}], 0x1, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 2018/04/06 22:42:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00007daff4)={0x0, 0x0, 0x80000000020}, 0xc) writev(r0, &(0x7f0000001080)=[{&(0x7f0000001700)='<', 0x1}], 0x1) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000500)="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", 0x599}], 0x1) shutdown(r0, 0x1) 2018/04/06 22:42:05 executing program 3: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20200, 0x0) 2018/04/06 22:42:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00007daff4)={0x0, 0x0, 0x80000000020}, 0xc) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000180)="de", 0x1}], 0x1) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)='+', 0x1}], 0x1) shutdown(r0, 0x1) close(r0) 2018/04/06 22:42:05 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semtimedop(r0, &(0x7f0000033816)=[{0x0, 0x3}, {0x0, 0x808d}], 0x2, &(0x7f0000034000)={0x77359400}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000fbd000)=[0x7fff]) 2018/04/06 22:42:05 executing program 7: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) clone(0x8000, &(0x7f0000000680)="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", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) futex(&(0x7f000000cffc), 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x0, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000300)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x0, 0x1, 'none\x00', 0x0, 0x0, 0x55}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:tpm_device_t:s0', 0x20, '/sbin/dhclient', 0x20}, 0x34) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/06 22:42:05 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000005640)=@expire={0x104, 0x18, 0x705, 0x0, 0x0, {{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}, {@in6=@dev={0xfe, 0x80}}, @in=@multicast1=0xe0000001}}, [@mark={0xc, 0x15}]}, 0xfe61}, 0x1}, 0x0) 2018/04/06 22:42:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = gettid() sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=@setlink={0x3c, 0x13, 0x321, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r1}, @IFLA_IFNAME={0x14, 0x3, 'lo\x00'}]}, 0x3c}, 0x1}, 0x0) 2018/04/06 22:42:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@rand_addr}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'ccm_base(pcbc(aes-aesni),sm3-generic)\x00'}}}]}, 0xfd6a}, 0x1}, 0x0) 2018/04/06 22:42:05 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad40", 0x18) 2018/04/06 22:42:05 executing program 5: unshare(0x40600) r0 = syz_open_dev$sg(&(0x7f00006ec000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001, &(0x7f0000000340)="857a") 2018/04/06 22:42:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00007daff4)={0x0, 0x0, 0x80000000020}, 0xc) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000180)="de", 0x1}], 0x1) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)='+', 0x1}], 0x1) shutdown(r0, 0x1) close(r0) 2018/04/06 22:42:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000933000)="9147ad46390d00c80000009d4d5469d01101c2f87d13e3bf", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000300)="c9c67050bf882f913174653375192980650de1f6b85b19ecd5518dfe0257478a24b40b47aaa6f3040b6acd0c17c24baee137bd75f6cf018e260b96bf6296a76dea151fde59bd59cf54c4df496ece8e4e26878d261ba5a00f29dcb78e4a1ee9854862114e2ea867a0aa0e7c18b4baeb748a17a858", 0x74}], 0x1, &(0x7f0000000400), 0x0, 0x4008041}, 0x800) recvmmsg(r1, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/45, 0x2d}, {&(0x7f0000000440)=""/158, 0x9e}], 0x2, &(0x7f0000000540)=""/6, 0x6}}], 0x1, 0x0, &(0x7f00000005c0)={0x0, 0x989680}) 2018/04/06 22:42:06 executing program 7: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) clone(0x8000, &(0x7f0000000680)="11fc3d677819c5fd3ced30772692c922a63195f4d5324df3c529e766c729b0c9e5b16a445f0806704d126f46df29a55cd179ee140026c45dce7b7bc635c61cf244f1ff7de9a4b459c91981191fb2ad1eee4850046b0e99581a178d7d2900f516d3dd5cb7a92528cc49b2826a12fe7af568ef4bd6cb615680d021d5f21d8cb5280027320750b0a08312b6a5ed8e7993c57bcf072e3ecfd3c6edb49f1fcb28dbdec8644ac4f84cca6964c599fc60996c9b95f1d29d411a65c06a44cce339e1f6dd5aedfe7e8d937f23e3538f38f7cedc53c70deed22a35fd5a311c0115d00024c67f13637f6fa130332ddd3ca6702f69aadf2134d4fb00fa3960c2efea963d2a5f4a2c86d806e4ac3b0c153a13ee2b5582bfb0857dc465d310f231cbf51475096254d3", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) futex(&(0x7f000000cffc), 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x0, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000636000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) tkill(r0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000300)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x0, 0x1, 'none\x00', 0x0, 0x0, 0x55}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:tpm_device_t:s0', 0x20, '/sbin/dhclient', 0x20}, 0x34) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/06 22:42:06 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x401, 0x8000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="d6000800d49f0b0006000000c753ffffffff0700"], &(0x7f0000000100)=0x2) getsockopt$inet_tcp_buf(r2, 0x6, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000001280)=0x1000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r3, 0xfb, 0x0, 0x568, 