INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2018/04/23 10:34:08 fuzzer started 2018/04/23 10:34:09 dialing manager at 10.128.0.26:38315 syzkaller login: [ 47.947379] can: request_module (can-proto-0) failed. [ 47.958650] can: request_module (can-proto-0) failed. 2018/04/23 10:34:15 kcov=true, comps=false 2018/04/23 10:34:18 executing program 0: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xeb) 2018/04/23 10:34:18 executing program 1: unshare(0x40600) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340), &(0x7f0000000380)=0x8) 2018/04/23 10:34:18 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000006c0a00000000000095f3edf1d1cf97cf"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000011000)=""/195}, 0x48) 2018/04/23 10:34:18 executing program 2: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xffff) 2018/04/23 10:34:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) getsockname(r0, &(0x7f0000000100)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, &(0x7f0000000240)=0x80) 2018/04/23 10:34:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000455000)=[{&(0x7f0000fa0f7f)="390000001300094700bb61e1c30500000700000002000000450040000000800019001a000d000000d0de280ff4000000fd17e9ff0000060400", 0x39}], 0x1) 2018/04/23 10:34:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0xffffffff00000001}}) 2018/04/23 10:34:18 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r2, 0x40001) write$binfmt_misc(r0, &(0x7f00000005c0)={'syz0'}, 0x4) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r2, &(0x7f000000a000), 0x80000000) [ 52.579633] IPVS: ftp: loaded support on port[0] = 21 [ 52.732335] IPVS: ftp: loaded support on port[0] = 21 [ 52.780061] IPVS: ftp: loaded support on port[0] = 21 [ 52.851880] IPVS: ftp: loaded support on port[0] = 21 [ 52.970538] IPVS: ftp: loaded support on port[0] = 21 [ 53.065548] IPVS: ftp: loaded support on port[0] = 21 [ 53.200176] IPVS: ftp: loaded support on port[0] = 21 [ 53.355192] IPVS: ftp: loaded support on port[0] = 21 [ 54.504189] ip (4678) used greatest stack depth: 54280 bytes left [ 55.800556] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.807129] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.846340] device bridge_slave_0 entered promiscuous mode [ 55.930397] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.936875] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.959372] device bridge_slave_0 entered promiscuous mode [ 55.993739] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.000275] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.026144] device bridge_slave_0 entered promiscuous mode [ 56.114280] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.120781] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.123936] ip (4794) used greatest stack depth: 54168 bytes left [ 56.135204] device bridge_slave_1 entered promiscuous mode [ 56.197859] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.204424] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.239393] device bridge_slave_1 entered promiscuous mode [ 56.268663] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.275158] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.294539] device bridge_slave_1 entered promiscuous mode [ 56.324807] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.331298] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.343744] device bridge_slave_0 entered promiscuous mode [ 56.390140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.403223] ip (4816) used greatest stack depth: 53640 bytes left [ 56.485248] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.493904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.520755] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.527270] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.566383] device bridge_slave_1 entered promiscuous mode [ 56.600457] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.607130] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.634497] device bridge_slave_0 entered promiscuous mode [ 56.664103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.671534] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.678088] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.722706] device bridge_slave_0 entered promiscuous mode [ 56.753960] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.798266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.823462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.854071] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.860572] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.906527] device bridge_slave_1 entered promiscuous mode [ 56.949787] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.956378] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.992143] device bridge_slave_1 entered promiscuous mode [ 57.033644] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.040214] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.058103] device bridge_slave_0 entered promiscuous mode [ 57.077504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.085276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.099522] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.106131] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.153482] device bridge_slave_0 entered promiscuous mode [ 57.189001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.272209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.295880] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.302396] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.353498] device bridge_slave_1 entered promiscuous mode [ 57.369601] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.386109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.401809] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.408290] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.450625] device bridge_slave_1 entered promiscuous mode [ 57.469958] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.500218] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.571030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.588316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.666309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.709101] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.741405] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.781866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.823771] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.867677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.874689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.921216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.932208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.939254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.962223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.970869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.005204] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.065839] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.075619] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.128873] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.135983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.174766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.182466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.206813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.215596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.273477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.305896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.313136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.334751] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.474936] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.513196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.522544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.554128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.561798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.595439] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.602480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.687906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.731126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.738760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.755241] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.835619] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.869572] team0: Port device team_slave_0 added [ 58.908414] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.925785] team0: Port device team_slave_0 added [ 58.964163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.986737] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.005098] team0: Port device team_slave_0 added [ 59.029302] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.045010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.067590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.099681] team0: Port device team_slave_1 added [ 59.137852] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.160144] team0: Port device team_slave_1 added [ 59.230976] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.241437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.268875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.279314] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.301693] team0: Port device team_slave_1 added [ 59.321976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.331825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.354577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.387777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.407064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.418944] team0: Port device team_slave_0 added [ 59.449491] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.461387] team0: Port device team_slave_0 added [ 59.470236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.483564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.494167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.501561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.510371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.531397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.546825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.576573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.595183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.602213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.620648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.647440] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.658394] team0: Port device team_slave_0 added [ 59.684989] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.708442] team0: Port device team_slave_1 added [ 59.724163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.745496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.760567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.781442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.803993] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.819785] team0: Port device team_slave_1 added [ 59.838636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.856235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.879734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.892655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.901985] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.922099] team0: Port device team_slave_1 added [ 