[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.481756] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 24.106742] random: sshd: uninitialized urandom read (32 bytes read) [ 24.539374] random: sshd: uninitialized urandom read (32 bytes read) [ 25.448567] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. [ 30.881330] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/16 10:11:46 fuzzer started 2018/05/16 10:11:46 dialing manager at 10.128.0.26:33799 [ 59.919197] can: request_module (can-proto-0) failed. [ 59.928151] can: request_module (can-proto-0) failed. 2018/05/16 10:12:17 kcov=true, comps=true 2018/05/16 10:12:22 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = accept(r0, &(0x7f0000000040)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x80) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000140)) sendto$inet(r1, &(0x7f0000000180)="195c4cd259c305e60f566363d7e8d428ae95b5d5e24b39044b1715c0f4d48468669bae9de23e6d35d8f34376c2b0d4ef4f580d918253d13610541400613168398b4d7d0fb2705863dfb5b11bdb430c7eb63e134489cef3ae7fb4d0279956c6e56eef53f64eba117ca21e7762579dd6575bf8938cd45f0d08f81a7cf2daaa322dfa8000e752fbf28d6dfb7c73a93284b6f733c633c0c462ab6180410fcf938bdab00cdb04539127a2aa7bc2d932e515a6aac8", 0xb2, 0x11, &(0x7f0000000240)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) r2 = syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0x8, 0x408040) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x10000, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000380)={r3, 0x3, 0x909, r4}) setsockopt$llc_int(r3, 0x10c, 0x8, &(0x7f00000003c0)=0x80000000, 0x4) r5 = getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000400)=0x0) setpgid(r5, r6) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000000440)) accept$ax25(r3, &(0x7f0000000480), &(0x7f00000004c0)=0x10) modify_ldt$write2(0x11, &(0x7f0000000500)={0x0, 0x100000, 0xffffffff, 0x74, 0x0, 0x9, 0xa21, 0x0, 0x358f, 0x1}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) accept4$nfc_llcp(r1, 0x0, &(0x7f0000000540), 0x800) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000580)={{0x101, 0xffff}, 'port0\x00', 0x9, 0x20, 0x6, 0x10001, 0x2, 0x7, 0x1, 0x0, 0x7, 0x401}) munlockall() getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000640), &(0x7f0000000680)=0x4) r7 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, r7, 0x97) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f0000000740)=0x6, 0x4) personality(0x2400006) write$binfmt_script(r2, &(0x7f0000000780)={'#! ', './file0', [{0x20, '/dev/mixer\x00'}, {0x20, 'keyring\x00'}, {0x20, 'lo{selinuxmime_type'}, {0x20, '/dev/snd/midiC#D#\x00'}, {0x20, 'keyring\x00'}, {0x20}, {0x20}], 0xa, "21c3eaef6609177b068572d40e05513177bed7da77b39f51979da1d6710b8db8bf6d8d9e592f17dbf2b3108d34b105547b9fd8305745a5187f81c37bdf0c6381e8476192"}, 0x96) r8 = semget$private(0x0, 0x3, 0x8) semctl$GETVAL(r8, 0x0, 0xc, &(0x7f0000000840)=""/145) 2018/05/16 10:12:22 executing program 3: syz_mount_image$cifs(&(0x7f0000000000)='cifs\x00', &(0x7f0000000040)='./file0\x00', 0x3ff, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000080)="ab327888d038c535c74603655d5472cd494315d96c566e1aae21898bb3b64501e28836b427e379f3000f1ed21914ebad79", 0x31, 0x3}, {&(0x7f00000000c0)="01c1bbc1f0b0ae68b4f20bc53a8380257bbef36e45f34e2ee84759890dcddbec1f485675a9cfcfef083a202296711048c978bd2fb5b0212e67538beb0abe2096ae40a5c1a66cc3f4458271a9f6209d7142273fe0140530", 0x57}, {&(0x7f0000000140)="b26dc086ea7e1449b1bcbb2379f49eee927150685262956fa27b4b99c7246cfd1586d633c70f889e70edf2b252dabea56b18102aa4e03248c34dd6f90144c57d6f2e5db1df06006c327d5a5b6be2dc60aace8c1ac046d1fc1ae11975b8e7cd5ab9e4aa1f2dc531a744662d9b61d0b9a97508d399956b028bc5fe52611103c94947e85d6cf1e8194717542c0dfd188e6902e5208c91f46c09e0d15c2902826e7670b0ae001c18f93ccfad952ed9745266c8239cfcc6cf84c57c56ca17c99ab98f", 0xc0, 0x9}, {&(0x7f0000000200)="fd10b0ccbd0985e9570d6fe4fd2f76bd4de58f92a492f0abb5c86113cf3a8e6c0f39eaefea14c098", 0x28, 0xfffffffffffff000}, {&(0x7f0000000240)="5f98e7544d97128fb7d891e306b692ce13d16b94cf8de563f7a0eee84faed186861fb1f3081468ca5cfbf033e6bb6b7d79b8e8e33b9367b402d3d0f780064e1544cab0485c1f59e50ec7c692129363ef9ff9e77209aba6be11d50df27452c0fc182594a16e9467cbd3025489dabbcfba1c431a13de8ff872f37ff0938c4d7fa1ffda", 0x82, 0x36}, {&(0x7f0000000300)="648f3b7bbe6b708f94e221105b6c66d2b5d5dee4fd69968a6d5663cdd2f0fed6c41b7592f602c95c0f44025cd87175b8a1d54fe1d295aaf1c7786d3e1a02d4e2af8ed910de6809b6f788754942238ac72ff3f1a86c8e5b652399064c9bc3c364deffab510048019bd593861b2760ddabdb06cf4aad3f294dd69d6392f3fd8a0b28e11a252476330d009b47585d", 0x8d, 0x1}, {&(0x7f00000003c0)="f925d8c161ff53dc2816f230d38c0e30a6247a55550eb92e2937fe3b6c44b9aca3ea212e9ae75036c77e7172236a7e3825c7f58207bff6cbcec94f05ac3809ba527378f4cf3f098dce7967707f9594dcf36609aed4e0b81b6233555d4452bddb3d513f5d988eb3db02fbf5887a55245b9bd51d11eccc10a9cc02cbde7c9e8e331cae072fbe658ee466d6d8dc942f67b5e4e56a9b13e5c9c246aa339acc62dfdcbb", 0xa1, 0xdbc}, {&(0x7f0000000480)="332b5962c102151379d9111e62da3ef7c477dcb549234413692d0808589a79128c6b72249ce5dac1b3", 0x29, 0x7}], 0x18020, &(0x7f0000000580)='selinuxprocsecuritynodev&nodev(\x00') r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x48, &(0x7f0000000600)=[@in6={0xa, 0x4e23, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x4}, @in6={0xa, 0x4e24, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffeffffffff}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f00000006c0)=0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000700)={r1, 0xfffffffffffffff8, 0xbe, "a8268d695c0c8edd5e8028978f3fc04c20864a60640f97733271075f67e542ad79ec2960c8e9cc832d8f514e78387947bacaf8467bca4742b6fec95871d62aaab11ae8c234293002b11192a50fb121970b4e0017316f398b25e8aeea86a4b975e1fd8f30b5535e29127d35ef563d9aab76803637be5315f55b1db21becef0e81b61253376810a600b15c52db6cf1c4e2b084f9c1eb2a69f5e5785e21480381e343583d1307f5fe690fdada89c4fafc87a387663916fa5b6e7afe557263a9"}, 0xc6) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000800)={"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"}) r2 = epoll_create1(0x80000) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x16, 0x4, "417d241c6baa2ca41b198d05166994f4ab60423a697e70250ec6162b508e75435304583920d90cb9154d83181bd11b15eb1b8e535ec68ecebb60af6c2cc5aeaa", "0d449eeae7587777012cfabb627769df25f4fae3899e5667bf515673fcbe16c3724c2b3adb3d90bb0dfec7ce67d89078434f450c79656691051081c5e9ceb799", "6f7afcb6184a2cc5491dc792a6630df3abebe13420f467b62b08a5e925ddb6ef", [0x4, 0x1a]}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000d00)=0xb5a) r3 = add_key$keyring(&(0x7f0000000d40)='keyring\x00', &(0x7f0000000d80)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000dc0)='keyring\x00', &(0x7f0000000e00)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$reject(0x13, r3, 0x9, 0x8, r4) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000e40), 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000e80)={r1, 0x7}, &(0x7f0000000ec0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000f00)={0x7fffffff, 0x8008, 0x4, 0x6, r1}, &(0x7f0000000f40)=0x10) readahead(r0, 0x921a, 0x6) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000f80)) r5 = syz_open_dev$admmidi(&(0x7f0000000fc0)='/dev/admmidi#\x00', 0x800, 0x2) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000001000)=0x3) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000001040)=""/214, 0xd6) socket$pptp(0x18, 0x1, 0x2) syz_open_dev$random(&(0x7f0000001140)='/dev/random\x00', 0x0, 0x4000) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000001180)=""/128) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000001200)=0x5) ioctl$BLKBSZSET(r5, 0x40081271, &(0x7f0000001240)=0x40) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x4058534c, &(0x7f0000001280)={0x40, 0x0, 0x8fb0, 0x8, 0x6, 0x3}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000001300)) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000001340)) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000013c0)={r1, 0x6}, 0x8) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) 2018/05/16 10:12:22 executing program 7: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000640)={0xa, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000680)={0x101ff, 0x0, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$TCSBRKP(r1, 0x5425, 0xffffffff) fcntl$getownex(r1, 0x10, &(0x7f00000006c0)={0x0, 0x0}) sched_setaffinity(r2, 0x8, &(0x7f0000000700)=0x800) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x365) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000007c0)={0x9, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000900)={r3, 0x1, &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x5, 0x100000000], 0x0, 0x7, 0x3, &(0x7f0000000880)=[0x7, 0x2, 0x1, 0x9, 0x1, 0x0, 0x5], &(0x7f00000008c0)=[0x4af8, 0x7, 0x7]}) fcntl$setstatus(r1, 0x4, 0x400) getrandom(&(0x7f0000000940)=""/34, 0x22, 0x2) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000980)={0x55, 0x5, 0x401, {0x2ea5232a, 0x8000}, {0x100000001}, @ramp={0x0, 0xfb4, {0x4, 0x2, 0xc38, 0x2}}}) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000a40)=@assoc_value={0x0}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000ac0)={r4, 0x3ff}, &(0x7f0000000b00)=0x8) semget$private(0x0, 0x3, 0x4d0) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000c00)={0x5, 0x8000, r2, 0x7, r6, 0x204, 0x729, 0xfffffffffffffffd}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000c40)=""/253, &(0x7f0000000d40)=0xfd) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000e40)={0x2, 0x79, &(0x7f0000000dc0)="05b9913c2da92ec393a10016279e1e05a5dbf590407932673ad3f2ecd19adaf59a210c7ad9fa9177f8a0d9272ea8e54a5973e43a6b05bb813a325aba3ece2e14bd07aa99054e39fc9c6a1175232ce3b82328e7bef5e8770579b0c13bc7e07cecbb18a06d7baf2082b07b7f00f3ddeb79b68bff05a907de9984"}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000e80)={r5, 0x7, 0x20, 0x0, 0x6}, &(0x7f0000000ec0)=0x18) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000f00)={0x5, 0xc, [0x3, 0x8, 0x3]}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000f40)={r4, 0x2, 0x8}, 0x8) ioctl$BLKPG(r1, 0x1269, &(0x7f0000001080)={0x10001, 0x6, 0xe4, &(0x7f0000000f80)="2007ba3f934012d50b73d021f2aee359f00e099f495aba9d384049def471c6c190b1b51bc544e5fb897586a060fabc508a419db85ce40fa3f50e47acd7a05dfc59129ba4abd72eee2eaed2d8b89749d3a76cc4c48ad77024deb2229046f033384ea5e4e0f718d4d66b3a99bced3f0d9a9771533ee97f58f264559c3888e7b09206bc6efcca92d8fe2acf64a574a464833351481f90a464375bdee7f8cec6d587180751bce94df3c454d00525da7884863b39328ca9c82da4716959b39d085fd5b370a3873eefac1cd09f0e3aa0fc0c955aaad3dc23cfe9c4736edd722645440dda6fd807"}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000010c0)=0x2, 0x4) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000001100)={r1, 0x3f, 0x2, r1}) 2018/05/16 10:12:22 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000000c0)=0x4) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)={0x1, 0x10, [0x2, 0x80, 0x0, 0x1]}) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x101, 0x400000) r2 = socket$netlink(0x10, 0x3, 0xb) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000180)=0xacd) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xf, 0x4) splice(r1, &(0x7f0000000200), r0, &(0x7f0000000240)=0x1d, 0x81, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000280)=""/8) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x9, 0x0, 0x2000}, 0x4) arch_prctl(0x0, &(0x7f0000000300)="67203356a01a3418d994cc0a80e8fd0e9e3c67f2d6e6963aa1d91b7fbbc6039d3434e78ab73934fb3bc556fc992f5f91701a9c43510ea677fa378a5cb53f16245de1382544bcd63861ee7ee8d9a67f0e201d9368cc14d16ea3f9188f0286fe910ad7e0994e4dfab80cd762da9fe0195c85694d5080dc7b683472442581f0616efc2c73d497efecdeb0aaa6ac4bc374f94ff4a36204a635c851130e828fbba321") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000400)={0x1, &(0x7f00000003c0)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000004c0)={r3, &(0x7f0000000440)=""/85}) listen(r1, 