0x6}, &(0x7f0000000180)=0x18) mq_timedreceive(r2, &(0x7f00000012c0)=""/135, 0x87, 0x1, &(0x7f0000000040)={0x77359400}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00006e5000)={0x8}) r4 = dup3(r1, r0, 0x0) unlinkat(r2, &(0x7f0000000240)='./control\x00', 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@ipv6_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_FLAGS={0x8, 0x8, 0x284}, @IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [], 0xaa}}]}, 0x34}, 0x1}, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="ae21f3368519588bbdd89bc76b5616eaaa168ccd01b0294d26261f7f8565109e18b85d37faee2052cefec5f63c242755b507b4e7809c3fc1aead526c3235a08ffcd4b29c962a20a49d10bf042f583eea4e1176313fbab17efafe036427eb57") openat$dir(0xffffffffffffff9c, &(0x7f0000e21ff6)='./control\x00', 0x0, 0x10) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) 2018/04/06 22:42:06 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000cab000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000080)="8d", 0x1, 0x1ffffffffffd, 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/06 22:42:06 executing program 6: mq_open(&(0x7f0000000800)='.request_key_auth\x00', 0x0, 0x0, &(0x7f0000000840)) 2018/04/06 22:42:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000017fb78af59861b0c40f00000000000400000000"], 0x2000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) read(r1, &(0x7f0000000240)=""/4096, 0x1000) 2018/04/06 22:42:06 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00007daff4)={0x0, 0x0, 0x80000000020}, 0xc) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000180)="de", 0x1}], 0x1) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)='+', 0x1}], 0x1) shutdown(r0, 0x1) close(r0) 2018/04/06 22:42:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) mprotect(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x7) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000100)={0x100, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}, {0x2, 0x4e24, @broadcast=0xffffffff}, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x2, 0x9, 0x7fff, 0x5, 0x2, &(0x7f00000000c0)='bpq0\x00', 0x5, 0x8, 0x7}) getpeername$netrom(r0, &(0x7f0000000000)=@full, &(0x7f0000000080)=0x48) 2018/04/06 22:42:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000093add8a0664e3d1a9b6ace74f024dc38567631dfe0429e7c613a50a23edacff058f1ccb65fcca07b44a41583c8f9f2eaf27b0b3ac884bc307f4372e0bdbb0676d298b01f93938848e1ef0619a7abd7b7d1adcbf1feaff017f2e8453c741a850594afa18dae3419589fb5e7951b8361a95250dddfd7e30dfb3526d27fc1077ae7dc5ecc360c18b2896cf6f9a38df8877387cedc7de33bb8a7d3dbc12d17bbb21b690d43663ee29d5537c2ae1b44469226179b6a30313d44b7e26ccc6cdfda2c29940d7a113a48e17a64f2943c777949a8e35130f64950353c8c97d00a6f5776f607ddb76c8e2ad14967ecea91"], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) 2018/04/06 22:42:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @multicast1}, &(0x7f0000000040)=0x10, 0x0) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000140)="e69fc2df279e97d25d4a4d23f2b230336a356b08c6d48c808464b5e60cee2eddbf36e7381c2e3d3b852f7c7e1308abe92516cdb16eeaa4b458003e567c085d113fceba562831ebd3fb2aac5df6e08fe0a5964a7ffd61b1139cc7350f0fd75522e9da330e08813a24347f", 0x6a) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)="e8", 0x1, 0xfffffffffffffffc) r3 = dup(r1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000002c0)={0x5, &(0x7f0000000280)=[{}, {}, {}, {}, {}]}) sendto$inet6(r3, &(0x7f0000000340)="2627cd2558e9c533de44185f8e35815487140e", 0x13, 0x80, 0x0, 0xe4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000004, 0x7a8, 0x3) msgget(0x3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000040)='GPL\x00', 0x10000000000025, 0xfffffffffffffd37, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000002ff6)="00647a72616c8c657200", 0x7e0, 0xff28, &(0x7f000000df19)=""/231}, 0x48) keyctl$chown(0x4, r2, r4, 0x0) chown(&(0x7f0000000300)='./file0\x00', r4, r5) keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000240)='./file0\x00', 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000380)=0x28, 0x4) 2018/04/06 22:42:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@routing={0x0, 0x10, 0x3, 0x9e7d375, 0x0, [@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @empty, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast1={0xff, 0x1, [], 0x1}]}, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000bfd000)=@routing, 0x8) 2018/04/06 22:42:06 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={0xffffffffffffffff}) fcntl$getown(r0, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000240)="6e65747eb5a59dbf58772f6b65765f85d8b477069876cab71a66e5c8b091ad696c2f6607000000945ddb9fadd7580b63f0e6c3ca9b0ad2a13bf62207e18f93c9cfd4f7180191e05cbf2e3095772dc11ccd4d6ab6") lseek(r2, 0x3, 0x3) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x401, 0x0, 0xfa5a}, &(0x7f0000000200)=0x10) pread64(r2, &(0x7f0000000000)=""/64, 0x40, 0x5) 2018/04/06 22:42:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x5}, {0x6}]}) [ 62.626917] mmap: syz-executor6 (5485) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 62.642682] audit: type=1326 audit(1523054526.641:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5476 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455259 code=0x0 2018/04/06 22:42:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000640)=[{&(0x7f0000000040)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000340)='l', 