59.942331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.968166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.992417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.013854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.037739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.048462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.058845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.077715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.085895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.096220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.138020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.158785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.173000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.197667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.205804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.213577] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.222442] team0: Port device team_slave_0 added [ 60.241860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.254488] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.284008] team0: Port device team_slave_0 added [ 60.307629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.326208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.356716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.370156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.379842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.388838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.399727] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.416463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.428289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.440958] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.456336] team0: Port device team_slave_1 added [ 60.465637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.474487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.483812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.491968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.506461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.533460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.565962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.593440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.609836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.624115] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.632246] team0: Port device team_slave_1 added [ 60.649859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.660558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.669697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.690352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.701929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.723548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.731433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.748000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.784122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.825216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.851183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.867247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.905809] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.913237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.933269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.954560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.962877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.989340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.997314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.004352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.042451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.081155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.116948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.140800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.153712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.161653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.169794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.225843] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.234140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.248330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.299309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.306385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.324221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.424928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.434760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.449624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.550219] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.557721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.577115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.823951] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.831476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.845206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.883094] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.889624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.896502] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.902991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.927180] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.933752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.064625] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.071153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.078067] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.084588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.150653] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.173297] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.179786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.186630] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.193112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.252212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.484551] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.491108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.497921] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.504359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.554346] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.574179] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.580670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.587538] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.593995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.638429] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.660643] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.667152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.674051] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.680527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.701107] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.869605] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.876133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.883057] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.889527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.909310] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.980983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.993737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.038092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.077901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.094450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.109612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.372946] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.379461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.386359] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.392813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.430206] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.993521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.244204] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.330138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.477729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.549774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.620576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.656402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.800773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.166676] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.264302] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.314618] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.401371] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.447514] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.463288] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.478258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.580550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.013152] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.019542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.027428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.080323] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.087283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.098945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.134204] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.151337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.172344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.253606] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.259978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.270889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.318330] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.324701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.340915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.379681] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.386550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.407229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.446360] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.515933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.522253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.533894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.908471] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.974571] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.061198] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.123427] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.225748] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.269411] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.280754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.297924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.338423] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.383995] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.030065] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/23 10:34:46 executing program 7: prctl$getreaper(0x25, &(0x7f0000000000)) 2018/04/23 10:34:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:47 executing program 7: r0 = add_key(&(0x7f0000943000)='keyring\x00', &(0x7f0000f02ffb)={0x73, 0x79, 0x7a}, &(0x7f00004defd8), 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) keyctl$get_security(0x11, r1, &(0x7f000027e000)=""/87, 0xfffffffffffffd95) 2018/04/23 10:34:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:47 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f000001cff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000001240)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f00000011c0), &(0x7f0000001200)}}, @cswp={0x58, 0x114, 0x7, {{}, &(0x7f0000001ff8), &(0x7f0000017000)}}], 0xb0}, 0x0) 2018/04/23 10:34:47 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r2, 0x40001) write$binfmt_misc(r0, &(0x7f00000005c0)={'syz0'}, 0x4) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r2, &(0x7f000000a000), 0x80000000) 2018/04/23 10:34:47 executing program 7: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 2018/04/23 10:34:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:47 executing program 