0xc7) socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000500)=0x0) r5 = getpid() tgkill(r4, r5, 0xb) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x4e21, 0x401, @mcast2={0xff, 0x2, [], 0x1}, 0x8da}}, [0x2, 0x2, 0x1, 0xffff, 0x0, 0x14000000000000, 0xe000000000000, 0x0, 0x6, 0x5, 0x448, 0xff, 0x5, 0x6, 0x1]}, &(0x7f00000006c0)=0x100) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000700)={r6, 0x2}, &(0x7f0000000740)=0x8) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000780), &(0x7f00000007c0)=0x30) r7 = shmget$private(0x0, 0x4000, 0x44, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r7, 0x3, &(0x7f0000000800)=""/139) getpriority(0x0, r4) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f00000008c0)=""/156, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000980)=0x4, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000009c0)={0x101, 0x10000, 0x7, 0x7, [], [], [], 0x6, 0x3, 0x1ff, 0xffffffffffff7fff, "047080656ada51f3c99ca7bf39cabb9c"}) fsetxattr(r2, &(0x7f0000000b00)=@known='security.capability\x00', &(0x7f0000000b40)="2d1b2e76626f786e657430776c616e3073797374656d7365637572697479776c616e30275c6b657972696e672d6367726f757000", 0x34, 0x2) 2018/05/16 10:12:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x62) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) getsockname$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x14) fdatasync(r0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="2bf4eb6c7a1f0babf6364b5ab512839a04d40f088ac440e300ce69bb83458da6ed56f83c3f05500c2c92e9a7765064b64d031094d5242d547ad91fa911e15067e87eac6ccb46c2b1042ff9b65f863ca77866ebe0e012915dfd02783a33c9ec35695631c08a8cd839af40fd4bfffc0d824f97c89bfea007691c4df76a53b8e85604d21ed1b5ff857909e39292d9d05eda03aab0495c49dcd6a856136c5a7bec133672519cff49d153bbd66fe84c4a36b65aa66c2a12a9f90d7ed169e6f7dc013eee1a386b77ece0dff5645e964a0cd40c49ae95cf9abb58d9e4db44125e2ee3f9aee64f17b75674703d220175aa57d41646c57f7dec28", 0xf6}, {&(0x7f0000000280)="4948651da016b84202681613652b34fa428850e532c4f6376ca9c72b8de9f92015a9f09c18910e22777cab65cd82e19ed8d2d1198d548f75318dcc36fff256ab7a6193ca6c22f6a5ca6fe55b4abd5c25f932b547511ed0a04254545badedf60f2a0f181ee1695f416db5f57c8d884d6e005657fc2ec6aa3acd993a49860a4b18e75fc5fbc71701ab547e738bb3f10909c80441808589a64d1f3930e56f1420a821bdadd2d269ca801ad5ac6a0e504a1db4e3f5581a69d12f4be60a90a24fe5a6550c076db9bb92564e1908a2", 0xcc}], 0x2, 0x43) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) modify_ldt$write2(0x11, &(0x7f00000003c0)={0x100, 0x100000, 0x3000, 0x1, 0x0, 0x5, 0x80000001, 0x0, 0x80000000, 0xd0}, 0x10) pwritev(r0, &(0x7f0000000980)=[{&(0x7f0000000400)="0c475e86fe50c634752b4cd5de93985b113e37b4bde560c7bc6d51a893bfcaa89b22d398fcffa5206226472bd1be992cfe43ae99973158ff816d7a5886a44a73c0037d75c15b474c8f88d1cab9e715fc942ec1cf7bb999ec457569ce30650464167dbd8040ce6b4e3d6a11db41bb6d9791c6d67a4fd61677aad0073b4c2cce4eaf651249b0e14683e3e8ad5262d6f18fcccca6fb2c32c624d81b740d580f1143e705b58d", 0xa4}, {&(0x7f00000004c0)="ae481f2d1e2921069e3a867ca6941d7b8894e75257066ac73de1ed17b407432efaa0e009f7bafdcf2c88429cf0575d292a51e2e91939c42b619ed1578a1073929ea99f2ff38484306c18c44030c53fe115f3ea1054bc13c040afd733a3a5af4e313e62e39e386f32102cbe44b3d673de2fbb98d3c196e1b2a0e10aa60ed17015bf45a3007fafd676b9788eea398bef706fe342639cf283a5d5dff27dc09ac2f7", 0xa0}, {&(0x7f0000000580)}, {&(0x7f00000005c0)="8b1a6f3fe74ddcd616e3a0f55589d4e06e048fb01f81a65c594eb874daae963612825f3e887ce0c2e28b02226c44200e839e2fd1309e255dfdd56ca58291d83e9b735e42d298be94c15c070c063fb5982fff71337633e3212854e92342f034f0395577b8517ef8dc814316cb0eae9e76294cf0cb416cd4c0c62d9e68946ff4ac4d1f1e6b73925f61a368f94c38c2a4218a7d44a41c4bc27282606b7dd14b0f8fbbeba38fab7b747dc29961beaf538d94870ded555fb7ffcfd1d21524886afff17e0d77a6168fc8dfd5ca3633e143ccc929840ef4a28e4b60a25786bbdd8642f9c88e1d7cd947", 0xe6}, {&(0x7f00000006c0)="d1c49a715edacbcd09c309b8c9a80c54e0494d2683104fb22d257cd8d69b58858415be828877598879bcedaee4f4943a5d15336629cbb421b54c98270c30bfdd101734193c961be7dfa5412ae7249fb35ade8aa842ce6a683a545dc8fd2ee2d3f79407c5a404ff53972218a9b6929c3c0a82b74e5996c88763e9e687300a61a5f0a30d821087669dbf6abb7b1c67fbb65cc21181194c19af526a075d63d232aa3a1503b5df3f40fce79a4becba22f772ab53493fcf1bab5174ec533633e9", 0xbe}, {&(0x7f0000000780)="6eae9232a2a966849c14fbb4d293812a0a3f390f06cf81abbea9148c90e534a663ee4d9eb96fbc57f7e8d5b58704a67de618f930d3c14cc48426533a7de52a3cb7ff80b00dbf705b328db97e1baa9facce4556391afd09bf518ef375d18ee93c19202b621a6e21a3", 0x68}, {&(0x7f0000000800)="e6bc87adcffc2a3463efc0ea5bf7c1e9effddaa2384810d1f36322c29f76b897ff380916d7cdaf802cf45ee0979b97b51cfba2760fd93e4a4efa8b8432065abd", 0x40}, {&(0x7f0000000840)="a8efaca26db98b0567eceb8a6d076200f69269b21faa770cd72d77378bf29a0508d666bbf3a918e730a6be781f1ea943f8fc", 0x32}, {&(0x7f0000000880)="425fe47ec53a5a9d4e813b37fc882f2f80a7ba8646b87ddb6f46dd1d8579b6b9ceb25f507f85b3db50e520ca6a170a40bc57d1d522d69a9fda13cc4c33cb6f026d210a48bea446aaf8ae7455f864a6fad30257e20dad1c0a7615544847e76649e6df6531f278e3d741c9cb70863f58ac9c237c52fc1c4e2c47d51d65fa8f2861452f03068da89291cc3ee3532dd05dba0f2e44b3cc195fa0b1e7e6fc4b508ca5c7606744328db3847bcfdd928b2603db9f978cd1ea64bb6704d614d87f2ad4a99249f18ace2aada05fa06ee6a4afcaef238b71d20bda375f2cd696d0ce01", 0xde}], 0x9, 0x0) write$binfmt_elf32(r0, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0xa387, 0xffffffffffffff7f, 0x2, 0x4, 0x5, 0x2, 0x6, 0x7, 0xf4, 0x38, 0x348, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x66cc}, [{0x1, 0x7, 0x2, 0x8, 0x4, 0x80, 0x81, 0x1f}], "020f6a3f59119d301f354c9eca57c495ffff599ea8c75b2f551ffc62a1eb40428aeff87bb933a07f3f09d50e54503ae1cb74386176c1a95dccfd2388715788869c6e01f2ce73bec1913b067f5137abcf0a5a77b563badb20489a905ac0eef5be552f831ed7a3eee8830c88d8e9fe2e521640748debe4104eed8b402d7ea69f12931e7d9dfea0641b1afcfed8b7364e365890e92dd3dd97bbb63463770208c4835c23bd0e9663f7ff1c213415e826533a5ceb067670efce0bc793ab7e37fd52ecdef3", [[], []]}, 0x31a) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/audio\x00', 0x181000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000e80)={0x0, 0xb0, &(0x7f0000000dc0)=[@in={0x2, 0x4e21, @broadcast=0xffffffff}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e21, 0x10000, @local={0xfe, 0x80, [], 0xaa}, 0x8000}, @in6={0xa, 0x4e21, 0x3f, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x4}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, @in6={0xa, 0x4e20, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x6}, @in6={0xa, 0x4e21, 0xfffffffffffffff7, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000f00)={r3, @in={{0x2, 0x4e24, @rand_addr=0x8000}}, [0x7f, 0x44, 0x2, 0xa5, 0x200, 0x241, 0x42, 0xffffffffffffffff, 0x2, 0xe6, 0x0, 0x8000, 0xb0, 0x5, 0x50]}, &(0x7f0000001000)=0x100) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000001040)=0x1) syz_mount_image$xfs(&(0x7f0000001080)='xfs\x00', &(0x7f00000010c0)='./file0\x00', 0x38000, 0x4, &(0x7f0000001400)=[{&(0x7f0000001100)="70f2df9b297d546a64368b03bc2306743edab15ad96650305717b81ff4c1433f1e9562ca9232d04a990184674f63899de5bd7f1f18f62ae745fab328a2391490a83ee234adc4b567e6c7163e52aa343435d35ec22ff90f610068f00c108ff543ed3e3442a6f7d05cd503b3cd4b0a885feee8bf6c207c376029554337", 0x7c, 0x8}, {&(0x7f0000001180)="78d9e573583f227e411a29007599304197bd2f33776ea758cbc74a4e021dca78df209b12fcc41f096aa4970886dea58794f158e052244316f856b62af410d13d7d0086910867ccdaea0702108540991aa6e394bebf1dfb590dd3c53308dffa2536a51130f612c435e1e49ade02958e86b676e168cb1e00ec897d7667073949f33da8550e1763e24bf7284d2c628fa944d07757dfb2b8e1663e4f871846c382d43da95af58885453f3e0b5a51ad4ab6", 0xaf}, {&(0x7f0000001240)="7bc8d1fed7532d57b2b066865f6fa5ca765d1573d0882a1f3aa97b144ee7409c9cc566601f9d901f5b6fbd8302bee104987c01fc69c0e816db21fb035feca4602e4c4aa6cd1e8212e9b74a7949377d7b26ff536f8db989f6755a1cd73cd6651113409b997fff88698cfc0fa6b6ea34aa6c05aad3cbd4da0cbd8548a033cc630faadfd7556954cecc5fbd02d158f297bbfe64d6fe6533850f4a770df3d1237915bc51226eea7e41a21e10fc1a843b060376fd8261d0e6e983c88b794109980041ab2c2eec1ef7", 0xc6, 0x1}, {&(0x7f0000001340)="cacbe32270bfcd1c1704854676438bb83e75b55ba1153e7efd541610197cb2b8459ce4804bd7c06d1d28e3f4945639fdea93e4e1d468fb8705cd7b51481c1c22ff71b32c345ea635d3c00fda4b50f4a07a7bd4b05f37382d47a22ea78f2c88173dcb3cab01d3506a1d42a3045e3521175c680f115caf3420f02b0328357083c595", 0x81, 0x7fff}], 0x4000, &(0x7f0000001480)={'nouuid,', {[{@wsync='wsync', 0x2c}, {@uqnoenforce='uqnoenforce', 0x2c}, {@inode64='inode64', 0x2c}, {@grpid='grpid', 0x2c}, {@mtpt='mtpt', 0x2c}, {@qnoenforce='qnoenforce', 0x2c}, {@barrier='barrier', 0x2c}, {@largeio='largeio', 0x2c}, {@filestreams='filestreams', 0x2c}]}}) fcntl$getownex(r0, 0x10, &(0x7f0000001500)) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000001540)={r1, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) bind$alg(r2, &(0x7f0000001580)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000001600)={r4, 0x6, 0x1, [0x40]}, &(0x7f0000001640)=0xa) getpeername$inet6(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000016c0)=0x1c) ioctl$KVM_SMI(r2, 0xaeb7) msgget(0x0, 0x10) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000001700)) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001740)={@loopback={0x0, 0x1}, 0x1d, r1}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001780), &(0x7f00000017c0)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001800)={r3, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7fe, 0x310, 0x1000, 0x3}, &(0x7f00000018c0)=0x98) read(r0, &(0x7f0000001900)=""/58, 0x3a) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000001940)={'ipddp0\x00', 0x9}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001980)='/dev/autofs\x00', 0x400, 0x0) sync_file_range(r5, 0xffffffffffffff09, 0x0, 0x7) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000019c0)=0x101, 0x4) 2018/05/16 10:12:22 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xff, 0x30800) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x1bd, 0x1, 0x1f, 0x2, "c3043282a117f0a837845c3c511b0b0356eac4ceedb9ddaca425da7a251cee4a16336a61be93e6595d759803", 0x7f}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x53, r1}) socket$inet6_dccp(0xa, 0x6, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/88, 0x58}, {&(0x7f0000000200)=""/143, 0x8f}, {&(0x7f00000002c0)=""/28, 0x1c}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000480)=""/36, 0x24}], 0x6, 0x0, 0x0, 0x3}, 0x326ad0d5c36d4fd) umount2(&(0x7f0000000580)='./file0\x00', 0xe) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000680)={0x0, 0x8c, &(0x7f00000005c0)="0802a6efdf14ad37dadeab41a20102c68fd39ea4c2c0ad16fa25591467c4b273aac376d650514b1b35bc931a90fb056d4f0f9dd3dde98f8a4e06d9b862a8f57199c0006fe8fdd1d92ce1cf47120e711adb0705aec081508aaa1074c9f2c4e2a5033460bb1acdc3304842810e8530e25570e064122a9cb679ec6e29ac542ffffb260d0f1fff128dae1c50e16c"}) r2 = semget(0x1, 0x0, 0x4) semctl$GETPID(r2, 0x0, 0xb, &(0x7f00000006c0)=""/62) getsockname$packet(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000740)=0x14) ioctl(r0, 0x5dba, &(0x7f0000000780)="e52ef88a71344f62e19a9e876dcf61ca33e86f4abfaa682b776b85c3c842dcbf081448598ad8f5507c62d5dc10f2af2b3fc70543f7c608204a257bcf2c46dc34e58fcf51d1f71caae6e988ae48198980f7cf108db2990af4274d0874f03ae571ab86313d4cf43b7e54006ca3b1eb2f7c8366fbac2c5a9ed13d9393ab") r3 = accept$packet(r0, &(0x7f0000000800), &(0x7f0000000840)=0x14) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000880)={r0}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000008c0)={0x1001, 0x1000}) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000900)={0x10000, 