0x1}], 0x1, &(0x7f0000000580)}], 0x1, 0x0) 2018/04/06 22:42:06 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) ioprio_get$pid(0x1000000000003, 0x0) 2018/04/06 22:42:06 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000002c000)='./file0\x00', &(0x7f000002cffa)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) 2018/04/06 22:42:06 executing program 1: r0 = socket$rds(0xa, 0x2, 0x11) sendmsg$rds(r0, &(0x7f000000afc8)={&(0x7f0000004ff0)={0xa, 0x4e21}, 0xe8, &(0x7f0000010000)=[{&(0x7f000000c000)=""/4096}, {&(0x7f000000e000)=""/79, 0xffffffffffffff69}, {&(0x7f000000f000)=""/255, 0x42e1f40f82fdb420}], 0x0, &(0x7f0000002000)=[@rdma_dest={0x14, 0x29, 0x3e}, @mask_fadd={0x0, 0x114, 0x8, {{}, &(0x7f000000f000), &(0x7f000000eff8)}}], 0xda}, 0x0) 2018/04/06 22:42:06 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000475000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)={0x4000000000001}) 2018/04/06 22:42:06 executing program 7: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) fstatfs(r0, &(0x7f0000000280)=""/143) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)) 2018/04/06 22:42:06 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, r1, 0x0, r0, 0x0) 2018/04/06 22:42:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f2cfa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00008d5ff0)="649c47ffffff7fc86dae79fa409d4d54", 0x10) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/04/06 22:42:07 executing program 3: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) shutdown(r0, 0x0) 2018/04/06 22:42:07 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:07 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:07 executing program 5: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000002000/0x1000)=nil, 0x1000) mlock(&(0x7f000000a000/0x2000)=nil, 0x2000) mremap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) mremap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000002000/0x1000)=nil) 2018/04/06 22:42:07 executing program 1: clone(0x200, &(0x7f000074a000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000000180)="58ab64e7000000000000000645465139a852f337e24bfd9d3cc828cdc9bdea564e5369890c") mknod(&(0x7f0000f80000)='./file0\x00', 0x3, 0x8) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000440), &(0x7f0000000400)) r0 = gettid() socketpair$unix(0x1, 0x400000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/exec\x00') setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000000c0)=0xffffffffffffff4c, 0x2) write$eventfd(r3, &(0x7f0000000100), 0x8) recvfrom$unix(r2, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x8) fcntl$setsig(r1, 0xa, 0x12) perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setfpexc(0xc, 0x0) dup2(r1, r2) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000140)={0x30, &(0x7f0000000040)="d7658b62b18c9b3115377d0e9bceeceec21626e9474d5ad106904c632cfe5b13d3df771c9ddda90aa58bd70d77458d00"}) tkill(r0, 0x0) 2018/04/06 22:42:07 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc0, &(0x7f00000000c0), &(0x7f0000000080)=0x2ab995cd06a2acc7) 2018/04/06 22:42:07 executing program 7: nanosleep(&(0x7f0000000080), &(0x7f0000000440)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) 2018/04/06 22:42:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00007f2fe0)={r0, &(0x7f0000829fff), &(0x7f0000570fff)}, 0x20) 2018/04/06 22:42:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f00001caff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2270, &(0x7f0000000000)) 2018/04/06 22:42:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f000033cff0)={&(0x7f000037c000)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff, 0x0, 0xff}, [@RTA_DST={0x8, 0x1, @loopback=0x7f000001}]}, 0x24}, 0x1, 0x0, 0x0, 0x4007}, 0x4000000) 2018/04/06 22:42:07 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setopts(0x4209, r1, 0x400001, 0x0) 2018/04/06 22:42:07 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = socket(0x11, 0x2, 0x8) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r1, r0) write$tun(r2, &(0x7f0000000080), 0xffd0) 2018/04/06 22:42:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) 2018/04/06 22:42:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f00001caff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2270, &(0x7f0000000000)) 2018/04/06 22:42:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(des3_ede-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) 2018/04/06 22:42:07 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000b7fff0)=[{r2, 0xfffffffffffffff8}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) fcntl$setstatus(r2, 0x4, 0x42402) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x201, 0x0) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) dup(r1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x1, 0x2758d807be918677, 0x2, 0x3, 0x4, 0xffffffffffff8000}, &(0x7f0000000100)=0x20) 2018/04/06 22:42:07 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:08 executing program 1: set_mempolicy(0x3, &(0x7f00000000c0)=0xfffffffffffffff9, 0x8d) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xaab000)=nil, 0xaab000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/06 22:42:08 executing program 0: r0 = syz_open_dev$sg(&(0x7f00001caff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2270, &(0x7f0000000000)) 2018/04/06 22:42:08 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000b7fff0)=[{r2, 0xfffffffffffffff8}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) fcntl$setstatus(r2, 0x4, 0x42402) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x201, 0x0) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) dup(r1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x1, 0x2758d807be918677, 0x2, 0x3, 0x4, 0xffffffffffff8000}, &(0x7f0000000100)=0x20) 2018/04/06 22:42:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000e4dff1)='/dev/sequencer\x00', 0xa202, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000019ff4)) write$sndseq(r0, &(0x7f00009ab000)=[{0x8, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @control}], 0x30) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x22, "1b074f12cc3532908f54e893761e739a415dfa17c9a4541e7c2104d1338caeda5002"}, &(0x7f00000007c0)=0x2a) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000008c0)={r3, 0x74, &(0x7f0000000800)=[@in6={0xa, 0x4e21, 0x266, @dev={0xfe, 0x80, [], 0xe}, 0x7}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x0, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x80000000}, @in={0x2, 0x0, @loopback=0x7f000001}, @in6={0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x5}]}, &(0x7f0000000900)=0x10) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) r5 = getpid() r6 = syz_open_procfs(r5, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00002e9000)='task\x00') getdents(r7, &(0x7f0000720fd4)=""/44, 0x1b3) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) sendmsg$netlink(r6, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)=ANY=[@ANYBLOB="1000e4002a00500109007000fcdbcff8"], 0x1}], 0x1, &(0x7f00000003c0)=ANY=[]}, 0x0) setsockopt$packet_buf(r6, 0x107, 0x6, &(0x7f0000000100), 0x0) syncfs(r6) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x7, 0x0, 0x3f, 0x0, 0x1bcb}, 0xb) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000015ff8)='./file0\x00', &(0x7f000001fffa)='bdev\x00', 0x0, &(0x7f000001f000)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/04/06 22:42:08 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = socket(0x11, 0x2, 0x8) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r1, r0) write$tun(r2, &(0x7f0000000080), 0xffd0) 2018/04/06 22:42:08 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setopts(0x4209, r1, 0x400001, 0x0) 2018/04/06 22:42:08 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:08 executing program 0: r0 = syz_open_dev$sg(&(0x7f00001caff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2270, &(0x7f0000000000)) 2018/04/06 22:42:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = socket(0x11, 0x2, 0x8) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r1, r0) write$tun(r2, &(0x7f0000000080), 0xffd0) 2018/04/06 22:42:08 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setopts(0x4209, r1, 0x400001, 0x0) 2018/04/06 22:42:08 executing program 1: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x8080, &(0x7f00000000c0)={0xa, 0x4e24, 0xf39, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x300000c, 0x32, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/06 22:42:08 executing program 5: r0 = open(&(0x7f0000fedff8)='./file0\x00', 0x141042, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x5) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)='4', 0x1}], 0x1) 2018/04/06 22:42:09 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = socket(0x11, 0x2, 0x8) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r1, r0) write$tun(r2, &(0x7f0000000080), 0xffd0) 2018/04/06 22:42:09 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="b5", 0x1}], 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00007dcfe3)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto(r0, &(0x7f0000c63000), 0x94b58e0b609adbb7, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000b7a000), 0x3) 2018/04/06 22:42:09 executing program 0: r0 = memfd_create(&(0x7f0000000000)=']#vboxnet0system[{\x00', 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000031000)) fremovexattr(r0, &(0x7f0000000240)=@known='security.capability\x00') 2018/04/06 22:42:09 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}]}, 0x2c}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3"], 0x1) gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/06 22:42:09 executing program 1: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, &(0x7f0000b4bff8), 0x100000002) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 2018/04/06 22:42:09 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000b7fff0)=[{r2, 0xfffffffffffffff8}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) fcntl$setstatus(r2, 0x4, 0x42402) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x201, 0x0) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) dup(r1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x1, 0x2758d807be918677, 0x2, 0x3, 0x4, 0xffffffffffff8000}, &(0x7f0000000100)=0x20) 2018/04/06 22:42:09 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ptrace$setopts(0x4209, r1, 0x400001, 0x0) 2018/04/06 22:42:09 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/06 22:42:09 executing program 3: unshare(0x8000000) shmget(0x2, 0x13000, 0x220, &(0x7f0000ab6000/0x13000)=nil) r0 = shmget(0x0, 0x3000, 0x7c000241, &(0x7f000029a000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) unshare(0xc000000) 2018/04/06 22:42:09 executing program 0: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000400000000000000", 0x14, 0x0) 2018/04/06 22:42:09 executing program 7: mkdir(&(0x7f0000000140)='./file0\x00', 0xffefffffffffffff) getrandom(&(0x7f0000000340)=""/120, 0x78, 0x101) mkdir(&(0x7f0000024ff0)='./file0/control\x00', 0x0) mount(&(0x7f00000001c0)='./file0/control/file0\x00', &(0x7f0000000280)='./file0/control\x00', &(0x7f0000000240)='nfs4\x00', 0x0, 0x0) 2018/04/06 22:42:09 executing program 6: perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000554ff8)='./file0\x00', 0x0) unshare(0x400) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/06 22:42:09 executing program 3: unshare(0x8000000) shmget(0x2, 0x13000, 0x220, &(0x7f0000ab6000/0x13000)=nil) r0 = shmget(0x0, 0x3000, 0x7c000241, &(0x7f000029a000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) unshare(0xc000000) 2018/04/06 22:42:09 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="b5", 0x1}], 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00007dcfe3)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto(r0, &(0x7f0000c63000), 0x94b58e0b609adbb7, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000b7a000), 0x3) 2018/04/06 22:42:09 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000080)={0x2b8, &(0x7f0000000040)}) 2018/04/06 22:42:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000085ff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100), 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 2018/04/06 22:42:10 executing program 3: unshare(0x8000000) shmget(0x2, 0x13000, 0x220, &(0x7f0000ab6000/0x13000)=nil) r0 = shmget(0x0, 0x3000, 0x7c000241, &(0x7f000029a000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) unshare(0xc000000) 2018/04/06 22:42:10 executing program 0: memfd_create(&(0x7f0000000100)="2a3a21242d80", 0x6) 2018/04/06 22:42:10 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="b5", 0x1}], 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00007dcfe3)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto(r0, &(0x7f0000c63000), 0x94b58e0b609adbb7, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000b7a000), 0x3) 2018/04/06 22:42:10 executing program 7: r0 = socket(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x286) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) r4 = semget(0x0, 0x4, 0x600) semctl$GETNCNT(r4, 0x0, 0xe, &(0x7f0000000040)=""/115) semget$private(0x0, 0x0, 0x0) ftruncate(r2, 0x10008) sendfile(r0, r3, 0x0, 0x72439a6b) 2018/04/06 22:42:10 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, {}, 0x40, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 'erspan0\x00'}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$KDSKBLED(r2, 0x4b65, 0x8) 2018/04/06 22:42:10 executing program 2: clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x264, 0x0) timer_settime(0x0, 0x0, &(0x7f00000e4fe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f000094c000)) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000b7fff0)=[{r2, 0xfffffffffffffff8}], 0x1, &(0x7f0000345ff0)={0x0, r0}, &(0x7f0000d5c000), 0x8) fcntl$setstatus(r2, 0x4, 0x42402) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x201, 0x0) connect$unix(r1, &(0x7f00006edffb)=@file={0x0, './file0\x00'}, 0xa) dup(r1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x1, 0x2758d807be918677, 0x2, 0x3, 0x4, 0xffffffffffff8000}, &(0x7f0000000100)=0x20) 2018/04/06 22:42:10 executing program 4: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f000053b000/0x2000)=nil) 2018/04/06 22:42:10 executing program 6: mkdir(&(0x7f0000074ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='sysfs\x00', 0x0, &(0x7f0000ebcffe)) rename(&(0x7f0000e7b000)='./file0/bus\x00', &(0x7f0000639000)='./file0/file0\x00') 2018/04/06 22:42:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080)=0x3, 0x3) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8080, 0x2c) ppoll(&(0x7f00000000c0)=[{r2, 0x10}, {r1, 0x4250}, {r1, 0x1041}, {r1}, {r0, 0x100}, {r1, 0x4010}, {r0, 0x2109}, {r1}], 0x8, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)={0x80000001}, 0x8) 2018/04/06 22:42:10 executing program 4: r0 = socket$inet6(0xa, 0x2000000000001, 0x8000) setsockopt$sock_int(r0, 0x1, 0xe, &(0x7f0000000040)=0x15c80285d, 0x4) setsockopt$inet6_int(r0, 0x29, 0x37, &(0x7f00002c3000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x1) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000c77000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x1f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0xb) getgid() 2018/04/06 22:42:10 executing program 3: unshare(0x8000000) shmget(0x2, 0x13000, 0x220, &(0x7f0000ab6000/0x13000)=nil) r0 = shmget(0x0, 0x3000, 0x7c000241, &(0x7f000029a000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) unshare(0xc000000) 2018/04/06 22:42:10 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, {}, 0x40, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 'erspan0\x00'}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$KDSKBLED(r2, 0x4b65, 0x8) 2018/04/06 22:42:10 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, {}, 0x40, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 