5: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000c40)) r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = getegid() ioctl$TCGETS(r0, 0x5401, &(0x7f0000000b80)) setregid(r3, r4) r5 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000037fe8)=[{{}, 0x1}, {{0x77359400}}], 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x100000001) sendfile(r5, 0xffffffffffffffff, &(0x7f0000fc1ff8), 0x80000001) sendmsg$netlink(r0, &(0x7f0000000b00)={&(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000cc0)=[@cred={0x20, 0x1, 0x2, r1, r2}], 0x20}, 0x80) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f00007b6000)=""/101) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x6}, &(0x7f0000000bc0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000c80)={r6}, 0x8) r7 = request_key(&(0x7f00000002c0)="73797a6b616c6c6572f8", &(0x7f0000000c00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='big_key\x00', 0xfffffffffffffff8) rmdir(&(0x7f0000000b40)='./file0\x00') keyctl$negate(0xd, 0x0, 0x10001, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 2018/04/23 10:34:47 executing program 4: r0 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xffffff, 0x2012, r0, 0x0) mprotect(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) 2018/04/23 10:34:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000b7a000)=0x2, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1d, &(0x7f0000000000)=""/95, &(0x7f0000f7bffc)=0x5f) 2018/04/23 10:34:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) ioctl$KDGKBLED(r0, 0x8004510a, &(0x7f00000001c0)) 2018/04/23 10:34:47 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socket$inet6(0xa, 0xf, 0x2) 2018/04/23 10:34:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000500)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='chIck_int_print_mask=34,subvol=7']) 2018/04/23 10:34:48 executing program 4: r0 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xffffff, 0x2012, r0, 0x0) mprotect(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) 2018/04/23 10:34:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0), 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 2018/04/23 10:34:48 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r2, 0x40001) write$binfmt_misc(r0, &(0x7f00000005c0)={'syz0'}, 0x4) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r2, &(0x7f000000a000), 0x80000000) 2018/04/23 10:34:48 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) ioctl$KDGKBLED(r0, 0x8004510a, &(0x7f00000001c0)) [ 81.082943] sctp: [Deprecated]: syz-executor7 (pid 6662) Use of int in maxseg socket option. [ 81.082943] Use struct sctp_assoc_value instead [ 81.212373] sctp: [Deprecated]: syz-executor7 (pid 6662) Use of int in maxseg socket option. [ 81.212373] Use struct sctp_assoc_value instead 2018/04/23 10:34:48 executing program 5: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000c40)) r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = getegid() ioctl$TCGETS(r0, 0x5401, &(0x7f0000000b80)) setregid(r3, r4) r5 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000037fe8)=[{{}, 0x1}, {{0x77359400}}], 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x100000001) sendfile(r5, 0xffffffffffffffff, &(0x7f0000fc1ff8), 0x80000001) sendmsg$netlink(r0, &(0x7f0000000b00)={&(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000cc0)=[@cred={0x20, 0x1, 0x2, r1, r2}], 0x20}, 0x80) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f00007b6000)=""/101) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x6}, &(0x7f0000000bc0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000c80)={r6}, 0x8) r7 = request_key(&(0x7f00000002c0)="73797a6b616c6c6572f8", &(0x7f0000000c00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='big_key\x00', 0xfffffffffffffff8) rmdir(&(0x7f0000000b40)='./file0\x00') keyctl$negate(0xd, 0x0, 0x10001, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 2018/04/23 10:34:48 executing program 4: r0 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xffffff, 0x2012, r0, 0x0) mprotect(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) 2018/04/23 10:34:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f000067fff8)='syscall\x00') sendfile(r0, r1, &(0x7f0000000000)=0x14, 0x4) 2018/04/23 10:34:48 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) ioctl$KDGKBLED(r0, 0x8004510a, &(0x7f00000001c0)) 2018/04/23 10:34:48 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r2, 0x40001) write$binfmt_misc(r0, &(0x7f00000005c0)={'syz0'}, 0x4) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r2, &(0x7f000000a000), 0x80000000) 2018/04/23 10:34:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000500)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='chIck_int_print_mask=34,subvol=7']) 2018/04/23 10:34:48 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00007b5000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0x80) write$selinux_create(r0, &(0x7f0000000000)=@objname={'system_u:object_r:hald_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x0, 0x0, 0x20, './file0\x00'}, 0x3e) 2018/04/23 10:34:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0), 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 2018/04/23 10:34:48 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) ioctl$KDGKBLED(r0, 0x8004510a, &(0x7f00000001c0)) 2018/04/23 10:34:48 executing program 4: r0 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xffffff, 0x2012, r0, 0x0) mprotect(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) 2018/04/23 10:34:48 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000210025f006f90165fffffc0e02a000000000000000a9000c0800010000000000", 0x24) 2018/04/23 10:34:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000500)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='chIck_int_print_mask=34,subvol=7']) 2018/04/23 10:34:48 executing program 6: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000080)="1646", 0x2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000000)=0x90) 2018/04/23 10:34:48 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00007b5000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0x80) write$selinux_create(r0, &(0x7f0000000000)=@objname={'system_u:object_r:hald_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x0, 0x0, 0x20, './file0\x00'}, 0x3e) 2018/04/23 10:34:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0), 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 2018/04/23 10:34:48 executing program 5: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000c40)) r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = getegid() ioctl$TCGETS(r0, 0x5401, &(0x7f0000000b80)) setregid(r3, r4) r5 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000037fe8)=[{{}, 0x1}, {{0x77359400}}], 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x100000001) sendfile(r5, 0xffffffffffffffff, &(0x7f0000fc1ff8), 0x80000001) sendmsg$netlink(r0, &(0x7f0000000b00)={&(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000cc0)=[@cred={0x20, 0x1, 0x2, r1, r2}], 0x20}, 0x80) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f00007b6000)=""/101) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x6}, &(0x7f0000000bc0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000c80)={r6}, 0x8) r7 = request_key(&(0x7f00000002c0)="73797a6b616c6c6572f8", &(0x7f0000000c00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='big_key\x00', 0xfffffffffffffff8) rmdir(&(0x7f0000000b40)='./file0\x00') keyctl$negate(0xd, 0x0, 0x10001, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 2018/04/23 10:34:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000003c0), &(0x7f0000000400)=0x297) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) 2018/04/23 10:34:48 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000001300)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000290000003e00000000000000"], 0x14}, 0x0) 2018/04/23 10:34:48 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f0000000040)) 2018/04/23 10:34:49 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/04/23 10:34:49 executing program 6: mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) msync(&(0x7f00008f0000/0x600000)=nil, 0x600000, 0x4) 2018/04/23 10:34:49 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00007b5000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0x80) write$selinux_create(r0, &(0x7f0000000000)=@objname={'system_u:object_r:hald_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x0, 0x0, 0x20, './file0\x00'}, 0x3e) 2018/04/23 10:34:49 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f0000000040)) 2018/04/23 10:34:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000500)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='chIck_int_print_mask=34,subvol=7']) 2018/04/23 10:34:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) geteuid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0), 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 2018/04/23 10:34:49 executing program 5: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000c40)) r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = getegid() ioctl$TCGETS(r0, 0x5401, &(0x7f0000000b80)) setregid(r3, r4) r5 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000037fe8)=[{{}, 0x1}, {{0x77359400}}], 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x100000001) sendfile(r5, 0xffffffffffffffff, &(0x7f0000fc1ff8), 0x80000001) sendmsg$netlink(r0, &(0x7f0000000b00)={&(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000cc0)=[@cred={0x20, 0x1, 0x2, r1, r2}], 0x20}, 0x80) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file1\x00'}, 0x6e) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f00007b6000)=""/101) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x6}, &(0x7f0000000bc0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000c80)={r6}, 0x8) r7 = request_key(&(0x7f00000002c0)="73797a6b616c6c6572f8", &(0x7f0000000c00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='big_key\x00', 0xfffffffffffffff8) rmdir(&(0x7f0000000b40)='./file0\x00') keyctl$negate(0xd, 0x0, 0x10001, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 2018/04/23 10:34:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000003c0), &(0x7f0000000400)=0x297) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) 2018/04/23 10:34:49 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'ip6_6ti0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="37ae01e400004f6fab9b97"]}) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/04/23 10:34:49 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f0000000040)) 2018/04/23 10:34:49 executing program 2: mkdir(&(0x7f00001d4ff8)='./file0\x00', 0x0) symlink(&(0x7f0000192000)='./file0\x00', &(0x7f0000044ff2)='./control\x00') mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000179ff8)='./control\x00', &(0x7f0000014000)='anon_inodefs\x00', 0x9002, &(0x7f0000fcb000)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0xb3b9, &(0x7f0000005000)) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 2018/04/23 10:34:49 executing program 6: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000026004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) [ 82.568952] netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/23 10:34:49 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00007b5000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0x80) write$selinux_create(r0, &(0x7f0000000000)=@objname={'system_u:object_r:hald_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x0, 0x0, 0x20, './file0\x00'}, 0x3e) 2018/04/23 10:34:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/242, 0x3b, 0x0) pread64(r0, &(0x7f00008af000), 0xfffffef6, 0x100000) 2018/04/23 10:34:49 