0x0, 0x4, 0x6, 0x1}) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000e80)={0x7, &(0x7f0000000940)=""/109, &(0x7f0000000dc0)=[{0x100000000, 0x40, 0x80, &(0x7f00000009c0)=""/64}, {0x6, 0x17, 0x3, &(0x7f0000000a00)=""/23}, {0x400, 0x21, 0x2, &(0x7f0000000a40)=""/33}, {0x9, 0x84, 0xfffffffffffffffa, &(0x7f0000000a80)=""/132}, {0x1, 0x95, 0x2, &(0x7f0000000b40)=""/149}, {0x80000000, 0x8e, 0xffffffff, &(0x7f0000000c00)=""/142}, {0x0, 0xc9, 0x0, &(0x7f0000000cc0)=""/201}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x7, 0x4) ioctl$sock_proto_private(r3, 0x89ea, &(0x7f0000000ec0)="9cc3b64e390d79cdfd0f45e00d3b15fb17cbadd1781dff9ee6085144e8b383c1a53cca7e719fdd2b783c5445536ca1331f4d0ede294ae93995c7cf5ade5516cd8f2f08107bf6cecea4e8318d524cc647c5b4445a1743a3d2b4c033c40ed775fedcc1fe1657b8e0b5b430d764eb22afe17036cd41ba321b8415952b09a332deed76d85d780a9caf4a23") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000f80)={'ipvs\x00'}, &(0x7f0000000fc0)=0x1e) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000001000)={"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"}) bind$unix(r4, &(0x7f0000001400)=@file={0x1, './file0\x00'}, 0x6e) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$sndseq(&(0x7f0000001480)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000014c0)=@assoc_value={0x0, 0x80000001}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000015c0)={r5, 0x68, &(0x7f0000001540)=[@in={0x2, 0x4e23, @loopback=0x7f000001}, @in6={0xa, 0x4e24, 0xd14, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in={0x2, 0x4e20, @rand_addr=0x9b}, @in6={0xa, 0x4e23, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x80}]}, &(0x7f0000001600)=0x10) pselect6(0x40, &(0x7f0000001640)={0x18000, 0x3, 0x1, 0x8, 0xdd, 0x7, 0x97, 0xff}, &(0x7f0000001680)={0x3, 0x9, 0x9, 0xa4, 0x1, 0x7, 0x2, 0x9}, &(0x7f00000016c0)={0x4, 0x80000000, 0x36446dc9, 0x3f, 0x8, 0x3, 0x1, 0x8}, &(0x7f0000001700)={0x0, 0x1c9c380}, &(0x7f0000001780)={&(0x7f0000001740)={0xfff}, 0x8}) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000017c0)={r5, 0x60000000000000}, &(0x7f0000001800)=0x8) 2018/05/16 10:12:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) r2 = accept4$packet(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000001c0)=0x14, 0x800) sendto$packet(r1, &(0x7f00000000c0)="140886a82e049e8a043e3ac213395974fe9ba2255c1a2f8125074dba870e8a709c4d5676d71656af437759fe55c4f34392e4aeca1efb235ef8e39ce666f78df709f122ea4ab72d81c3febb7655724fc0576b917ebccb4806d23fd17c6b524d90e00098c1deab17f7b4e4d62c896f559717ef1ac384978c2c178465b065d9b432fab68394438c", 0x86, 0x40, &(0x7f0000000200)={0x11, 0xf5, r3, 0x1, 0x6, 0x6, @random="049a2bf45693"}, 0x14) r4 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000380)='\\]\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)='net/fib_triestat\x00', r4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000003c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8001, 0x3, 0x30000, 0x2, "d51b0917d04e21fa0edba42ae3fa681cae0955c382497a709acde47014082419441dca7a88691f98dc5dd62c", 0x2}, 0x0, 0x0, 0x401, r5, 0xe5, 0x3, "e9f9feefaf396eaa5da9f88ceb504900a184ad9ed6d53d0b5e9d02865a63bd5ce11c7cac254095860f0aa92f5640c5c90482ca3f5a5c1468af0f066f4be68f8f", &(0x7f0000000400)='^\x00', 0x2, [], [0x1, 0x2, 0x136, 0x4]}) r6 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000005c0)=0x14, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000600)=0xfffffffffffffffb, 0x4) r8 = dup2(r0, r6) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000640)=0xe00000000000000, 0x4) ioctl$VHOST_SET_VRING_ERR(r8, 0x4008af22, &(0x7f0000000680)={0x1, r0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000780)='/dev/nullb0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x1) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000007c0)) connect$nfc_llcp(r1, &(0x7f0000000800)={0x27, 0x1, 0x0, 0x6, 0x1f, 0x2, "ce98d8b22ed4e70bb744068e12e28175bd4e9c5101b90cca2fee22fda9d0540768dca4dff9bb318e7e8e71ac24eadec4b48ca2a0115fa1f81ff455d62023dc", 0x12}, 0x60) r9 = semget$private(0x0, 0x1, 0x1) semctl$IPC_STAT(r9, 0x0, 0x2, &(0x7f0000000880)=""/78) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000900)="56fff0bf02005253eb7f53973aefb23ff9b3dc1c664af46b80c1d7e780f986a6823ae5bd0ce6936e441df54e25d4bfe37a5a1fc3db8814b4ae5eb773a8834b440d0ecf587e1b85dc999c2114890dd0166598c7b013b4d3617547a84722596290214995d9cd3b60c6260a292bb70d") ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000980)=""/219) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000a80)={{0x0, 0x3, 0xffffffffffffff06, 0x1, 0x4}, 0x6, 0x7ff, 0x1}) connect$packet(r8, &(0x7f0000000b00)={0x11, 0xc, r7, 0x1, 0x7fff, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) geteuid() sendmsg$nl_route_sched(r1, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)=@newtclass={0x50, 0x28, 0x500, 0x70bd27, 0x25dfdbff, {0x0, r3, {0x0, 0xffff}, {0xfff7, 0xc}, {0xa, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x3, 0x45}}, @TCA_RATE={0x8, 0x5, {0x1, 0x1}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0xc, 0x2, @TCA_ATM_EXCESS={0x8, 0x4, {0x4}}}}, @TCA_RATE={0x8, 0x5, {0x5b52, 0x7}}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000) recvfrom$llc(r8, &(0x7f0000000c80)=""/236, 0xec, 0x20, &(0x7f0000000d80)={0x1a, 0x319, 0x5, 0xffffffff, 0x0, 0x6e37, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x31f9, 0x1) 2018/05/16 10:12:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) [ 66.949815] IPVS: ftp: loaded support on port[0] = 21 [ 66.966605] IPVS: ftp: loaded support on port[0] = 21 [ 66.968298] IPVS: ftp: loaded support on port[0] = 21 [ 66.996109] IPVS: ftp: loaded support on port[0] = 21 [ 67.000388] IPVS: ftp: loaded support on port[0] = 21 [ 67.034697] IPVS: ftp: loaded support on port[0] = 21 [ 67.037532] IPVS: ftp: loaded support on port[0] = 21 [ 67.053937] IPVS: ftp: loaded support on port[0] = 21 [ 69.059349] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.065904] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.083038] device bridge_slave_0 entered promiscuous mode [ 69.162338] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.168795] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.182096] device bridge_slave_0 entered promiscuous mode [ 69.197677] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.204085] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.220776] device bridge_slave_0 entered promiscuous mode [ 69.234043] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.240439] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.263687] device bridge_slave_0 entered promiscuous mode [ 69.273357] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.279757] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.288442] device bridge_slave_1 entered promiscuous mode [ 69.296693] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.303089] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.316310] device bridge_slave_0 entered promiscuous mode [ 69.325666] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.332076] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.341310] device bridge_slave_1 entered promiscuous mode [ 69.347954] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.354456] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.365852] device bridge_slave_0 entered promiscuous mode [ 69.375639] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.382066] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.400976] device bridge_slave_0 entered promiscuous mode [ 69.409594] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.415969] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.424686] device bridge_slave_1 entered promiscuous mode [ 69.433311] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.439685] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.456094] device bridge_slave_1 entered promiscuous mode [ 69.464422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.473270] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.479636] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.487813] device bridge_slave_1 entered promiscuous mode [ 69.501377] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.507784] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.527134] device bridge_slave_0 entered promiscuous mode [ 69.540981] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.547358] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.558667] device bridge_slave_1 entered promiscuous mode [ 69.566198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.574057] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.580428] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.601928] device bridge_slave_1 entered promiscuous mode [ 69.625205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.633888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.642393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.651216] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.657593] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.674915] device bridge_slave_1 entered promiscuous mode [ 69.690342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.702369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.710872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.726093] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.743222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.786124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.804827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.822741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.848771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.885149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.982693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.036657] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.056098] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.146848] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.182301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.204220] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.215302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.225554] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.245484] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.254777] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.310282] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.328302] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.372284] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.401122] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.413928] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.424330] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.439486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.446437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.467238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.475894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.489071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.497665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.504601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.524665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.552761] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.561361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.570872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.593567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.616248] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.624337] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 