'erspan0\x00'}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$KDSKBLED(r2, 0x4b65, 0x8) 2018/04/06 22:42:10 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="b5", 0x1}], 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00007dcfe3)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto(r0, &(0x7f0000c63000), 0x94b58e0b609adbb7, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000b7a000), 0x3) 2018/04/06 22:42:10 executing program 6: r0 = socket$inet6(0xa, 0x80803, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in6=@loopback={0x0, 0x1}, 0x4e22, 0x2, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="a747a7aa7901c637e7aec00998b63a0865aea36b504c304a5edd52070e270cf71ec88cd90c49b02c49f89949d6d6e2408e11b1", 0x33, 0x20004851, &(0x7f0000000040)={0xa, 0x4e21, 0x43b4, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 2018/04/06 22:42:10 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000687000)=0x9, 0x135) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f00000000c0)=0x3, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/06 22:42:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000006e80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="ecf3e8e31d98acd3ef6f26f860970ac37950df7ee4e02ecb86c98d710936bac90583b150640c4723", 0x28}], 0x1, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002580)="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", 0x5dd}], 0x1, &(0x7f0000003580)}}], 0x2, 0x0) 2018/04/06 22:42:10 executing program 4: mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4003, &(0x7f00000001c0)=0x9e, 0x7f, 0x2) mbind(&(0x7f0000ff9000/0x5000)=nil, 0x5000, 0x0, &(0x7f0000000000)=0x1000, 0x1, 0x4) 2018/04/06 22:42:11 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={r1, 0x7bb7}, &(0x7f0000000200)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00008a7fe4)={0x5, 0x1, 0x6, 0x28}, 0x1b) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x80000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x2e5, &(0x7f00000002c0)}, 0xb2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000340)=""/79) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) ioctl$TCFLSH(r0, 0x540b, 0x4) tgkill(r2, r3, 0x2d) capset(&(0x7f0000000000)={0x20071026, r3}, &(0x7f0000000040)={0x1, 0x6, 0x2, 0x6, 0x4, 0xce34}) [ 67.110265] capability: warning: `syz-executor6' uses deprecated v2 capabilities in a way that may be insecure 2018/04/06 22:42:11 executing program 6: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000), 0x4) lookup_dcookie(0x2, &(0x7f0000001600)=""/65, 0x41) ioctl$int_out(r0, 0x0, &(0x7f0000000080)) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x10ed5b) getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a45352, &(0x7f0000001680)={{0x5, 0x6}, 'port0\x00', 0x1, 0x0, 0x0, 0x4, 0x0, 0xb41, 0x400, 0x0, 0x2, 0x634}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) sendmsg$unix(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@abs={0x1}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000001500), 0x0, 0x4000}, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000200)) 2018/04/06 22:42:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000006e80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="ecf3e8e31d98acd3ef6f26f860970ac37950df7ee4e02ecb86c98d710936bac90583b150640c4723", 0x28}], 0x1, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002580)="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", 0x5dd}], 0x1, &(0x7f0000003580)}}], 0x2, 0x0) 2018/04/06 22:42:11 executing program 7: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0xffffffffffffff80, 0x4, 0x3c, 0x200, 0xffffffff, 0x9, 0x5, {0x0, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, 0x9, 0x2c, 0x1, 0x100000001, 0x62}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={r1, 0xbc, "5862022b68ea948b64418e5a8428b935b223d07426340e8665644cb56d09cd2e8ffa61b0407f7dea3042ee3fd17c1c33affc9f878e801c35fc33191d775f5833bfa2a571ea6f94d945586eb1819f6d1db6ad7161c60cba1fa8180f3de58c043b23e77e9a43183c45ca79c8689038f7d415f27c807d0364d4cebf6c2b590bfed49965b676eae19bfefef4cf37ecbe14406d0e587ebc40cb7a406937d2a0e8485659652ec1ad1de31df73a78cd30b5830c357cb9dcf2a29bc7845b702f"}, &(0x7f0000000380)=0xc4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f00000000c0)={&(0x7f00006bb000/0x1000)=nil, 0x1000}) dup(0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'irlan0\x00'}}, 0x80) mbind(&(0x7f0000973000/0x2000)=nil, 0x2000, 0x1, &(0x7f00009ecff8), 0x2, 0x3) 2018/04/06 22:42:11 executing program 3: unshare(0x8020400) r0 = epoll_create1(0x0) unshare(0x0) close(r0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/04/06 22:42:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000004ffb)='task\x00') socketpair$inet6(0xa, 0x800, 0x3, &(0x7f0000000300)) getdents64(r0, &(0x7f00000015c0)=""/72, 0x21f) exit(0x0) getdents64(r0, &(0x7f0000000180)=""/169, 0xa9) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004222e1abb3000000000000000000"], 0x48) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0xe8) r3 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r1, r2, r3}, 0xc) r4 = accept4$ax25(r0, 0x0, &(0x7f0000000280), 0x80800) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000002c0)) 2018/04/06 22:42:11 executing program 4: mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4003, &(0x7f00000001c0)=0x9e, 0x7f, 0x2) mbind(&(0x7f0000ff9000/0x5000)=nil, 