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'ip6_6ti0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="37ae01e400004f6fab9b97"]}) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/04/23 10:34:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000008480)=[{{&(0x7f0000003300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f00000037c0), 0x146, &(0x7f0000003840)}}, {{&(0x7f0000001140)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x80, &(0x7f0000007240), 0x2ae, &(0x7f00000011c0)=ANY=[], 0x242}}], 0x2, 0x4004000) 2018/04/23 10:34:49 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f0000000040)) 2018/04/23 10:34:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000003c0), &(0x7f0000000400)=0x297) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) 2018/04/23 10:34:49 executing program 6: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000026004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) 2018/04/23 10:34:49 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xfffffffffffffffc, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85512, &(0x7f0000001000)=""/250) [ 82.769093] netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/23 10:34:49 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'ip6_6ti0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="37ae01e400004f6fab9b97"]}) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/04/23 10:34:49 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) llistxattr(&(0x7f0000000080)='..', &(0x7f00000000c0)=""/38, 0x26) 2018/04/23 10:34:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) sendto$inet(r0, &(0x7f00008ac000), 0x266, 0x0, 0x0, 0x1cd) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) recvmsg(r2, &(0x7f0000000140)={&(0x7f00000001c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0xe, &(0x7f0000000140), 0x0, &(0x7f0000000280)=""/239, 0xef}, 0x0) 2018/04/23 10:34:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/242, 0x3b, 0x0) pread64(r0, &(0x7f00008af000), 0xfffffef6, 0x100000) 2018/04/23 10:34:49 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000020001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) close(r0) close(r1) 2018/04/23 10:34:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000008480)=[{{&(0x7f0000003300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f00000037c0), 0x146, &(0x7f0000003840)}}, {{&(0x7f0000001140)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x80, &(0x7f0000007240), 0x2ae, &(0x7f00000011c0)=ANY=[], 0x242}}], 0x2, 0x4004000) 2018/04/23 10:34:50 executing program 6: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000026004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) 2018/04/23 10:34:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000003c0), &(0x7f0000000400)=0x297) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) 2018/04/23 10:34:50 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'ip6_6ti0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="37ae01e400004f6fab9b97"]}) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 2018/04/23 10:34:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/242, 0x3b, 0x0) pread64(r0, &(0x7f00008af000), 0xfffffef6, 0x100000) 2018/04/23 10:34:50 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000020001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) close(r0) close(r1) 2018/04/23 10:34:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000008480)=[{{&(0x7f0000003300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f00000037c0), 0x146, &(0x7f0000003840)}}, {{&(0x7f0000001140)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x80, &(0x7f0000007240), 0x2ae, &(0x7f00000011c0)=ANY=[], 0x242}}], 0x2, 0x4004000) 2018/04/23 10:34:50 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt(r0, 0x114, 0x5, &(0x7f0000000000), 0x13) 2018/04/23 10:34:50 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) mq_timedreceive(r0, &(0x7f0000000140)=""/195, 0xc3, 0x0, &(0x7f0000000240)={0x77359400}) [ 83.307128] netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/23 10:34:50 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) mq_timedreceive(r0, &(0x7f0000000140)=""/195, 0xc3, 0x0, &(0x7f0000000240)={0x77359400}) 2018/04/23 10:34:50 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000020001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) close(r0) close(r1) 2018/04/23 10:34:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) unshare(0x40600) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r4, r5, r6) connect$unix(r2, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) fallocate(r0, 0x0, 0x9, 0x80008) socket$nl_generic(0x10, 0x3, 0x10) lseek(r1, 0x0, 0x3) 2018/04/23 10:34:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/242, 0x3b, 0x0) pread64(r0, &(0x7f00008af000), 0xfffffef6, 0x100000) 2018/04/23 10:34:50 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000af3000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000fbf000)=0xcbb, 0x7, 0x0) pkey_mprotect(&(0x7f0000125000/0x600000)=nil, 0x600000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000527ff8), 0x2, 0x0) 2018/04/23 10:34:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000008480)=[{{&(0x7f0000003300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f00000037c0), 0x146, &(0x7f0000003840)}}, {{&(0x7f0000001140)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x80, &(0x7f0000007240), 0x2ae, &(0x7f00000011c0)=ANY=[], 0x242}}], 0x2, 0x4004000) 2018/04/23 10:34:50 executing program 6: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000026004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) [ 83.573463] netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/23 10:34:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300), &(0x7f0000000340)=0x4) 2018/04/23 10:34:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x5, &(0x7f000000effc), &(0x7f0000000040)=0x4) 2018/04/23 10:34:50 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000020001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) close(r0) close(r1) 2018/04/23 10:34:50 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) mq_timedreceive(r0, &(0x7f0000000140)=""/195, 0xc3, 0x0, &(0x7f0000000240)={0x77359400}) 2018/04/23 10:34:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) unshare(0x40600) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r4, r5, r6) connect$unix(r2, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) fallocate(r0, 0x0, 0x9, 0x80008) socket$nl_generic(0x10, 0x3, 0x10) lseek(r1, 0x0, 0x3) 2018/04/23 10:34:50 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f000001d000)) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x1}) 2018/04/23 10:34:50 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000002c0)) 2018/04/23 10:34:50 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000017c0)={&(0x7f0000000000)=@file={0x0, "e91f7189591e9233614b00"}, 0x6e, &(0x7f0000001400), 0x0, &(0x7f0000001700)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x30}, 0x0) 2018/04/23 10:34:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x1, 0x3, 0x7f, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000ba000)={r0, &(0x7f00002ae000), &(0x7f0000260ff8)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000393fe0)={r0, &(0x7f0000393000), &(0x7f0000223000), 0x1}, 0x20) 2018/04/23 10:34:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2202, &(0x7f0000000140)) 2018/04/23 10:34:50 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000af3000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000fbf000)=0xcbb, 0x7, 0x0) pkey_mprotect(&(0x7f0000125000/0x600000)=nil, 0x600000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000527ff8), 0x2, 0x0) 2018/04/23 10:34:51 executing program 5: r0 = socket(0x1e, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='\n']}) 2018/04/23 10:34:51 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) mq_timedreceive(r0, &(0x7f0000000140)=""/195, 0xc3, 0x0, &(0x7f0000000240)={0x77359400}) 2018/04/23 10:34:51 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0xfffffffffffffebc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x48, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xfdbb, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:51 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000af3000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000fbf000)=0xcbb, 0x7, 0x0) pkey_mprotect(&(0x7f0000125000/0x600000)=nil, 0x600000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000527ff8), 0x2, 0x0) 2018/04/23 10:34:51 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0x80}}) 2018/04/23 10:34:51 executing program 7: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="9e", 0x1}, {&(0x7f00000002c0)="3a597b12426f56d840369afb723cc023c58774ea086f287c2bb9139e73f873fc923398322abd286f9628e7997d0d7dcfe31e552ef84cc16ab20491126b5aac64d5dedc68dbe8ac41258edc67a1491bc64f77e74f6a6d3712c531a335c4fe07f152dd5b486637a9dae1e95f2cfdc1102a3727c76f873b5890d0a623316a", 0x7d}], 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 2018/04/23 10:34:51 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x26}}) 2018/04/23 10:34:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) unshare(0x40600) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r4, r5, r6) connect$unix(r2, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) fallocate(r0, 0x0, 0x9, 0x80008) socket$nl_generic(0x10, 0x3, 0x10) lseek(r1, 0x0, 0x3) 2018/04/23 10:34:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) unshare(0x40600) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r4, r5, r6) connect$unix(r2, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) fallocate(r0, 0x0, 0x9, 0x80008) socket$nl_generic(0x10, 0x3, 0x10) lseek(r1, 0x0, 0x3) 2018/04/23 10:34:51 executing program 0: mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="f1723f481e3a1b2cdf8ecab6fa8211f0", 0x10) 2018/04/23 10:34:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000a7eff4)={0x10}, 0xc, &(0x7f0000f93000)={&(0x7f000024e000)={0x14, 0x3, 0x2, 0xf09}, 0x14}, 0x1}, 0x0) read(r0, &(0x7f0000000040)=""/80, 0x50) 2018/04/23 10:34:51 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000af3000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000fbf000)=0xcbb, 0x7, 0x0) pkey_mprotect(&(0x7f0000125000/0x600000)=nil, 0x600000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000527ff8), 0x2, 0x0) 2018/04/23 10:34:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1205531, &(0x7f0000000140)) 2018/04/23 10:34:51 executing program 7: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="9e", 0x1}, {&(0x7f00000002c0)="3a597b12426f56d840369afb723cc023c58774ea086f287c2bb9139e73f873fc923398322abd286f9628e7997d0d7dcfe31e552ef84cc16ab20491126b5aac64d5dedc68dbe8ac41258edc67a1491bc64f77e74f6a6d3712c531a335c4fe07f152dd5b486637a9dae1e95f2cfdc1102a3727c76f873b5890d0a623316a", 0x7d}], 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 2018/04/23 10:34:51 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0xfffffffffffffebc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x48, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xfdbb, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) unlink(&(0x7f0000000000)='./file1\x00') recvmsg(0xffffffffffffffff, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r2 = dup3(r1, r0, 0x0) msgget$private(0x0, 0x40000084) ftruncate(r1, 0x3) write$cgroup_subtree(r2, &(0x7f00000002c0), 0xa871f704) 2018/04/23 10:34:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) dup3(r0, r1, 0x0) 2018/04/23 10:34:51 executing program 7: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="9e", 