70.632325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.650506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.658982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.680604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.687517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.704828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.735215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.758409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.771732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 70.785664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.792974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.809162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.832374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.886419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 70.900560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.952771] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 70.976847] team0: Port device team_slave_0 added [ 71.011356] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.030390] team0: Port device team_slave_0 added [ 71.044633] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.055742] team0: Port device team_slave_0 added [ 71.085756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.105681] team0: Port device team_slave_0 added [ 71.121874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.135862] team0: Port device team_slave_1 added [ 71.166247] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.174359] team0: Port device team_slave_0 added [ 71.186110] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.200713] team0: Port device team_slave_0 added [ 71.212469] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.219860] team0: Port device team_slave_1 added [ 71.228921] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.238455] team0: Port device team_slave_0 added [ 71.246440] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.261972] team0: Port device team_slave_1 added [ 71.277351] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.291494] team0: Port device team_slave_1 added [ 71.307491] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.316630] team0: Port device team_slave_1 added [ 71.325483] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.340110] team0: Port device team_slave_1 added [ 71.351546] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.364490] team0: Port device team_slave_1 added [ 71.378300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.395273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.414826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.437301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.446275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.455341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.462164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.484631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.501144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.513433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.521662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.530091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.538285] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.545613] team0: Port device team_slave_0 added [ 71.553476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.562182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.570930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 71.578330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.585440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.601326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.621714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.635546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.653944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.661637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.669454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.677170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.686886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.693929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.704317] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 71.711775] team0: Port device team_slave_1 added [ 71.720066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 71.729455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.736955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.758757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.767878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.789475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.809975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.822604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.830714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.838404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.846170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.853564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.861394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.870528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 71.878678] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.886838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.896703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.908167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 71.915495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.923607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.936413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.951923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.960264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 71.967665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.980914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.989153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.996340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.004126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.016435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 72.025505] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 72.033145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.052893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.069909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.082430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.091176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 72.098248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.106677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.120618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.130778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.145393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.155720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.163502] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 72.170586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.179938] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.188995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.196789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.208790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.232459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.249588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.268935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.281869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.289655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.297513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.305246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.312915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.322628] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.329683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.338137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.359666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 72.390078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.411167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.506606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 72.513768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.531546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.486484] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.493070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.499950] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.506331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.520320] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 73.530888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.552618] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.559005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.565696] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.572089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.608769] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 73.617805] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.624192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.630854] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.637238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.644579] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 73.661222] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.667585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.674237] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.680611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.716563] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 73.725568] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.731933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.738593] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.744970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.754963] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 73.762336] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.768729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.775380] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.781758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.788944] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 73.944808] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.951226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.957889] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.964268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.011223] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 74.024857] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.031231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.037885] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.044276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.056487] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 