0x5000, 0x0, &(0x7f0000000000)=0x1000, 0x1, 0x4) 2018/04/06 22:42:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00005f5ffd)='io\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000980000)={0x0, 0x0, &(0x7f000038f000)=[{&(0x7f0000c90f9a)="94", 0x1}], 0x1, &(0x7f00005f6000)}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x4, 0x4) sendfile(r2, r1, &(0x7f0000807000), 0x3f) 2018/04/06 22:42:11 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) 2018/04/06 22:42:11 executing program 0: r0 = socket$inet(0x15, 0x400000080005, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x10000, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x2, 0x4e23}, 0x8, 0x0, 0x4, 0xbc6, 0x527d, 0x0, 0xfff, 0xd86, 0x5}) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000024fb8)=[{0x10, 0x114, 0x1}], 0x10}, 0x0) 2018/04/06 22:42:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80000, 0x0) r1 = memfd_create(&(0x7f0000003000)='-.[vmnet0^\x00', 0x0) r2 = getpgrp(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000004000)=0x2) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x7d, "39a758518d713fe9c768241ff972a51d2f7e7d1185832af6a58a7f2dc5e8771d9cb4c6fa7e530f6dcf88a01dfb08695d3fd477d8918ae6641b6f25a6f0987ddda6e49ae194aca5b33ea798a5a892189e81088c7ee38d4cabfe97dffbdcf267c30cdf3d7e2733ea333d96297eca00f61206326dfd9be3061af9a975d16b"}, &(0x7f0000000180)=0x85) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x3}, 0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)=',vboxnet1\x00') setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) dup2(r5, r1) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)='md5sum\x00', 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000000)) close(r3) 2018/04/06 22:42:11 executing program 4: r0 = semget(0x0, 0x3, 0x180) semctl$SETVAL(r0, 0x3, 0x10, &(0x7f0000000000)=0x6) prctl$intptr(0x200000000002f, 0x3) 2018/04/06 22:42:11 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) accept4$packet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xf, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, @alu={0x7, 0x10000, 0x3, 0x7, 0x5, 0xfffffffe}, @generic={0x80000000, 0x4, 0xffff, 0x400}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x1, 0x2e, &(0x7f0000000240)=""/46, 0x41100, 0x1, [], r1}, 0x48) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x80, 0xffffffffffffff5c}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f000006bbc5)='/dev/sequencer\x00', 0x40a02, 0x0) write$sndseq(r2, &(0x7f0000fbde80)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{0x81, 0x3}, 0x0, &(0x7f0000cdcfd0)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"d8ab0f014fb8ca604dbe1e54"}}}}], 0x6) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)="24f210a1f3d6e0c1f42e7c02ce7b204dfec8ca2048e418f3c863b2fcfac69ac2fc6c95eada2cb0"}, 0x10) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000100)=""/68) 2018/04/06 22:42:11 executing program 6: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x7) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ifreq(r1, 0x891b, &(0x7f0000000000)={'gretap0\x00', @ifru_names='bond0\x00'}) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r2, &(0x7f00000002c0)=""/12, 0xb, 0x0, 0x0, 0xfffffe99) 2018/04/06 22:42:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x10000007f, 0xa, 0x1000000000000008}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000d000)={0xffffffffffffffff, &(0x7f0000014000)="415dd5eecbd0c416b6a4801f6107051aee80332a73625b1dd5fbae99be0fbe43f8cb934d5bffc07c542a408814a076580d0cf8d41810ae96b6f9314760764e4e390d161ad03c03e75df0195b2786887c7c81889ded6d2cd6e728", &(0x7f0000008fc5)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000014000)='A\b', &(0x7f0000012000)}, 0x20) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e24, 0x8, @empty, 0x800}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000012000), &(0x7f000000cff6)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 2018/04/06 22:42:11 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000000) lseek(r1, 0x0, 0x3) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x40801, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) accept$netrom(r1, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffd87) timerfd_create(0x7, 0x80800) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000100)) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f00000f5ffc)=0xfffffffeffffffff, 0x4) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) [ 67.753971] QAT: Invalid ioctl [ 67.798717] ================================================================== [ 67.806235] BUG: KMSAN: uninit-value in ip6table_mangle_hook+0x97e/0xb00 [ 67.806967] QAT: Invalid ioctl [ 67.813074] CPU: 0 PID: 5814 Comm: syz-executor6 Not tainted 4.16.0+ #81 [ 67.813081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.813086] Call Trace: [ 67.813110] dump_stack+0x185/0x1d0 [ 67.813128] ? ip6table_mangle_hook+0x97e/0xb00 [ 67.813141] kmsan_report+0x142/0x240 [ 67.813156] __msan_warning_32+0x6c/0xb0 [ 67.813175] ip6table_mangle_hook+0x97e/0xb00 [ 67.813203] ? ip6table_mangle_net_exit+0x130/0x130 [ 67.860690] nf_hook_slow+0x158/0x3d0 [ 67.860711] ip6_xmit+0x1c3b/0x2120 [ 67.860725] ? ip6_xmit+0x2120/0x2120 [ 67.860737] ? ip6_rt_copy_init+0x8f0/0x8f0 [ 67.860761] inet6_csk_xmit+0x35b/0x440 [ 