0x1}, {&(0x7f00000002c0)="3a597b12426f56d840369afb723cc023c58774ea086f287c2bb9139e73f873fc923398322abd286f9628e7997d0d7dcfe31e552ef84cc16ab20491126b5aac64d5dedc68dbe8ac41258edc67a1491bc64f77e74f6a6d3712c531a335c4fe07f152dd5b486637a9dae1e95f2cfdc1102a3727c76f873b5890d0a623316a", 0x7d}], 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 2018/04/23 10:34:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=[{0x10}, {0x10, 0x29}], 0x20}}], 0x1, 0x0) 2018/04/23 10:34:52 executing program 5: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/23 10:34:52 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0xfffffffffffffebc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x48, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xfdbb, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/23 10:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000a7eff4)={0x10}, 0xc, &(0x7f0000f93000)={&(0x7f000024e000)={0x14, 0x3, 0x2, 0xf09}, 0x14}, 0x1}, 0x0) read(r0, &(0x7f0000000040)=""/80, 0x50) 2018/04/23 10:34:52 executing program 2: unshare(0x8000000) sched_setaffinity(0x0, 0xfffffffffffffe6c, &(0x7f0000000040)=0xd) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x9}) mq_timedsend(r0, &(0x7f0000e71fff), 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f000066c000), 0x0, 0x0, &(0x7f000058eff0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) 2018/04/23 10:34:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) dup3(r0, r1, 0x0) 2018/04/23 10:34:52 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x90000001}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000000), 0x8) 2018/04/23 10:34:52 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000001880), 0x1000, &(0x7f00000006c0)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000001880), 0x0, 0x8001}], 0x0, &(0x7f00000018c0)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0xaaaaaaaaaaaaadf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) madvise(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x9) 2018/04/23 10:34:52 executing program 7: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="9e", 0x1}, {&(0x7f00000002c0)="3a597b12426f56d840369afb723cc023c58774ea086f287c2bb9139e73f873fc923398322abd286f9628e7997d0d7dcfe31e552ef84cc16ab20491126b5aac64d5dedc68dbe8ac41258edc67a1491bc64f77e74f6a6d3712c531a335c4fe07f152dd5b486637a9dae1e95f2cfdc1102a3727c76f873b5890d0a623316a", 0x7d}], 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 2018/04/23 10:34:52 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x7}, 0x1c) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 2018/04/23 10:34:52 executing program 0: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="2da5664bd8bd796a63fddde6cb597078097935d8b8e58bae84d30bee1cd9f24c2d497734ef3966f871bb1c46f6fb72d876f8780609ffaf35b4a964f2685ce979cc05fc577fccea6060571cb61020909fb0638b7c65f8571f0697460e3401e25057d0b6bef883be81d0cfb83c1ba4a21522cdd08c35a114f72a17894e22584df4d2fb6e6b995250165e0f0869468fe9b15242d2dcc52a9f120ed7772600000000000000000000000000101608e51002bd2aae88b8269964bbeab6e61519f20e2cb2") ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) [ 85.173861] IPVS: ftp: loaded support on port[0] = 21 2018/04/23 10:34:52 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0xfffffffffffffebc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x48, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xfdbb, &(0x7f000000cf3d)=""/195}, 0x48) [ 85.209822] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 85.221245] Dead loop on virtual device ip6_vti0, fix it urgently! 2018/04/23 10:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000a7eff4)={0x10}, 0xc, &(0x7f0000f93000)={&(0x7f000024e000)={0x14, 0x3, 0x2, 0xf09}, 0x14}, 0x1}, 0x0) read(r0, &(0x7f0000000040)=""/80, 0x50) 2018/04/23 10:34:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) dup3(r0, r1, 0x0) [ 85.355902] Dead loop on virtual device ip6_vti0, fix it urgently! 2018/04/23 10:34:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@timestamp={0xd}}}}}, &(0x7f0000ea3000)) 2018/04/23 10:34:52 executing program 6: prctl$intptr(0xe, 0x0) [ 85.455089] syz-executor7 (7028) used greatest stack depth: 51968 bytes left 2018/04/23 10:34:52 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000001880), 0x1000, &(0x7f00000006c0)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000001880), 0x0, 0x8001}], 0x0, &(0x7f00000018c0)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0xaaaaaaaaaaaaadf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) madvise(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x9) [ 85.579311] IPVS: ftp: loaded support on port[0] = 21 2018/04/23 10:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000a7eff4)={0x10}, 0xc, &(0x7f0000f93000)={&(0x7f000024e000)={0x14, 0x3, 0x2, 0xf09}, 0x14}, 0x1}, 0x0) read(r0, &(0x7f0000000040)=""/80, 0x50) 2018/04/23 10:34:52 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x1, 0x87, 0xff, 0x1}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000feefe0)={r0, &(0x7f0000fee000), &(0x7f0000006000)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="b9", &(0x7f0000000040)=""/77}, 0x18) 2018/04/23 10:34:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) 2018/04/23 10:34:52 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000072f000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000ff1ff0)={&(0x7f0000673000/0x3000)=nil, 0x3000}) 2018/04/23 10:34:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) dup3(r0, r1, 0x0) 2018/04/23 10:34:52 executing program 5: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/23 10:34:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f000062fff8)={0x0, 0x2000000001}, 0x8) write(r0, &(0x7f0000ce6ffe)="da", 0x1) 2018/04/23 10:34:52 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000001880), 0x1000, &(0x7f00000006c0)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000001880), 0x0, 0x8001}], 0x0, &(0x7f00000018c0)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0xaaaaaaaaaaaaadf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) madvise(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x9) 2018/04/23 10:34:53 executing program 6: clock_getres(0x5, &(0x7f0000000000)) 2018/04/23 10:34:53 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @random="7d73cf61100f", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x12, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000000000)) 2018/04/23 10:34:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) 2018/04/23 10:34:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000640)=[{&(0x7f0000000180)='A%', 0x2}], 0x1) 2018/04/23 10:34:53 executing program 1: mkdir(&(0x7f00005f1ff6)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x80000000000001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = inotify_add_watch(r0, &(0x7f0000b0bff6)='./control\x00', 0x2000080) inotify_rm_watch(r0, r2) ppoll(&(0x7f0000282fd8)=[{r1}], 0x1, &(0x7f0000b0c000), &(0x7f0000955ff8), 0x8) 2018/04/23 10:34:53 executing program 6: unshare(0x400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000000)="f6ffffffff07000018") [ 86.425349] autofs4:pid:7112:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4294967286.2047), cmd(0x0000937e) [ 86.438894] autofs4:pid:7112:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 2018/04/23 10:34:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = dup(r0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'nq\x00'}, 0x2c) 2018/04/23 10:34:53 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0xfffffffe, 0x0, r0}, 0x2c) 2018/04/23 10:34:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000380)=@delsa={0x28, 0x11, 0x90d, 0x0, 0x0, {@in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x32}}, 0x28}, 0x1}, 0x0) 2018/04/23 10:34:53 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000001880), 0x1000, &(0x7f00000006c0)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000001880), 0x0, 0x8001}], 0x0, &(0x7f00000018c0)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0xaaaaaaaaaaaaadf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) madvise(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x9) 2018/04/23 10:34:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) 2018/04/23 10:34:53 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x5c) 2018/04/23 10:34:53 executing program 5: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/23 10:34:53 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="b1", 0x1}], 0x1, 0x0) 2018/04/23 10:34:54 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="b1", 0x1}], 0x1, 0x0) 2018/04/23 10:34:54 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f000000ab00)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0xff33, &(0x7f000000a280), 0x0, &(0x7f0000000040)}}, {{&(0x7f000000a440)=@can={0x1d}, 0x10, &(0x7f000000a5c0), 0x3a5, &(0x7f000000a600)}, 0x3}], 0x2, 0x0) 2018/04/23 10:34:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000380)=@delsa={0x28, 0x11, 0x90d, 0x0, 0x0, {@in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x32}}, 0x28}, 0x1}, 0x0) 2018/04/23 10:34:54 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00003f9fb8)={0x8, 0x20000000000000cf, &(0x7f0000000100)=@raw=[@ldst, @map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3}], &(0x7f0000fe5000)='GPL\x00', 0x8, 0xf2, &(0x7f0000000000)=""/242}, 0x48) 2018/04/23 10:34:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001fc4)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x104) 2018/04/23 10:34:54 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="b1", 0x1}], 0x1, 0x0) 2018/04/23 10:34:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) 2018/04/23 10:34:54 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="b1", 0x1}], 0x1, 0x0) 2018/04/23 10:34:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000380)=@delsa={0x28, 0x11, 0x90d, 0x0, 0x0, {@in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x32}}, 0x28}, 0x1}, 0x0) 2018/04/23 10:34:54 executing program 7: pwritev(0xffffffffffffffff, &(0x7f000000b000)=[{&(0x7f0000002000)="bd32bf46acb5", 0x6}], 0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 2018/04/23 10:34:54 executing program 6: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280), 0x4) 2018/04/23 10:34:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001fc4)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x104) 2018/04/23 10:34:54 executing program 0: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/250, 0xfa) lseek(r0, 0x3, 0x1) getdents64(r0, &(0x7f0000000ac0)=""/4096, 0x1000) 2018/04/23 10:34:54 executing program 5: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/23 10:34:54 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 2018/04/23 10:34:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001fc4)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x104) 2018/04/23 10:34:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000380)=@delsa={0x28, 0x11, 0x90d, 0x0, 0x0, {@in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x32}}, 0x28}, 0x1}, 0x0) 2018/04/23 10:34:55 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='rdma.max\x00', 0x2, 0x0) write(r1, &(0x7f0000000100)="82b148acd85050d64efa678e68b13c38d8b84007bb6f11bacc9edb19dc448974f75e9c0a3277435733ba19444a1ed7d80edb35f7121012ff6b85f630e42fbed55f45bd91c02d229a7a1d43d167899292ad83c4be85d58c7553ed2685b789a763f7ee2d32f420be", 0x67) 2018/04/23 10:34:55 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aa"], &(0x7f0000001040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000080)}, 0x45) 2018/04/23 10:34:55 executing program 7: pwritev(0xffffffffffffffff, &(0x7f000000b000)=[{&(0x7f0000002000)="bd32bf46acb5", 0x6}], 0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 2018/04/23 