74.592235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.606198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.626164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.637509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.644587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.651973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.659521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.602064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.641165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.671878] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.690237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.745937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.867483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.909259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.047838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.092666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.101876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.131290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.143870] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.247867] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.332615] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.383110] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.480932] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.487139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.497214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.551969] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.558172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.565528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.598986] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.636888] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.653009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.663819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.694373] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.701613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.711645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.755562] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.764832] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.771632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.807248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.831461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.840595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.872563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.881182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.900917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.976425] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.109501] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.187380] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.199569] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.221879] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.230281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.237808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.257568] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.276160] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.446664] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.701810] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.967565] QAT: Invalid ioctl [ 82.987496] QAT: Invalid ioctl [ 83.036480] QAT: Invalid ioctl [ 83.044257] QAT: Invalid ioctl [ 83.058715] QAT: Invalid ioctl [ 83.063496] XFS (loop5): mtpt option not allowed on this system [ 83.098205] QAT: Invalid ioctl [ 83.107228] QAT: Invalid ioctl [ 83.119944] QAT: Invalid ioctl [ 83.126380] mmap: syz-executor1 (6624) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 83.132646] QAT: Invalid ioctl [ 83.153069] XFS (loop5): mtpt option not allowed on this system [ 83.166293] QAT: Invalid ioctl [ 83.170683] QAT: Invalid ioctl [ 83.179091] QAT: Invalid ioctl [ 83.190181] QAT: Invalid ioctl [ 83.204351] QAT: Invalid ioctl [ 83.208347] QAT: Invalid ioctl [ 83.240900] QAT: Invalid ioctl [ 83.261973] QAT: Invalid ioctl [ 83.279214] QAT: Invalid ioctl [ 83.284230] QAT: Invalid ioctl [ 83.292252] QAT: Invalid ioctl [ 83.295949] QAT: Invalid ioctl 2018/05/16 10:12:38 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000340)=[{&(0x7f0000000280)="4d720ce88bad9fdadb28488d03afbb4b6ccda1430db25288d07559f7820083a63a1ab467d1966eb6c16de6ebc0725df89a56628516761715530e03a9da77695854661530a719", 0x46}], 0x1, 0xfffefffffffffffc) 2018/05/16 10:12:38 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000006c0)='ns/mnt\x00') 2018/05/16 10:12:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') 2018/05/16 10:12:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'syz_tun\x00', 'syz_tun\x00', 'veth0_to_team\x00', 'veth0\x00', @link_local={0x1, 0x80, 0xc2}, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) 2018/05/16 10:12:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000601ffff00e5ffffff00000000000000"], 0x14}, 0x1}, 0x0) 2018/05/16 10:12:38 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000016c0)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000005c0)="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", 0x280}], 0x1, &(0x7f0000001640)}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000002840)=""/4096, 0x139f}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xfffffffffffffce7}, 0x0) 2018/05/16 10:12:38 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x200000088) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0x1fe) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x10000000, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x100000001}, 0xf) r1 = socket$inet6(0xa, 0x3, 0x3a) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000000c0)={0x0, 0x3617}) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x8, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x9}, {0xa, 0x4e22, 0x800, @mcast1={0xff, 0x1, [], 0x1}, 0x5dfb}, 0x5, [0x400, 0x3, 0x3, 0x9, 0x8000, 0xdb4, 0x7, 0x3]}, 0x5c) [ 83.319136] QAT: Invalid ioctl [ 83.333970] QAT: Invalid ioctl [ 83.340581] QAT: Invalid ioctl [ 83.345389] QAT: Invalid ioctl 2018/05/16 10:12:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='reno\x00', 0x5) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00000001c0)="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", 0x345, 0x0, &(0x7f00000011c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/05/16 10:12:38 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 83.402501] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'broute' 2018/05/16 10:12:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000003940)=[{{&(0x7f0000000080)=@sco={0x1f}, 0x80, &(0x7f00000033c0), 0x0, &(0x7f0000003440)}}, {{&(0x7f0000000100)=@l2={0x1f}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}], 0x2, 0x0) 2018/05/16 10:12:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) poll(&(0x7f0000000140)=[{r1, 0x600}], 0x1, 0x0) readv(r0, &(0x7f0000002180)=[{&(0x7f00000020c0)=""/159, 0x9f}], 0x1) 2018/05/16 10:12:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') 2018/05/16 10:12:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:38 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs_stats\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 2018/05/16 10:12:39 executing program 0: r0 = memfd_create(&(0x7f000088f000)='\x00\x00\x00', 0x4) ftruncate(r0, 0x1000000) ftruncate(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0x401, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x10}}, 0x184c, 0x2, 0x7, "2418b828d1f53d1b8dc95fe07c9cf66705134594bf075041a2ab8ca714b1683c7790f68ca131d4b163008ad03e1a4639b69df7d061f1dfb894181ef1bbc1f9f568075f7040c170c5333adce5a29b8b53"}, 0xfffffc93) 2018/05/16 10:12:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 2018/05/16 10:12:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') 2018/05/16 10:12:39 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bpq0\x00', 0x103}) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") recvfrom$ax25(r1, &(0x7f0000000140)=""/241, 0xf1, 0x10000, &(0x7f0000000000)={0x3, {"629609c8b47c39"}, 0x8}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$TUNGETIFF(r0, 0x8927, &(0x7f0000000280)) 2018/05/16 10:12:39 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000007d2200001800000003030000000000000000000000000000000000001600000003000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}, 0x1}, 0x0) 2018/05/16 10:12:39 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x7, &(0x7f0000000100), 0x4) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="03681abcfedef8b5d4ec03000000000000000008000000"], 0x14}, 0x1}, 0x0) 2018/05/16 10:12:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x25dfdbfc, [@sadb_address={0x3, 0x6, 0x0, 0xa0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x28}, 0x1}, 0x0) 2018/05/16 10:12:39 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x100000000}}, 0x2, 0xffffffffffffffff, 0x5, 0x800, 0x5}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0x6, 0xc5, 0x0, 0x63, 0x7}, 0x14) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x288, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x300) 2018/05/16 10:12:39 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") fanotify_init(0x14, 0x3) 2018/05/16 10:12:39 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) getgroups(0x5, &(0x7f0000000100)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r2, r3) unshare(0x400) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) r4 = semget(0x2, 0x2, 0x200) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000300)={0x1, r0}) semop(r4, &(0x7f0000000000)=[{0x7, 0x80, 0x1000}, {0x1, 0x4, 0x1000}, {0x3, 0x5, 0x1800}, {0x4, 0x3, 0x1000}, {0x1, 0x1125, 0x1000}, {0x1, 0x9, 0x1000}, {0x2, 0x1, 0x1000}], 0x7) 2018/05/16 10:12:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = gettid() tgkill(0x0, r1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='task\x00') ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 2018/05/16 10:12:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') 2018/05/16 10:12:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x80800) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) getsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 84.649439] kernel msg: ebtables bug: please report to author: entries_size too small 2018/05/16 10:12:40 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bf0000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) accept$ax25(r1, &(0x7f0000000040), &(0x7f0000000080)=0x10) mmap(&(0x7f0000bf0000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 2018/05/16 10:12:40 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) [ 84.720369] kernel msg: ebtables bug: please report to author: entries_size too small 2018/05/16 10:12:40 executing program 3: r0 = timerfd_create(0xfffffffffffffffe, 0x7fff8) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff01}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80c02, 0x0) 2018/05/16 10:12:40 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) r2 = socket(0x2, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = msgget(0x0, 0x10) msgrcv(r3, &(0x7f0000000040)={0x0, ""/197}, 0xcd, 0x1, 0x1000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(r0, 0x10000) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000180)={0x7, 0xf0cc}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) dup3(r1, r0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000001c0)={0x63, @empty, 0x4e20, 0x3, 'lblcr\x00', 0x1, 0x8, 0x22}, 0x2c) 2018/05/16 10:12:40 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002640)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x28002) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)="6664696e666f00c8a4c8bb765af325021bd6f5ac360f132e7d15c806b9064b5e4f62901e90a879102d3e3fb1e4ccac3570ee38670c6d3b743d1eba885655d444d7932ea6d9922348cd313954fbb2f2787d0197f177f505888473c217679ef86ad664e696f15b800f9ecbeb6064adc87e3c8aef34122afd789614b925624441aa776eed6d4d9977c5733981fe5526") getdents(r2, &(0x7f0000001380)=""/182, 0x20001436) 2018/05/16 10:12:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000000c0)={0x0, {{0xa, 0x4e24, 0x45f4cc14, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}}, 0x88) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000000000000000000000bbd500200000000079d440e96bee4cd6d7eff1afbb952f85681699fc3ec9b16c7f09538df50f9cc2dab05b766888b11450b06c0bcea21a5420ecffc7d32e9bec10d7179c0c20424a75b373ef6c6f06916bdb605ceddfaa59d2d7445d7d0006d4ff368135621d2037dab6d69d5d1547699a6a220748443d8025eb428d3c0bec8ec973266dabc0513d66ef80aa76ed487725a663d4a55f86"], 0x14}, 0x1}, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000340)) ioctl$KDSETLED(r1, 0x4b32, 0x1ff) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000240)={0x2, 0x10000}) socket$packet(0x11, 0x3, 0x300) 2018/05/16 10:12:40 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000140)={{0x3ff, 