67.860782] ? inet6_csk_addr2sockaddr+0x2e0/0x2e0 [ 67.860797] dccp_transmit_skb+0x15eb/0x1900 [ 67.860819] dccp_send_reset+0x398/0x4e0 [ 67.860836] dccp_recvmsg+0xd44/0x13a0 [ 67.860849] ? kmsan_set_origin_inline+0x6b/0x120 [ 67.860870] ? dccp_sendmsg+0x12d0/0x12d0 [ 67.860883] sock_common_recvmsg+0x16c/0x270 [ 67.860897] ? compat_sock_common_getsockopt+0x1d0/0x1d0 [ 67.860911] SYSC_recvfrom+0x659/0x820 [ 67.860926] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 67.860938] ? prepare_exit_to_usermode+0x149/0x3a0 [ 67.860961] SyS_recvfrom+0x8a/0xb0 [ 67.860973] do_syscall_64+0x309/0x430 [ 67.860987] ? SYSC_send+0xe0/0xe0 [ 67.861003] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.861013] RIP: 0033:0x455259 [ 67.861021] RSP: 002b:00007f7195a75c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 67.861034] RAX: ffffffffffffffda RBX: 00007f7195a766d4 RCX: 0000000000455259 [ 67.861041] RDX: 000000000000000b RSI: 00000000200002c0 RDI: 0000000000000014 [ 67.861047] RBP: 000000000072bea0 R08: 0000000000000000 R09: 00000000fffffe99 [ 67.861055] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 67.861061] R13: 000000000000048f R14: 00000000006f9e08 R15: 0000000000000000 [ 67.861069] [ 67.861073] Uninit was stored to memory at: [ 67.861086] kmsan_internal_chain_origin+0x12b/0x210 [ 67.861096] __msan_chain_origin+0x69/0xc0 [ 67.861109] ip6_xmit+0x1899/0x2120 [ 67.861120] inet6_csk_xmit+0x35b/0x440 [ 67.861133] dccp_transmit_skb+0x15eb/0x1900 [ 67.861145] dccp_send_reset+0x398/0x4e0 [ 67.861158] dccp_recvmsg+0xd44/0x13a0 [ 67.861176] sock_common_recvmsg+0x16c/0x270 [ 67.861189] SYSC_recvfrom+0x659/0x820 [ 67.861200] SyS_recvfrom+0x8a/0xb0 [ 67.861210] do_syscall_64+0x309/0x430 [ 67.861223] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.861226] Uninit was stored to memory at: [ 67.861237] kmsan_internal_chain_origin+0x12b/0x210 [ 67.861247] __msan_chain_origin+0x69/0xc0 [ 67.861259] inet_csk_clone_lock+0x503/0x580 [ 67.861274] dccp_create_openreq_child+0x7f/0x890 [ 67.861286] dccp_v6_request_recv_sock+0x88a/0x2000 [ 67.861299] dccp_check_req+0x7b9/0x8f0 [ 67.861310] dccp_v6_rcv+0x1109/0x2340 [ 67.861326] ip6_input_finish+0xa62/0x2110 [ 67.861337] ip6_input+0x294/0x320 [ 67.861349] ipv6_rcv+0x20ec/0x26d0 [ 67.861363] __netif_receive_skb_core+0x47cf/0x4a80 [ 67.861373] process_backlog+0x62d/0xe20 [ 67.861382] net_rx_action+0x7c1/0x1a70 [ 67.861394] __do_softirq+0x56d/0x93d [ 67.861397] Uninit was created at: [ 67.861411] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 67.861424] kmsan_kmalloc+0x94/0x100 [ 67.861435] kmem_cache_alloc+0xaab/0xb90 [ 67.861449] inet_reqsk_alloc+0xc4/0x7f0 [ 67.861460] dccp_v6_conn_request+0x708/0x1880 [ 67.861474] dccp_rcv_state_process+0x2ea/0x2410 [ 67.861484] dccp_v6_do_rcv+0x55b/0x1220 [ 67.861494] __sk_receive_skb+0x60e/0xf20 [ 67.861504] dccp_v6_rcv+0x21d6/0x2340 [ 67.861515] ip6_input_finish+0xa62/0x2110 [ 67.861524] ip6_input+0x294/0x320 [ 67.861535] ipv6_rcv+0x20ec/0x26d0 [ 67.861546] __netif_receive_skb_core+0x47cf/0x4a80 [ 67.861556] process_backlog+0x62d/0xe20 [ 67.861565] net_rx_action+0x7c1/0x1a70 [ 67.861577] __do_softirq+0x56d/0x93d [ 67.861581] ================================================================== [ 67.861584] Disabling lock debugging due to kernel taint [ 67.861590] Kernel panic - not syncing: panic_on_warn set ... [ 67.861590] [ 67.861603] CPU: 0 PID: 5814 Comm: syz-executor6 Tainted: G B 4.16.0+ #81 [ 67.861609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.861613] Call Trace: [ 67.861627] dump_stack+0x185/0x1d0 [ 67.861642] panic+0x39d/0x940 [ 67.861673] ? ip6table_mangle_hook+0x97e/0xb00 [ 67.861684] kmsan_report+0x238/0x240 [ 67.861698] __msan_warning_32+0x6c/0xb0 [ 67.861712] ip6table_mangle_hook+0x97e/0xb00 [ 67.861734] ? ip6table_mangle_net_exit+0x130/0x130 [ 67.861748] nf_hook_slow+0x158/0x3d0 [ 67.861765] ip6_xmit+0x1c3b/0x2120 [ 67.861780] ? ip6_xmit+0x2120/0x2120 [ 67.861792] ? ip6_rt_copy_init+0x8f0/0x8f0 [ 67.861815] inet6_csk_xmit+0x35b/0x440 [ 67.861834] ? inet6_csk_addr2sockaddr+0x2e0/0x2e0 [ 67.861848] dccp_transmit_skb+0x15eb/0x1900 [ 67.861869] dccp_send_reset+0x398/0x4e0 [ 67.861888] dccp_recvmsg+0xd44/0x13a0 [ 67.861899] ? kmsan_set_origin_inline+0x6b/0x120 [ 67.861918] ? dccp_sendmsg+0x12d0/0x12d0 [ 67.861929] sock_common_recvmsg+0x16c/0x270 [ 67.861942] ? compat_sock_common_getsockopt+0x1d0/0x1d0 [ 67.861955] SYSC_recvfrom+0x659/0x820 [ 67.861968] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 67.861980] ? prepare_exit_to_usermode+0x149/0x3a0 [ 67.862001] SyS_recvfrom+0x8a/0xb0 [ 67.862014] do_syscall_64+0x309/0x430 [ 67.862029] ? SYSC_send+0xe0/0xe0 [ 67.862044] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.862052] RIP: 0033:0x455259 [ 67.862058] RSP: 002b:00007f7195a75c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 67.862068] RAX: ffffffffffffffda RBX: 00007f7195a766d4 RCX: 0000000000455259 [ 67.862074] RDX: 000000000000000b RSI: 00000000200002c0 RDI: 0000000000000014 [ 67.862080] RBP: 000000000072bea0 R08: 0000000000000000 R09: 00000000fffffe99 [ 67.862086] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 67.862092] R13: 000000000000048f R14: 00000000006f9e08 R15: 0000000000000000 [ 67.862597] Dumping ftrace buffer: [ 67.862601] (ftrace buffer empty) [ 67.862606] Kernel Offset: disabled [ 68.396111] Rebooting in 86400 seconds..