10:34:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000b96000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00002cb000)=0xd9e0, 0x4) sendto(r0, &(0x7f0000b9efd6)='g', 0x1, 0x2, 0x0, 0x0) 2018/04/23 10:34:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f00000000c0)=@ethtool_gfeatures={0x3a, 0x3, [{}, {}, {}]}}) 2018/04/23 10:34:55 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000010c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000b40)=@join_mcast={0x16, 0x98, 0xfa00, {&(0x7f0000000b00), 0x0, r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"f2a65425987c1e8c60e30a5ed882a073"}}}}, 0xa0) 2018/04/23 10:34:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001fc4)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x104) 2018/04/23 10:34:55 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080), 0x3) 2018/04/23 10:34:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={&(0x7f000034c000)={0x10}, 0xc, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1=0xe0000001}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}, 0x1}, 0x0) 2018/04/23 10:34:55 executing program 7: pwritev(0xffffffffffffffff, &(0x7f000000b000)=[{&(0x7f0000002000)="bd32bf46acb5", 0x6}], 0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 2018/04/23 10:34:55 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000fb7fee)='/dev/input/event#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xf82000)=nil, 0xf82000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000e38ff9)) [ 88.571159] IPVS: ftp: loaded support on port[0] = 21 2018/04/23 10:34:55 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000b76000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f000082ef0a)=""/246) 2018/04/23 10:34:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x4000000000000005, 0x4, 0x22, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000080)='X', &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000000080)}, 0x10) 2018/04/23 10:34:55 executing program 6: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x800020ffc000, 0x7ffffffff000, 0x0, &(0x7f0000ffd000/0x2000)=nil) 2018/04/23 10:34:55 executing program 7: pwritev(0xffffffffffffffff, &(0x7f000000b000)=[{&(0x7f0000002000)="bd32bf46acb5", 0x6}], 0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 2018/04/23 10:34:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x6, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000040), 0x1}, 0x20) 2018/04/23 10:34:55 executing program 4: r0 = getpgrp(0xffffffffffffffff) ioprio_set$pid(0x4000000002, r0, 0x4002) 2018/04/23 10:34:55 executing program 2: unshare(0x42020200) 2018/04/23 10:34:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/23 10:34:55 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8002, 0x0) ioctl$TCSETA(r0, 0x5402, &(0x7f000032cfec)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000012c0)) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x5, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x1c) 2018/04/23 10:34:55 executing program 6: clock_settime(0xfffffffffffffbf3, &(0x7f0000000100)) 2018/04/23 10:34:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000100), &(0x7f0000012ffc)=0x4) 2018/04/23 10:34:56 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340), 0x1) 2018/04/23 10:34:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000340)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000080)="040100000009cb396da10000eb9054b932ce5b73832fdbaf", 0x18, 0x0, &(0x7f0000000000)={0xa, 0x8000008847, 0x4, @dev={0xfe, 0x80}}, 0x1c) 2018/04/23 10:34:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)="0001705f66411f657300") getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 2018/04/23 10:34:56 executing program 1: prctl$intptr(0x4, 0x801) [ 89.764752] IPVS: ftp: loaded support on port[0] = 21 2018/04/23 10:34:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a0c000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7f, 0x0) 2018/04/23 10:34:56 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)) 2018/04/23 10:34:56 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000004a00030007fffd946fb983bc0a00800002000000031d8568791ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/23 10:34:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x4) 2018/04/23 10:34:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) tee(r0, 0xffffffffffffffff, 0x16200000000000, 0x0) 2018/04/23 10:34:56 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00005e5000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) 2018/04/23 10:34:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f0000000040)="29000000140003b7ff0000000403000000d6ebf7b3a40e07fff0feaf22cfffff060000002a00f3ff09", 0x29) 2018/04/23 10:34:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) [ 89.853650] sctp: [Deprecated]: syz-executor5 (pid 7305) Use of int in maxseg socket option. [ 89.853650] Use struct sctp_assoc_value instead [ 89.872589] netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/23 10:34:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a0c000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7f, 0x0) 2018/04/23 10:34:56 executing program 0: r0 = socket(0x1e, 0x1, 0x0) getsockopt(r0, 0x800000010f, 0x84, &(0x7f0000000080), &(0x7f0000000040)=0xf0) 2018/04/23 10:34:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x25, &(0x7f0000000000), 0x0) 2018/04/23 10:34:57 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)=0x4000) 2018/04/23 10:34:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000320ff8)='/dev/sg#\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x2287, 0x0) 2018/04/23 10:34:57 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040005}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={0x0, 0x2, 0x1a7}, 0x8) 2018/04/23 10:34:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00007d5000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000018000)) 2018/04/23 10:34:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a0c000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7f, 0x0) 2018/04/23 10:34:57 executing program 0: mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x300000c, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/23 10:34:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/23 10:34:57 executing program 1: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)) 2018/04/23 10:34:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x1000004, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/04/23 10:34:57 executing program 7: r0 = socket$inet6(0xa, 0x80002, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x140000000000a, &(0x7f0000000040), 0x100000448) 2018/04/23 10:34:57 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)=0x4000) 2018/04/23 10:34:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/23 10:34:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a0c000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7f, 0x0) 2018/04/23 10:34:57 executing program 0: mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x300000c, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/23 10:34:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/23 10:34:57 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) pread64(r0, &(0x7f00000003c0)=""/8, 0xfdb4, 0x63) 2018/04/23 10:34:57 executing program 0: mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x300000c, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/23 10:34:57 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)=0x4000) 2018/04/23 10:34:57 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='fdinfo\x00') exit(0x0) mknodat(r1, &(0x7f0000001100)='./file0\x00', 0x0, 0x0) 2018/04/23 10:34:57 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x5, 0xffac) syz_emit_ethernet(0x6e, &(0x7f0000101000)={@random="cd390b081bf2", @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2018/04/23 10:34:57 executing program 1: msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000200)=""/240) 2018/04/23 10:34:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/23 10:34:58 executing program 0: mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x300000c, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/23 10:34:58 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x9, &(0x7f0000abf000)={0xffffffffffff19f8, @in6={{0xa}}}, 0x98) 2018/04/23 10:34:58 executing program 1: unshare(0x40600) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') mmap(&(0x7f0000000000/0xc000)=nil, 0xc000, 0x0, 0x831, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)) 2018/04/23 10:34:58 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) pread64(r0, &(0x7f00000003c0)=""/8, 0xfdb4, 0x63) 2018/04/23 10:34:58 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)=0x4000) 2018/04/23 10:34:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/23 10:34:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r0, &(0x7f0000000a40), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) 2018/04/23 10:34:58 executing program 6: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000280)=ANY=[]}) 2018/04/23 10:34:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7, 0x8, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000014000)='A', &(0x7f0000012000)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000012000), &(0x7f000000cff6)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 2018/04/23 10:34:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/23 10:34:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/23 10:34:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x2c, &(0x7f0000000080)=[@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f0000000100)=0x10) 2018/04/23 10:34:59 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) unshare(0x8000400) ioctl(r0, 0x4000000002287, &(0x7f0000139000)) 2018/04/23 10:34:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 2018/04/23 10:34:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@subvol={'subvol', 0x3d, [0x31, 0x0]}, 0x2c}]}) 2018/04/23 10:34:59 executing program 3: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) write$evdev(r0, &(0x7f00000000c0)=[{{0x0, 0x2710}}], 0x18) 2018/04/23 10:34:59 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) pread64(r0, &(0x7f00000003c0)=""/8, 0xfdb4, 0x63) 2018/04/23 10:34:59 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r1, 0x1008005) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0xffffffffffffff97, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00005c8000)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65c856a45d61154adc2b2a976fbffffffffffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) readv(r2, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/124, 0x7c}], 0x1) shutdown(r0, 0x1) 2018/04/23 10:34:59 executing program 4: mkdir(&(0x7f0000000100)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./control/file1\x00', 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000010000/0x2000)=nil, 0x2000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') rename(&(0x7f0000000200)='./control/file1\x00', &(0x7f0000000280)='./control/file1\x00') close(r0) 2018/04/23 10:34:59 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/23 10:34:59 executing program 3: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000601000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x5, 0x9, 0x0) 2018/04/23 10:34:59 executing program 1: mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) unshare(0x40600) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000003ffc), &(0x7f0000001ffc)=0x2a2) 2018/04/23 10:34:59 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) unshare(0x8000400) ioctl(r0, 0x4000000002287, &(0x7f0000139000)) 2018/04/23 10:34:59 