0xfffffffffffff00f, 0x8, 0x0, 0x5}, 0x800}) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req={0xfff, 0x0, 0x6}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) 2018/05/16 10:12:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)="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", 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000000000000010) unshare(0x400) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="4091e5d03b65795a12625e16c38c9c888fd95a924127a35ce64f60739b19fb17a49a3ed96217d43c13196db4a2b4e931b7f521d2955e93dbf9f1d41dff4eb7e81260067bfe4377dd122746dea9a0f1b6b72a36b1faa731da54f8de0bb4b96c59b766", 0x62, 0x2}], 0x89022, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f696e746567726974792c6e6f690d7be83c6e08526e746567726974792c00"]) socket$unix(0x1, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={r0, 0x3, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) 2018/05/16 10:12:40 executing program 3: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x1, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x80000000) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$cgroup_subtree(r2, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) sendto$inet(r1, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) r4 = shmget(0x1, 0x4000, 0x7c000012, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000280)=""/72) 2018/05/16 10:12:40 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x20000) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f00000000c0)={0x1, 0x0, [{}]}) setsockopt$inet6_tcp_int(r0, 0x6, 0x3000000000000022, &(0x7f0000356000)=0x1, 0x4) r2 = socket(0x400011, 0x80008, 0x3fc) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") sendto$inet6(r0, &(0x7f0000000080), 0x50000, 0x200418cf, &(0x7f0000ae3000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x3}, 0x1c) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x1, [0x1000]}, 0x6) perf_event_open$cgroup(&(0x7f0000000100)={0x7, 0x70, 0x6, 0x0, 0x800, 0x1, 0x0, 0x9, 0xa00, 0x4, 0x7f, 0x97, 0x1ff, 0x10000, 0x1, 0x0, 0x101, 0x0, 0xfffffffffffffff9, 0x4, 0x873, 0x6cd1, 0x81, 0x2, 0x3f, 0x3, 0x70da, 0x2958, 0x2, 0x69e, 0xa64, 0x400, 0x7, 0x208, 0x2, 0x7, 0x2, 0x2, 0x0, 0x100, 0x1, @perf_config_ext={0x7, 0x4}, 0x20000, 0x9, 0x9, 0x3, 0x0, 0x100000001, 0x1}, r1, 0xc, r1, 0x1) 2018/05/16 10:12:40 executing program 6: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x50, &(0x7f0000000300)={0x0, 0x0}}, 0x7d861bc3122746a7) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=r0, 0x4) fchmod(r1, 0x120) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000028c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(anubis)\x00'}, 0x58) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x100, 0x0) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000014c0)=""/75) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x100) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000080)=0x100000000, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) ioctl$sock_inet_sctp_SIOCINQ(r4, 0x541b, &(0x7f0000000200)) r5 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001480)="f5", 0x1}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f0000000240)={r6, 0x40}) recvmsg(r5, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/05/16 10:12:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000140)="f414b2b1feb77f786faf244a80afabfd5f7947a1911271ab520a066c3185450490fd0cb10cd53a7f9a1238ce8ca5a1e22b998c0679b2bfae200923d29e408ee3a7eea9db89467e397f9701a19babde6d8e6b17716a520d4fdb4d5cd9baf098bbc5555d5d775b1defe84b146baf9aeaf1fe837e9ef68a7ebcefeff4fedb29eab303b8fc", 0x83}, {&(0x7f0000000280)="5f532f85d4c6d517db3255903812d2f67ed0e6fb8e1f828fdfe267335bf368e62960f13fd99d0d25f06f872ecf53f59fd87ad56d81ff7de207323e07eb5f378e664d9ba7a8346af05df8c0fb8e4ae13a90613a5924a2764a1ea439240704bcba7650916b7983e79168497245c3ec9fb7", 0x70}], 0x2, 0x8) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3ff, 0x10002) r3 = getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) setpgid(r3, r4) ioctl$TIOCSCTTY(r2, 0x540e, 0xfffffffffffffffd) getsockname(r1, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) 2018/05/16 10:12:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000003c0)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000140)={[], 0x3}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8800, 0x0) name_to_handle_at(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x98, 0x7, "2a1fbd04ed71aeb42b4c3c0e6eb243d67a59cf8fb35c4d3a50380db5d91d31b7d3a9a0197c78bb2b0cb867db5539f1650e553b5ed3ac76bc90d7495db2c6e16d99035c8bc64facdd857d36cb59b0b1306e84015950c73893d18a54b7eb57eae5f0a4e23d71785016e19689f355a264bd713af3dae4637f41e9969ded5744fc0adbd039b25cca1ed8cd327b21cc25e276"}, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000640)) 2018/05/16 10:12:40 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) msgrcv(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa9, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000500)=ANY=[@ANYRES16], 0x1, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) 2018/05/16 10:12:40 executing program 3: socketpair$inet(0x2, 0x1, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1, 0xffffffff}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000140)) 2018/05/16 10:12:40 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x20000000017, &(0x7f0000000080), &(0x7f0000000000)=0x4) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) 2018/05/16 10:12:40 executing program 2: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000629000)={0xfffffffffffffffa}, 0x0, 0x8) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xc2e8, 0x240) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r4, 0x200, 0x70bd25, 0x25dfdbfe, {0xf}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x810) rt_tgsigqueueinfo(r0, r1, 0x20, &(0x7f0000000040)) r5 = epoll_create1(0x0) epoll_pwait(r5, &(0x7f0000000180)=[{}], 0x1, 0xff, &(0x7f0000000000), 0x8) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000740)=@broute={'broute\x00', 0x20, 0x3, 0x530, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x32, 0x886c, 'syzkaller0\x00', 'ip6_vti0\x00', 'bridge0\x00', 'teql0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0xff, 0xff], 0xf0, 0x138, 0x188, [@helper={'helper\x00', 0x28, {{0x0, 'sip-20000\x00'}}}, @pkttype={'pkttype\x00', 0x8, {{0x1, 0x1}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"4918090304e5d7548ccfb6995de486c02b9cc909bf89a8fdb3c6d81f4703"}}]}, @common=@log={'log\x00', 0x28, {{0x7ff, "8ad6f766b7f145111b36ce0f4712a4df4c9885c916d79eb51e4769bb9d5b", 0x4}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0xb, 0x20, 0x60, 'erspan0\x00', 'syzkaller1\x00', 'syzkaller1\x00', 'bcsf0\x00', @random="175bb5b0f50e", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x8fff, 'system_u:object_r:random_device_t:s0\x00'}}}}, {{{0x5, 0x60, 0x8914, 'bond_slave_0\x00', 'ifb0\x00', 'bcsh0\x00', 'ip6tnl0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0xff, 0x0, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0xff, 0x0, 0xff], 0xb0, 0x118, 0x148, [@time={'time\x00', 0x18, {{0x217e, 0x2, 0x12f00, 0xe62, 0x493, 0x2, 0x3}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x10001}}}]}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}]}, 0x5a8) [ 85.821597] IPVS: set_ctl: invalid protocol: 99 0.0.0.0:20000 lblcr 2018/05/16 10:12:41 executing program 6: getxattr(&(0x7f0000000000)='./.ile0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6f61782e7759616e1000"], &(0x7f0000000080)=""/85, 0x55) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x20900, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0x7, 0x440) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000640)={0x2, r1}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1, 0x50000) unlinkat(r2, &(0x7f0000000300)='./.ile0\x00', 0x200) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x9, 0x80) setsockopt$inet_udp_int(r3, 0x11, 0x64, &(0x7f00000002c0)=0x400, 0xfffffffffffffee0) lsetxattr(&(0x7f0000000180)='./.ile0\x00', &(0x7f00000001c0)=@known='security.selinux\x00', &(0x7f0000000200)='\x00', 0x1, 0x2) r4 = msgget$private(0x0, 0x64) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000480)={{0x2, 0x1ff}, {0x3, 0x265a}, 0x8, 0x4, 0x6}) socket$l2tp(0x18, 0x1, 0x1) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000280)=[0x3]) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}, 0x5, 0xff, 0x80000001, 0xffffffffffff32ce, 0x2}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000440)={r5, 0x6c5}, 0x8) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000240)) stat(&(0x7f0000000500)='./.ile0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r6) 2018/05/16 10:12:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl(r0, 0x2, &(0x7f00000000c0)="643c8fffeab10948eae3d05558703679e8b9aa9f502d55d38f0a9167557ea34c9a7d2b172ac677e9d7616da7076634e64d0945138adb26a0d22b8cbf6ce65aa102018230e461a00567bdb03fedbd8876a830fa3d59d82a1d1e23f338b8f6596a8972a02c4312f69581975bc669734ce8a50cceaef75250d7ae57edb38c000bd67e417c3445df391eeaf6d5a5ffe1a227f4440995f432771edec777ffd57cac60d02e61f208da03f83ef33c70b4ebef6d8eff56ac80ffcb5c780b979215") setsockopt$packet_fanout(r0, 0x107, 0xc, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x7fffffff, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000015c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f0000001580)={&(0x7f0000000280)={0x12fc, 0xd, 0x4, 0x2, 0x70bd28, 0x25dfdbfe, {0x0, 0x0, 0x1}, [@typed={0xc, 0x59, @u64=0x6}, @typed={0xb8, 0x4c, @binary="6375c7f3375e4a670cf85499142108d9de6a2440779c35f899f76c877df2eb586264faaf790ab328a87e5c017d3580fae2b70bad8ce8ad4c90b374da46e0aee56774059e3fe5a20bddbf505f06979a6e1f94b88845fb81fc33da55cbffd68dfdad8fb315378a873ce7811f658428ac7a9b9be3fb4c5e279f504aed9292d32dbfe60c89b3a423a0418046484981ea491a487db1040482ec644620873eda22444640f379e86a29b82c1095d062a5b532bb066210"}, @nested={0x1224, 0x78, [@typed={0x8, 0x81, @pid=r2}, @typed={0x8, 0x23, @ipv4=@rand_addr=0x6}, @typed={0x8, 0x67, @fd=r0}, @typed={0xb8, 0x47, @binary="57c39183cdc26b652a42d9f6579f9036294ecef8e1d3e4f6c7790db3ed10b11eb80df48114534a279b591e3886059de116a8a32e34f5e24b9d2c26f0652f076cb6273e0d1bb86430e9a56cc3708bc04d01a8a594e8189e0a7ae90af5f004d93091b72d5258d6f49755d885c679fbff57c5ef42ae9e49f09b7a2548ce5781e3299c05e785f021bd3ff0bc23358b64790e04d21a6ec66fbbb9448141534c6fc27634cdc54ec93af292e029b728764286dac2743766"}, @generic="bc7946cfcf92286a1e353adbc18ad4aed39d0514b5a19e119c088293b4b9fe1468fa288adc6c75a0d2f5929abdbc0e53b6bde30293071aeb92cca734", @typed={0x8, 0x48, @pid=r3}, @generic="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", @typed={0x4, 0x8e}, @generic="89d6441016a0a9f197a43aa17db35c7fbf4d98bcfd7ae68fbfc1fda0ab316b7ca23c054c848f7897920a0731bcbd39d4a58ddcebb64bd88ca32ec8fb5faca1d8ef06748e391176e2735f66bcea32cc1f78e7a6ccde59d0a1a34f80ddeafd6811f11ac7b25f004c4d2f847d14b8fa038bfdbc69b9a207b84f0c6ed184137ac7b78377bb0a343d1a9f2c94ddf81b374b8edacef798e49a6771bd4fdcbc3b5e8ee4dd1b38054fd5a72da92fdf", @generic="97ef5dad06c2c5a5f27139cc2d087660199063ba8e44bbbd41ee738f0114a5251155894374f15d1c476955dc09bcaf36bcea9f1d00fd14cc8ec774d506f487808315c26d68abc42000678c18d6653894f1e11fcb304a94674e581272d1"]}]}, 0x12fc}, 0x1, 0x0, 0x0, 0x40}, 0x40) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000080)={0x8800}, 0x4) 2018/05/16 10:12:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000008c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000880)={0xffffffff}, 0x106}}, 0x20) write$rdma_cm(r0, &(0x7f0000004100)=@set_option={0xe, 0x0, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x1e) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3ff, 0x100) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x3, 