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) pread64(r0, &(0x7f00000003c0)=""/8, 0xfdb4, 0x63) 2018/04/23 10:34:59 executing program 5: unshare(0x40600) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000006700), 0x0, 0x0) 2018/04/23 10:34:59 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/23 10:34:59 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) unshare(0x8000400) ioctl(r0, 0x4000000002287, &(0x7f0000139000)) 2018/04/23 10:34:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xf7}) 2018/04/23 10:34:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet6(r0, &(0x7f0000000040)="a0", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) 2018/04/23 10:35:00 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/23 10:35:00 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) unshare(0x8000400) ioctl(r0, 0x4000000002287, &(0x7f0000139000)) 2018/04/23 10:35:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f00000000c0)=[{0x10, 0x29, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/23 10:35:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet6(r0, &(0x7f0000000040)="a0", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) 2018/04/23 10:35:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000776000)=[{&(0x7f0000000040)="240000003e00030207fffd946fa283bc0ae6e60000a6ffffff0c5a00000003a2d189737e", 0x24}], 0x1}, 0x0) 2018/04/23 10:35:00 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/91, 0x2c2) 2018/04/23 10:35:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000002b40)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d0388bf7696fc185bdbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb08ad0491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db2d6e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d9f44f059a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca116f8f11416e5c1bd5499636ddae25fc49709f0309cf5c0bf8e432160c258d14223b3b0d009b09858645773dd97e68a9531072713c85f77b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a1319590249b6d34ef6c3d8b94c6fc7cdcbddb053243f33e7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49cb64205f76115c02347eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068b8fff72b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6817b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0efa4d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bb20dcf3e90f80a4a8ac093de9f0d9c11a540aff2de27437787bbed317439cafb71e7f92b7e02cbadb076f04ba2cb8c96aeef53c74d9036c922b1b24a79228e833abc661b5630caa45389341cb8ddf277fd916141023fb53c0d155faf6fdfb593e22db25c4f8afdcd90d437672ebe975f4a5f445bbdd845505fcfea702a42d821d3dc11720de0009e83161e5a089d09184346606e126842de54e85e20aa5fac874367a8690d09d6e041378bd424eabe8248652c3f75a849ff89da7b6be87fb3fe6ff22693b0cece9e4d935f28bb7efd85afb1642a363d583eb01f48f25784f80002b163bd3da724b0391dac7c23f76b5c5c6319f7aab18a486d5607f68ce2f83d2a6a8a13f8ecdb845b8af96230f063019ff113698c720403bbf6202b2d5e6146f14a45afe6ed538fc1fa57518769bd3bfc11e743b4e56b01f17483a152abcca0bd84a1011bd703a494150176d17322cf10307d259999622b76ac6a86407c9ed281ae29b9b569b382d3f39fe4d07706c96c41a565437d9edb1cb532d900efe54f518044bba5fa5791c1797c569a3d6c21342d92f4b104a3d957cf85e617c46ac97b6785a455ce7765eb80a02de4dffde0207061e1afb61e777379b202707f0f49edcf21a186ea1f2e08ef1dc15ae3371280d89aabb3bd53408b4cb2a8e42f9f4d0bc11d766eb51940f5e92559b91954649f2786fb6683e19ca5f609c40e327876f5515aeefce0f390d3fd557aabcb091b04131f3edc1ed80a2d5a812786530a302ab54f7e1f3a6bca852722d1af85ceab2e6565733b31f76d7950028c03d0c2c2831ce3a83369b", 0x4d8}], 0x1, &(0x7f0000003b40)}, 0x0) 2018/04/23 10:35:00 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x8010000400000081) sendmmsg(r0, &(0x7f0000003f00)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f00000009c0)=[{0x10, 0x29, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/23 10:35:00 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/23 10:35:00 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000de3000)={{0x4000001ff, 0x2010000080000a}, {}, 0xffffffffffffffff}) 2018/04/23 10:35:00 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendto(r0, &(0x7f0000000080)="9212e04534b92861fc9387cf1b4d99d10ec24bda00000000000000200000000000000000", 0x24, 0xfffffffffffffffd, &(0x7f0000000240)=@sco={0x1f}, 0x80) 2018/04/23 10:35:00 executing program 3: set_robust_list(&(0x7f0000000740)={&(0x7f0000000680)={&(0x7f0000000640)}, 0x1000, &(0x7f0000000700)={&(0x7f00000006c0)}}, 0xc) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x5}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000400)=@l2, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000000)=""/117, 0x75}, 0x7}], 0x1, 0x0, &(0x7f0000000cc0)) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000002000)=[{0x10}], 0x10}}], 0x2, 0x8000) 2018/04/23 10:35:00 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x8010000400000081) sendmmsg(r0, &(0x7f0000003f00)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f00000009c0)=[{0x10, 0x29, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/23 10:35:00 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/91, 0x2c2) 2018/04/23 10:35:00 executing program 4: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f0000d19000)='./file0\x00') 2018/04/23 10:35:00 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x8010000400000081) sendmmsg(r0, &(0x7f0000003f00)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f00000009c0)=[{0x10, 0x29, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/23 10:35:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000e42000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x15, &(0x7f0000e41ff7)={0x0, &(0x7f0000e41ff0)}, 0x10) 2018/04/23 10:35:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) 2018/04/23 10:35:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fchmod(r0, 0x0) fchmod(r0, 0x0) 2018/04/23 10:35:00 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/91, 0x2c2) 2018/04/23 10:35:00 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/23 10:35:00 executing program 4: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x200000000114, 0x2718, &(0x7f0000a44000)=""/1, &(0x7f0000940000)=0x10) 2018/04/23 10:35:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet6(r0, &(0x7f0000000040)="a0", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) 2018/04/23 10:35:00 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/91, 0x2c2) 2018/04/23 10:35:00 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/23 10:35:00 executing program 0: r0 = memfd_create(&(0x7f0000403000)='\x00', 0x80000000000006) fcntl$addseals(r0, 0x409, 0x4) ftruncate(r0, 0x800000) 2018/04/23 10:35:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0x12, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_address={0x5, 0x6, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}]}, 0x60}, 0x1}, 0x0) 2018/04/23 10:35:00 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x8010000400000081) sendmmsg(r0, &(0x7f0000003f00)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f00000009c0)=[{0x10, 0x29, 0x4}], 0x10}}], 0x2, 0x0) 2018/04/23 10:35:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x80000000, @remote={0xac, 0x14, 0x14, 0xbb}, {[@cipso={0x86, 0x6}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000080)) 2018/04/23 10:35:00 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000e7d000), 0x8) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r0}, {r0}], 0x2, &(0x7f00000000c0)={0x0, r1+30000000}, &(0x7f0000000100), 0x8) signalfd(r0, &(0x7f0000000140), 0x8) 2018/04/23 10:35:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet6(r0, &(0x7f0000000040)="a0", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) 2018/04/23 10:35:01 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) wait4(0x0, 0x0, 0x0, &(0x7f0000000000)) tgkill(r1, r1, 0x28) 2018/04/23 10:35:01 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/23 10:35:01 executing program 3: r0 = socket$inet(0x2, 0x805, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="f2", 0x1, 0x0, &(0x7f0000000240)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/23 10:35:01 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x9, 0x4) writev(r0, &(0x7f0000f7ffe0)=[{&(0x7f0000357000), 0x1023c}], 0x1) 2018/04/23 10:35:01 executing program 0: remap_file_pages(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0xfffffffffffffffc, 0x0) [ 94.317484] mmap: syz-executor0 (7635) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/23 10:35:01 executing program 2: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000335000), 0xfc94) close(r1) close(r0) 2018/04/23 10:35:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000100)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffff}, 0x13f}}, 0x20) r2 = fcntl$dupfd(r0, 0x0, r0) write$rdma_cm(r2, &(0x7f0000000300)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYRES64], 0xe) 2018/04/23 10:35:01 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/115, 0x28) getdents64(r0, &(0x7f0000001040)=""/4096, 0x1000) 2018/04/23 10:35:01 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000f65000)=0x3fb, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000004e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/23 10:35:01 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) unshare(0x40600) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000040)) 2018/04/23 10:35:01 executing program 0: r0 = memfd_create(&(0x7f0000ee4000)='/dev/vga_arbiter\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') sendfile(r0, r1, &(0x7f00000001c0), 0x3) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/23 10:35:01 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x9, 0x4) writev(r0, &(0x7f0000f7ffe0)=[{&(0x7f0000357000), 0x1023c}], 0x1) 2018/04/23 10:35:01 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) 2018/04/23 10:35:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000040)="ff55d36cffba04365d0000000000000101000000", 0x14) setsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f0000000000)="ff55d36cffba04365d0000000000000101000000", 0x14) 2018/04/23 10:35:01 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1=0xe0000001}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/23 10:35:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f0000000000), 0x0) 2018/04/23 10:35:01 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0xf100, 0xffffffffffffffff) 2018/04/23 10:35:01 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="01000000953900001b00000000000000", 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syz+aller0\x00', 0x2001}) close(r1) 2018/04/23 10:35:01 executing program 0: clock_gettime(0x6, &(0x7f0000000040)) 2018/04/23 10:35:01 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) unshare(0x40600) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000040)) 2018/04/23 10:35:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2018/04/23 10:35:02 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1=0xe0000001}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/23 10:35:02 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000852000/0x1000)=nil, 0x1000, 0x6, 0xffffffffffffffff) 2018/04/23 10:35:02 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f000073aff0)=@req={0x1000, 0x7, 0x1000, 0x7}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000180)=@req={0x0, 0x3}, 0x10) 2018/04/23 10:35:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000000)=""/57, &(0x7f0000000040)=0x39) 2018/04/23 10:35:02 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x9, 0x4) writev(r0, &(0x7f0000f7ffe0)=[{&(0x7f0000357000), 0x1023c}], 0x1) 2018/04/23 10:35:02 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) unshare(0x40600) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000040)) 2018/04/23 10:35:02 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="01000000953900001b00000000000000", 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syz+aller0\x00', 0x2001}) close(r1) 2018/04/23 10:35:02 executing program 4: rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x402470, {0xffffffbfffbff270}}, &(0x7f0000000380), 0x8, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') 2018/04/23 10:35:02 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1=0xe0000001}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/23 10:35:02 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x6, 0x4000000000080, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000000040), &(0x7f0000950000)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000140)="b67e630a05", &(0x7f00000001c0)=""/181}, 0x18) 2018/04/23 10:35:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/23 10:35:02 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000180)={{0x4000001ff, 0x2010000080000c}, {0x6}}) 2018/04/23 10:35:02 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="01000000953900001b00000000000000", 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syz+aller0\x00', 0x2001}) close(r1) 2018/04/23 10:35:02 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) unshare(0x40600) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000040)) 2018/04/23 10:35:02 executing program 4: rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x402470, {0xffffffbfffbff270}}, &(0x7f0000000380), 0x8, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') 2018/04/23 10:35:02 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x9, 0x4) writev(r0, &(0x7f0000f7ffe0)=[{&(0x7f0000357000), 0x1023c}], 0x1) 2018/04/23 10:35:03 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1=0xe0000001}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/23 10:35:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x200, 0x4, 0x101000001}, 0x2c) 2018/04/23 10:35:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/23 10:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns/user\x00') setns(r0, 0x0) 2018/04/23 10:35:03 executing program 4: rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x402470, {0xffffffbfffbff270}}, &(0x7f0000000380), 0x8, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') 2018/04/23 10:35:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2a8, 0x140, 0xffffffff, 0xffffffff, 0x140, 0xffffffff, 0x250, 0xffffffff, 0xffffffff, 0x250, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x3) 2018/04/23 10:35:03 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000dfaff0)="01000000953900001b00000000000000", 0x10) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syz+aller0\x00', 0x2001}) close(r1) 2018/04/23 10:35:03 executing program 7: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000002840)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000fa3000)={&(0x7f0000d0b000)=@ax25, 0x10, &(0x7f00002e6f80), 0x0, &(0x7f0000878000)}, 0x0) recvmsg$kcm(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002700)=""/37, 0x25}, 0x0) recvmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=""/251, 0xfb}}, {{&(0x7f0000000380)=@in={0x0, 0x0, @multicast1}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=""/77, 0x4d}}, {{&(0x7f00000004c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/75, 0x4b}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000002880)=""/4096, 0x1000}], 0x3, &(0x7f0000000700)=""/95, 0x5f}}, {{&(0x7f0000000780)=@ax25, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)=""/44, 0x2c}}], 0x4, 0x0, &(0x7f0000000d00)={0x77359400}) 2018/04/23 10:35:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000d4b000)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/23 10:35:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000f9e000)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000fe1ff4)) dup2(r2, r0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000080)) 2018/04/23 10:35:03 executing program 7: r0 = syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f00000000c0)) 2018/04/23 10:35:03 executing program 4: rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x402470, {0xffffffbfffbff270}}, &(0x7f0000000380), 0x8, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') 2018/04/23 10:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns/user\x00') setns(r0, 0x0) 2018/04/23 10:35:03 executing program 0: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200) 2018/04/23 10:35:03 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)) [ 96.827243] ================================================================== [ 96.834779] BUG: KMSAN: uninit-value in inet_getpeer+0x1567/0x1e70 [ 96.841112] CPU: 1 PID: 7796 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 96.847951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.857304] Call Trace: [ 96.859903] dump_stack+0x185/0x1d0 [ 96.863542] ? inet_getpeer+0x1567/0x1e70 [ 96.867692] kmsan_report+0x142/0x240 [ 96.871503] __msan_warning_32+0x6c/0xb0 2018/04/23 10:35:03 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/106, 0x6a) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 2018/04/23 10:35:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000f9e000)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000fe1ff4)) dup2(r2, r0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000080)) [ 96.875573] inet_getpeer+0x1567/0x1e70 [ 96.879564] ? kmsan_set_origin_inline+0x6b/0x120 [ 96.884413] ? __msan_poison_alloca+0x15c/0x1d0 [ 96.889086] ? l3mdev_master_ifindex_rcu+0x2b/0x200 [ 96.894107] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 96.899476] icmpv4_xrlim_allow+0x3b5/0x530 [ 96.903816] icmp_send+0x224b/0x2db0 [ 96.907539] ? ip_local_deliver_finish+0x27b/0xec0 [ 96.912488] ip_local_deliver_finish+0xe40/0xec0 [ 96.917254] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 96.922637] ip_local_deliver+0x43c/0x4e0 [ 96.926800] ? ip_local_deliver+0x4e0/0x4e0 [ 96.931134] ? ip_call_ra_chain+0x7b0/0x7b0 [ 96.935459] ip_rcv_finish+0xa36/0x1d00 [ 96.939443] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 96.944818] ? nf_hook_slow+0x36f/0x3d0 [ 96.948802] ip_rcv+0x118f/0x16d0 [ 96.952268] ? ip_rcv+0x16d0/0x16d0 [ 96.955913] __netif_receive_skb_core+0x47df/0x4a90 [ 96.960942] ? ip_local_deliver_finish+0xec0/0xec0 [ 96.965895] netif_receive_skb_internal+0x49d/0x630 [ 96.970921] ? netif_receive_skb+0x47/0x240 [ 96.975250] netif_receive_skb+0x230/0x240 [ 96.979502] tun_get_user+0x740f/0x7c60 [ 96.983503] tun_chr_write_iter+0x1d4/0x330 [ 96.987842] ? tun_chr_read_iter+0x460/0x460 [ 96.992249] do_iter_readv_writev+0x84d/0xa00 [ 96.996749] ? tun_chr_read_iter+0x460/0x460 [ 97.001156] do_iter_write+0x30d/0xd40 [ 97.005050] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 97.010509] do_writev+0x3c9/0x830 [ 97.014061] ? syscall_return_slowpath+0xe9/0x700 [ 97.018910] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.024273] ? fput+0x25c/0x2e0 [ 97.027560] SYSC_writev+0x9b/0xb0 [ 97.031109] SyS_writev+0x56/0x80 [ 97.034567] do_syscall_64+0x309/0x430 [ 97.038470] ? SYSC_readv+0xb0/0xb0 [ 97.042102] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.047299] RIP: 0033:0x455241 [ 97.050487] RSP: 002b:00007fe7120e6ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 97.058199] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000455241 [ 97.065465] RDX: 0000000000000001 RSI: 00007fe7120e6bf0 RDI: 00000000000000fc [ 97.072731] RBP: 0000000020000040 R08: 00000000000000fc R09: 0000000000000000 [ 97.080004] R10: 000000000000002a R11: 0000000000000293 R12: 00000000ffffffff [ 97.087276] R13: 0000000000000661 R14: 00000000006fc9b8 R15: 0000000000000000 [ 97.094547] [ 97.096170] Uninit was created at: [ 97.099717] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 97.104826] kmsan_kmalloc+0x94/0x100 [ 97.108631] kmem_cache_alloc+0xaab/0xb90 [ 97.112787] inet_getpeer+0xed8/0x1e70 [ 97.116713] ip4_frag_init+0x4d1/0x740 [ 97.120605] inet_frag_find+0x7da/0x1610 [ 97.124669] ip_defrag+0x4ba/0x6860 [ 97.128297] ip_local_deliver+0x18f/0x4e0 [ 97.132448] ip_rcv_finish+0xa36/0x1d00 [ 97.136424] ip_rcv+0x118f/0x16d0 [ 97.139875] __netif_receive_skb_core+0x47df/0x4a90 [ 97.144889] netif_receive_skb_internal+0x49d/0x630 [ 97.149888] netif_receive_skb+0x230/0x240 [ 97.154112] tun_get_user+0x740f/0x7c60 [ 97.158085] tun_chr_write_iter+0x1d4/0x330 [ 97.162390] do_iter_readv_writev+0x84d/0xa00 [ 97.166868] do_iter_write+0x30d/0xd40 [ 97.170738] do_writev+0x3c9/0x830 [ 97.174270] SYSC_writev+0x9b/0xb0 [ 97.177814] SyS_writev+0x56/0x80 [ 97.181263] do_syscall_64+0x309/0x430 [ 97.185142] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.190307] ================================================================== [ 97.197645] Disabling lock debugging due to kernel taint [ 97.203080] Kernel panic - not syncing: panic_on_warn set ... [ 97.203080] [ 97.210433] CPU: 1 PID: 7796 Comm: syz-executor2 Tainted: G B 4.16.0+ #87 [ 97.218551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.227882] Call Trace: [ 97.230463] dump_stack+0x185/0x1d0 [ 97.234087] panic+0x39d/0x940 [ 97.237279] ? inet_getpeer+0x1567/0x1e70 [ 97.241411] kmsan_report+0x238/0x240 [ 97.245193] __msan_warning_32+0x6c/0xb0 [ 97.249236] inet_getpeer+0x1567/0x1e70 [ 97.253945] ? kmsan_set_origin_inline+0x6b/0x120 [ 97.258790] ? __msan_poison_alloca+0x15c/0x1d0 [ 97.263467] ? l3mdev_master_ifindex_rcu+0x2b/0x200 [ 97.268489] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 97.273847] icmpv4_xrlim_allow+0x3b5/0x530 [ 97.278160] icmp_send+0x224b/0x2db0 [ 97.281862] ? ip_local_deliver_finish+0x27b/0xec0 [ 97.286868] ip_local_deliver_finish+0xe40/0xec0 [ 97.291616] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 97.296977] ip_local_deliver+0x43c/0x4e0 [ 97.301129] ? ip_local_deliver+0x4e0/0x4e0 [ 97.305432] ? ip_call_ra_chain+0x7b0/0x7b0 [ 97.309742] ip_rcv_finish+0xa36/0x1d00 [ 97.313719] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 97.319074] ? nf_hook_slow+0x36f/0x3d0 [ 97.323049] ip_rcv+0x118f/0x16d0 [ 97.326504] ? ip_rcv+0x16d0/0x16d0 [ 97.330119] __netif_receive_skb_core+0x47df/0x4a90 [ 97.335135] ? ip_local_deliver_finish+0xec0/0xec0 [ 97.340060] netif_receive_skb_internal+0x49d/0x630 [ 97.345074] ? netif_receive_skb+0x47/0x240 [ 97.349395] netif_receive_skb+0x230/0x240 [ 97.353620] tun_get_user+0x740f/0x7c60 [ 97.357679] tun_chr_write_iter+0x1d4/0x330 [ 97.361996] ? tun_chr_read_iter+0x460/0x460 [ 97.366408] do_iter_readv_writev+0x84d/0xa00 [ 97.370913] ? tun_chr_read_iter+0x460/0x460 [ 97.375336] do_iter_write+0x30d/0xd40 [ 97.379222] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 97.384661] do_writev+0x3c9/0x830 [ 97.388196] ? syscall_return_slowpath+0xe9/0x700 [ 97.393041] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.398404] ? fput+0x25c/0x2e0 [ 97.401679] SYSC_writev+0x9b/0xb0 [ 97.405204] SyS_writev+0x56/0x80 [ 97.408644] do_syscall_64+0x309/0x430 [ 97.412539] ? SYSC_readv+0xb0/0xb0 [ 97.416167] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.421356] RIP: 0033:0x455241 [ 97.424543] RSP: 002b:00007fe7120e6ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 97.432254] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000455241 [ 97.439524] RDX: 0000000000000001 RSI: 00007fe7120e6bf0 RDI: 00000000000000fc [ 97.446776] RBP: 0000000020000040 R08: 00000000000000fc R09: 0000000000000000 [ 97.454037] R10: 000000000000002a R11: 0000000000000293 R12: 00000000ffffffff [ 97.461301] R13: 0000000000000661 R14: 00000000006fc9b8 R15: 0000000000000000 [ 97.469083] Dumping ftrace buffer: [ 97.472610] (ftrace buffer empty) [ 97.476300] Kernel Offset: disabled [ 97.479903] Rebooting in 86400 seconds..