0x1, [0x400]}, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x200, 0x6, 0x2, r3}, &(0x7f0000000140)=0x10) 2018/05/16 10:12:41 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) r2 = socket(0x2, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = msgget(0x0, 0x10) msgrcv(r3, &(0x7f0000000040)={0x0, ""/197}, 0xcd, 0x1, 0x1000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(r0, 0x10000) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000180)={0x7, 0xf0cc}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) dup3(r1, r0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000001c0)={0x63, @empty, 0x4e20, 0x3, 'lblcr\x00', 0x1, 0x8, 0x22}, 0x2c) 2018/05/16 10:12:41 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000140)={{0x3ff, 0xfffffffffffff00f, 0x8, 0x0, 0x5}, 0x800}) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req={0xfff, 0x0, 0x6}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) 2018/05/16 10:12:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0xff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000f6bff4)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x84002) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/153) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000040)=""/143, &(0x7f0000000100)=0x8f) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) r3 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x3ffc000000}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000280)={r4, 0x2}, 0x8) 2018/05/16 10:12:41 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2000, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000140)=0xbea) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) getrusage(0x1, &(0x7f0000000000)) prctl$getreaper(0x2, &(0x7f00000000c0)) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000180)=0xc3a, &(0x7f00000001c0)=0x4) [ 85.871539] IPVS: set_ctl: invalid protocol: 99 0.0.0.0:20000 lblcr 2018/05/16 10:12:41 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:41 executing program 2: socketpair(0xf, 0x3, 0x0, &(0x7f0000000000)) mbind(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x1, &(0x7f0000000040), 0x10001, 0x2) 2018/05/16 10:12:41 executing program 3: r0 = fanotify_init(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) fanotify_mark(r0, 0x11, 0x20, 0xffffffffffffffff, &(0x7f0000000040)='/\x00') setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0x2, 0x4) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000180)='./file1\x00', 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 2018/05/16 10:12:41 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000140)={{0x3ff, 0xfffffffffffff00f, 0x8, 0x0, 0x5}, 0x800}) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req={0xfff, 0x0, 0x6}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) 2018/05/16 10:12:41 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") munmap(&(0x7f0000000000/0x3000)=nil, 0x3000) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0x2002) r2 = msgget$private(0x0, 0x23) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000380)=""/93) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)="6339d144dd51edf6c307f400") shmat(0x0, &(0x7f0000000000/0x2000)=nil, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x101000) r4 = dup(r3) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000200)={0x7, 0xc, [0x3, 0x5, 0x3ff]}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x6) r5 = accept4$ax25(r3, &(0x7f0000000000), &(0x7f00000001c0)=0x10, 0x80000) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xfffffffffffffcde) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) setuid(r7) 2018/05/16 10:12:41 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) r2 = getpgid(0xffffffffffffffff) kcmp(0x0, r2, 0x2, r0, r0) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, &(0x7f0000000080), 0x80000, &(0x7f00000000c0)={[{@balloc_border='block-allocator=border', 0x2c}, {@balloc_hashed_reloc='block-allocator=hashed_relocation', 0x2c}, {@grpjquota='grpjquota', 0x2c}, {@jdev={'jdev', 0x3d, './file0'}, 0x2c}, {@resize_auto='resize=auto', 0x2c}, {@user_xattr='user_xattr', 0x2c}, {@balloc_notest4='block-allocator=notest4', 0x2c}, {@replayonly='replayonly', 0x2c}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) setuid(r3) 2018/05/16 10:12:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000000)=0x8) bind$unix(r1, &(0x7f000094cff4)=@file={0x1, "e91f7189591e9233614b00"}, 0x2) 2018/05/16 10:12:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") creat(&(0x7f0000000140)='./file0/file.\x00', 0x111) creat(&(0x7f0000000000)='./file0/file.\x00', 0x0) 2018/05/16 10:12:41 executing program 3: r0 = socket(0xe, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$netrom(r0, &(0x7f0000000000)=@ax25={0x3, {"43d1b4f3cb8539"}, 0x800}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x22) setsockopt$inet6_dccp_buf(r0, 0x21, 0xcd, &(0x7f0000000040)="d52299f9a888ccf1ce174166d7da1d30d16d0c619797ac4424c39524f4a7cc9d756acc4b7e8ee615575f7d6180d2d4383172706005292dc37b584bf561eb33c503c35535d5aaeef934fbd3efde35e4d8f40a42916b8b078902f71383dfad3471084d0632bf8d5de174731a3035064dedab9fd3751edf9e8b046e8cbcc9fa73586255d45af61bfb0724751f64a9b7e592e848582218b4f27fcda1263ad6f164b04581673eb55f46a3be3060f38ea601e08218589b24", 0xb5) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0xc40, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x7fff, 0xfffffffffffffffb, 0x9, 0x1ff]}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000791000000000000000000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 86.770440] IPVS: set_ctl: invalid protocol: 99 0.0.0.0:20000 lblcr 2018/05/16 10:12:42 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"ff030f00d34892babf7b806e000200", 0x4016}) 2018/05/16 10:12:42 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x8847, 0x8, @loopback={0x0, 0x1}}, 0x1c) socket$bt_cmtp(0x1f, 0x3, 0x5) 2018/05/16 10:12:42 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) rt_sigreturn() connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) ioctl$PPPIOCSMRU(r0, 0x4008b100, &(0x7f00000000c0)) 2018/05/16 10:12:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r1, r0) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000000000275f9989de906a8f4c000000000000000000a13b35f1265798180ea8e796e73f253df21eb39bccb2070981b981e5832047b878ccd32393e424649dae4f12108d4e2d2286e8ec1f06717677c7e23c37599ff6210b0fef05000000000000007d0000000000000000000000000000"], 0x14}, 0x1}, 0x4008010) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000080)) 2018/05/16 10:12:42 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0xc1b2, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001700)={0x0, @loopback, @multicast1}, &(0x7f0000001740)=0xc) sendmsg$can_raw(r1, &(0x7f00000018c0)={&(0x7f0000001780)={0x1d, r2}, 0x10, &(0x7f0000001880)={&(0x7f0000001840)=@can={{0x5, 0x3, 0x7, 0x7}, 0x5, 0x1, 0x0, 0x0, "d402ac8563b5a1f9"}, 0x10}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) sendmmsg(r0, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000280)}}, {{&(0x7f00000002c0)=@nl=@proc={0x10, 0x0, 0x0, 0x1010400}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}}], 0x2, 0x0) 2018/05/16 10:12:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="2224f8a3808477a7194372769b2da9fc54e4ed40406f542aa8a1c9e182657053ef47376ca1515c43fefae219c52235e28f58f4a5da0eb9d2d39556de8994f2dfb0f7c284a1c3e46226b9da7e2d436b5b0f1cf037f2118b273a6b83e03c0427ec0ee27542b123d4772a2e9f2689cd59be46ac32579250f3d30d90f6965d451f3bc7b34ad00d2c190dd7a279c595ff28f14f", 0x91, 0xfffffffffffffffb) syz_open_dev$binder(&(0x7f00000004c0)='/dev/binder#\x00', 0x0, 0x800) r3 = fcntl$getown(r0, 0x9) getpgrp(r3) r4 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)="11d518f169359e508c40075cfa9bc7afc0d921de24d6dafbb4525c7ec0579f6331e7351f91adfcb1b90ceeccad56cce1b09512d8aa8e1e6a5c2a78bc72d512eb48e7621df7919c84e2ff072be5c8882f9b96be450249d2c711fe52c750ea96a1e74ce0bdb6baa14cd4b7ef1ed6ad3a95d4b49083ab0a866eba9d221fab0c35f60287a47b9e22e3c844d9d6d02e6f1010", 0x90, 0xfffffffffffffffa) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x40000, 0x0) openat$cgroup(r5, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) keyctl$unlink(0x9, r2, r4) keyctl$unlink(0x9, r2, r4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000440)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, @in6={0xa, 0x4e20, 0x1f, @mcast1={0xff, 0x1, [], 0x1}, 0x1ff}, @in6={0xa, 0x4e24, 0x255, @mcast2={0xff, 0x2, [], 0x1}, 0x7e8d}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}], 0x58) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f00000000c0)="2e36650f32b83f000f00d8f2f30f01c80fc71c0f605707ba420066ed0f01cb660f3835b600800f07bad104b80000ef", 0x2f}], 0x1, 0xa, &(0x7f0000000440), 0x0) ioctl$TCSETA(r5, 0x5406, &(0x7f0000000000)={0x0, 0xb657, 0x10000, 0x9, 0x4, 0x6, 0x401, 0x1, 0x1000, 0x2}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 2018/05/16 10:12:42 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$int_out(r0, 0x40044102, &(0x7f0000000040)) connect(r0, &(0x7f0000000080)=@ax25={0x3, {"662189ad40300a"}, 0x8}, 0x80) 2018/05/16 10:12:42 executing program 7: r0 = add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000400)='V', 0x1, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x100) r1 = socket(0x40000000015, 0x5, 0x0) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000440)=""/4096, &(0x7f0000000080)=0x1000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r3) keyctl$setperm(0x11, r0, 0x0) [ 86.930868] protocol 8847 is buggy, dev sit0 [ 86.935560] ================================================================== [ 86.943022] BUG: KASAN: use-after-free in iptunnel_handle_offloads+0x62b/0x710 [ 86.945168] Unknown ioctl 44609 [ 86.950386] Read of size 2 at addr ffff8801ae59a904 by task syz-executor6/6964 [ 86.950392] [ 86.950409] CPU: 0 PID: 6964 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #53 [ 86.950418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.950423] Call Trace: [ 86.950450] dump_stack+0x1b9/0x294 [ 86.985324] ? dump_stack_print_info.cold.2+0x52/0x52 [ 86.990501] ? printk+0x9e/0xba [ 86.993766] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 86.998507] ? kasan_check_write+0x14/0x20 [ 87.002726] print_address_description+0x6c/0x20b [ 87.007555] ? iptunnel_handle_offloads+0x62b/0x710 [ 87.012559] kasan_report.cold.7+0x242/0x2fe [ 87.016957] __asan_report_load2_noabort+0x14/0x20 [ 87.021877] iptunnel_handle_offloads+0x62b/0x710 [ 87.026706] ? iptunnel_metadata_reply+0x380/0x380 [ 87.031622] ? graph_lock+0x170/0x170 [ 87.035410] ? packet_cached_dev_get+0x330/0x330 [ 87.040150] sit_tunnel_xmit__+0x2a/0x160 [ 87.044285] sit_tunnel_xmit+0x1275/0x30b0 [ 87.048503] ? find_held_lock+0x36/0x1c0 [ 87.052555] ? ipip6_rcv+0x1d30/0x1d30 [ 87.056427] ? lock_downgrade+0x8e0/0x8e0 [ 87.060557] ? vprintk_default+0x28/0x30 [ 87.064601] ? vprintk_func+0x81/0xe7 [ 87.068388] ? kasan_check_read+0x11/0x20 [ 87.072524] ? rcu_is_watching+0x85/0x140 [ 87.076656] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 87.081393] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 87.086567] ? graph_lock+0x170/0x170 [ 87.090355] ? dev_queue_xmit_nit+0x8ec/0xb90 [ 87.094839] ? __lock_is_held+0xb5/0x140 [ 87.098888] dev_hard_start_xmit+0x264/0xc10 [ 87.103284] ? validate_xmit_skb_list+0x120/0x120 [ 87.108113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.113633] ? netif_skb_features+0x696/0xb40 [ 87.118113] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 87.123294] ? validate_xmit_xfrm+0x1ef/0xdc0 [ 87.127772] ? lock_acquire+0x1dc/0x520 [ 87.131733] ? validate_xmit_skb+0x704/0xd90 [ 87.136127] ? netif_skb_features+0xb40/0xb40 [ 87.140614] __dev_queue_xmit+0x2724/0x34c0 [ 87.144940] ? netdev_pick_tx+0x2d0/0x2d0 [ 87.149076] ? debug_check_no_locks_freed+0x310/0x310 [ 87.154253] ? graph_lock+0x170/0x170 [ 87.158038] ? print_usage_bug+0xc0/0xc0 [ 87.162084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.167605] ? refcount_add_not_zero+0x216/0x320 [ 87.172345] ? refcount_dec_if_one+0x170/0x170 [ 87.176923] ? alloc_skb_with_frags+0x4fe/0x760 [ 87.181583] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.187103] ? refcount_add+0x2f/0x70 [ 87.190886] ? skb_set_owner_w+0x24e/0x360 [ 87.195108] ? sock_alloc_send_pskb+0x7d1/0xae0 [ 87.199774] ? lock_downgrade+0x8e0/0x8e0 [ 87.203908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.209427] ? cap_capable+0x1f9/0x260 [ 87.213306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.218825] ? security_capable+0x99/0xc0 [ 87.222970] dev_queue_xmit+0x17/0x20 [ 87.226754] ? dev_queue_xmit+0x17/0x20 [ 87.230711] packet_sendmsg+0x40f8/0x6070 [ 87.234845] ? debug_check_no_locks_freed+0x310/0x310 [ 87.240024] ? futex_wait_setup+0x400/0x400 [ 87.244331] ? find_held_lock+0x36/0x1c0 [ 87.248385] ? packet_getname+0x5f0/0x5f0 [ 87.252515] ? rcu_is_watching+0x85/0x140 [ 87.256646] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 87.261824] ? graph_lock+0x170/0x170 [ 87.265614] ? expand_files.part.8+0x9a0/0x9a0 [ 87.270184] ? find_held_lock+0x36/0x1c0 [ 87.274240] ? lock_downgrade+0x8e0/0x8e0 [ 87.278371] ? lock_release+0xa10/0xa10 [ 87.282330] ? check_same_owner+0x320/0x320 [ 87.286639] ? __check_object_size+0x95/0x5d9 [ 87.291127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 87.296648] ? security_socket_sendmsg+0x94/0xc0 [ 87.301386] ? packet_getname+0x5f0/0x5f0 [ 87.305522] sock_sendmsg+0xd5/0x120 [ 87.309220] __sys_sendto+0x3d7/0x670 [ 87.313015] ? __ia32_sys_getpeername+0xb0/0xb0 [ 87.317672] ? __fd_install+0x2de/0x880 [ 87.321632] ? get_unused_fd_flags+0x190/0x190 [ 87.326199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.331718] ? alloc_file+0x44/0x3e0 [ 87.335430] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 87.340950] ? sock_alloc_file+0x2a4/0x4e0 [ 87.345182] ? __alloc_fd+0x700/0x700 [ 87.348970] ? __x64_sys_futex+0x477/0x680 [ 87.353191] ? fd_install+0x4d/0x60 [ 87.356801] ? do_futex+0x27d0/0x27d0 [ 87.360587] ? move_addr_to_kernel+0x70/0x70 [ 87.364982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.370517] ? fput+0x130/0x1a0 [ 87.373784] __x64_sys_sendto+0xe1/0x1a0 [ 87.377829] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 87.382830] do_syscall_64+0x1b1/0x800 [ 87.386701] ? finish_task_switch+0x1ca/0x840 [ 87.391180] ? syscall_return_slowpath+0x5c0/0x5c0 [ 87.396096] ? syscall_return_slowpath+0x30f/0x5c0 [ 87.401014] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 87.406370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 87.411254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.416423] RIP: 0033:0x455a09 [ 87.419856] RSP: 002b:00007fe6f4885c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 87.427548] RAX: ffffffffffffffda RBX: 00007fe6f48866d4 RCX: 0000000000455a09 [ 87.434799] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000014 [ 87.442049] RBP: 000000000072bea0 R08: 0000000020000100 R09: 000000000000001c [ 87.449299] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 87.456549] R13: 00000000000005ac R14: 00000000006fc8c0 R15: 0000000000000000 [ 87.463809] [ 87.465418] Allocated by task 6964: [ 87.469033] save_stack+0x43/0xd0 [ 87.472469] kasan_kmalloc+0xc4/0xe0 [ 87.476165] __kmalloc_node_track_caller+0x47/0x70 [ 87.481078] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 87.485818] __alloc_skb+0x14d/0x780 [ 87.489515] alloc_skb_with_frags+0x137/0x760 [ 87.493990] sock_alloc_send_pskb+0x87a/0xae0 [ 87.498469] packet_sendmsg+0x1b98/0x6070 [ 87.502601] sock_sendmsg+0xd5/0x120 [ 87.506297] __sys_sendto+0x3d7/0x670 [ 87.510081] __x64_sys_sendto+0xe1/0x1a0 [ 87.514123] do_syscall_64+0x1b1/0x800 [ 87.517995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.523164] [ 87.524770] Freed by task 6964: [ 87.528034] save_stack+0x43/0xd0 [ 87.531470] __kasan_slab_free+0x11a/0x170 [ 87.535688] kasan_slab_free+0xe/0x10 [ 87.539470] kfree+0xd9/0x260 [ 87.542557] skb_free_head+0x99/0xc0 [ 87.546254] skb_release_data+0x690/0x860 [ 87.550382] skb_release_all+0x4a/0x60 [ 87.554253] consume_skb+0x18b/0x550 [ 87.557948] packet_rcv+0x16a/0x1810 [ 87.561647] dev_queue_xmit_nit+0x891/0xb90 [ 87.565950] dev_hard_start_xmit+0x16b/0xc10 [ 87.570341] __dev_queue_xmit+0x2724/0x34c0 [ 87.574642] dev_queue_xmit+0x17/0x20 [ 87.578422] packet_sendmsg+0x40f8/0x6070 [ 87.582552] sock_sendmsg+0xd5/0x120 [ 87.586249] __sys_sendto+0x3d7/0x670 [ 87.590034] __x64_sys_sendto+0xe1/0x1a0 [ 87.594077] do_syscall_64+0x1b1/0x800 [ 87.597954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.603118] [ 87.604733] The buggy address belongs to the object at ffff8801ae59a840 [ 87.604733] which belongs to the cache kmalloc-512 of size 512 [ 87.617375] The buggy address is located 196 bytes inside of [ 87.617375] 512-byte region [ffff8801ae59a840, ffff8801ae59aa40) [ 87.629233] The buggy address belongs to the page: [ 87.634143] page:ffffea0006b96680 count:1 mapcount:0 mapping:ffff8801ae59a0c0 index:0x0 [ 87.642268] flags: 0x2fffc0000000100(slab) [ 87.646487] raw: 02fffc0000000100 ffff8801ae59a0c0 0000000000000000 0000000100000006 [ 87.654354] raw: ffffea0006a62220 ffffea0006c47be0 ffff8801da800940 0000000000000000 [ 87.662217] page dumped because: kasan: bad access detected [ 87.667902] [ 87.669507] Memory state around the buggy address: [ 87.674417] ffff8801ae59a800: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 87.681756] ffff8801ae59a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.689095] >ffff8801ae59a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.696429] ^ [ 87.699774] ffff8801ae59a980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.707113] ffff8801ae59aa00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 87.714448] ================================================================== [ 87.721784] Disabling lock debugging due to kernel taint [ 87.727271] Kernel panic - not syncing: panic_on_warn set ... [ 87.727271] [ 87.734627] CPU: 0 PID: 6964 Comm: syz-executor6 Tainted: G B 4.17.0-rc5+ #53 [ 87.743182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.752515] Call Trace: [ 87.755089] dump_stack+0x1b9/0x294 [ 87.758713] ? dump_stack_print_info.cold.2+0x52/0x52 [ 87.763884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.768710] ? iptunnel_handle_offloads+0x540/0x710 [ 87.773709] panic+0x22f/0x4de [ 87.776882] ? add_taint.cold.5+0x16/0x16 [ 87.781020] ? do_raw_spin_unlock+0x9e/0x2e0 [ 87.785412] ? do_raw_spin_unlock+0x9e/0x2e0 [ 87.789808] ? iptunnel_handle_offloads+0x62b/0x710 [ 87.794806] kasan_end_report+0x47/0x4f [ 87.798760] kasan_report.cold.7+0x76/0x2fe [ 87.803067] __asan_report_load2_noabort+0x14/0x20 [ 87.807979] iptunnel_handle_offloads+0x62b/0x710 [ 87.812804] ? iptunnel_metadata_reply+0x380/0x380 [ 87.817725] ? graph_lock+0x170/0x170 [ 87.821507] ? packet_cached_dev_get+0x330/0x330 [ 87.826255] sit_tunnel_xmit__+0x2a/0x160 [ 87.830384] sit_tunnel_xmit+0x1275/0x30b0 [ 87.834599] ? find_held_lock+0x36/0x1c0 [ 87.838645] ? ipip6_rcv+0x1d30/0x1d30 [ 87.842513] ? lock_downgrade+0x8e0/0x8e0 [ 87.846641] ? vprintk_default+0x28/0x30 [ 87.850683] ? vprintk_func+0x81/0xe7 [ 87.854469] ? kasan_check_read+0x11/0x20 [ 87.858598] ? rcu_is_watching+0x85/0x140 [ 87.862729] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 87.867468] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 87.872643] ? graph_lock+0x170/0x170 [ 87.876428] ? dev_queue_xmit_nit+0x8ec/0xb90 [ 87.880904] ? __lock_is_held+0xb5/0x140 [ 87.884948] dev_hard_start_xmit+0x264/0xc10 [ 87.889342] ? validate_xmit_skb_list+0x120/0x120 [ 87.894168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.899683] ? netif_skb_features+0x696/0xb40 [ 87.904163] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 87.909334] ? validate_xmit_xfrm+0x1ef/0xdc0 [ 87.913813] ? lock_acquire+0x1dc/0x520 [ 87.917770] ? validate_xmit_skb+0x704/0xd90 [ 87.922161] ? netif_skb_features+0xb40/0xb40 [ 87.926638] __dev_queue_xmit+0x2724/0x34c0 [ 87.930945] ? netdev_pick_tx+0x2d0/0x2d0 [ 87.935075] ? debug_check_no_locks_freed+0x310/0x310 [ 87.940247] ? graph_lock+0x170/0x170 [ 87.944028] ? print_usage_bug+0xc0/0xc0 [ 87.948072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.953592] ? refcount_add_not_zero+0x216/0x320 [ 87.958329] ? refcount_dec_if_one+0x170/0x170 [ 87.962897] ? alloc_skb_with_frags+0x4fe/0x760 [ 87.967553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.973073] ? refcount_add+0x2f/0x70 [ 87.976854] ? skb_set_owner_w+0x24e/0x360 [ 87.981071] ? sock_alloc_send_pskb+0x7d1/0xae0 [ 87.985727] ? lock_downgrade+0x8e0/0x8e0 [ 87.989857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.995374] ? cap_capable+0x1f9/0x260 [ 87.999247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.004765] ? security_capable+0x99/0xc0 [ 88.008895] dev_queue_xmit+0x17/0x20 [ 88.012675] ? dev_queue_xmit+0x17/0x20 [ 88.016629] packet_sendmsg+0x40f8/0x6070 [ 88.020758] ? debug_check_no_locks_freed+0x310/0x310 [ 88.025930] ? futex_wait_setup+0x400/0x400 [ 88.030231] ? find_held_lock+0x36/0x1c0 [ 88.034279] ? packet_getname+0x5f0/0x5f0 [ 88.038407] ? rcu_is_watching+0x85/0x140 [ 88.042538] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 88.047715] ? graph_lock+0x170/0x170 [ 88.051505] ? expand_files.part.8+0x9a0/0x9a0 [ 88.056072] ? find_held_lock+0x36/0x1c0 [ 88.060115] ? lock_downgrade+0x8e0/0x8e0 [ 88.064245] ? lock_release+0xa10/0xa10 [ 88.068206] ? check_same_owner+0x320/0x320 [ 88.072514] ? __check_object_size+0x95/0x5d9 [ 88.076997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.082605] ? security_socket_sendmsg+0x94/0xc0 [ 88.087345] ? packet_getname+0x5f0/0x5f0 [ 88.091497] sock_sendmsg+0xd5/0x120 [ 88.095197] __sys_sendto+0x3d7/0x670 [ 88.098991] ? __ia32_sys_getpeername+0xb0/0xb0 [ 88.103642] ? __fd_install+0x2de/0x880 [ 88.107599] ? get_unused_fd_flags+0x190/0x190 [ 88.112162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.117685] ? alloc_file+0x44/0x3e0 [ 88.121382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.126900] ? sock_alloc_file+0x2a4/0x4e0 [ 88.131119] ? __alloc_fd+0x700/0x700 [ 88.134901] ? __x64_sys_futex+0x477/0x680 [ 88.139116] ? fd_install+0x4d/0x60 [ 88.142723] ? do_futex+0x27d0/0x27d0 [ 88.146505] ? move_addr_to_kernel+0x70/0x70 [ 88.150905] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 88.156423] ? fput+0x130/0x1a0 [ 88.159690] __x64_sys_sendto+0xe1/0x1a0 [ 88.163735] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.168732] do_syscall_64+0x1b1/0x800 [ 88.172599] ? finish_task_switch+0x1ca/0x840 [ 88.177080] ? syscall_return_slowpath+0x5c0/0x5c0 [ 88.181995] ? syscall_return_slowpath+0x30f/0x5c0 [ 88.186911] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 88.192260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.197096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 88.202266] RIP: 0033:0x455a09 [ 88.205435] RSP: 002b:00007fe6f4885c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 88.213123] RAX: ffffffffffffffda RBX: 00007fe6f48866d4 RCX: 0000000000455a09 [ 88.220373] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000014 [ 88.227631] RBP: 000000000072bea0 R08: 0000000020000100 R09: 000000000000001c [ 88.234881] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 88.242132] R13: 00000000000005ac R14: 00000000006fc8c0 R15: 0000000000000000 [ 88.249800] Dumping ftrace buffer: [ 88.253325] (ftrace buffer empty) [ 88.257010] Kernel Offset: disabled [ 88.260622] Rebooting in 86400 seconds..