INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. 2018/04/25 20:59:54 fuzzer started 2018/04/25 20:59:55 dialing manager at 10.128.0.26:38541 syzkaller login: [ 52.821897] can: request_module (can-proto-0) failed. [ 52.833240] can: request_module (can-proto-0) failed. 2018/04/25 21:00:03 kcov=true, comps=false 2018/04/25 21:00:07 executing program 0: r0 = memfd_create(&(0x7f0000000000)=']ppp1md5sumposix_acl_access\x00', 0x1) recvfrom$ipx(r0, &(0x7f0000000040)=""/179, 0xb3, 0x40012061, &(0x7f0000000100)={0x4, 0x2, 0x5, "f274b4685cc9", 0xff}, 0x10) write$rdma_cm(r0, &(0x7f0000001880)=@create_id={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001840)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f00000018c0)=@resolve_addr={0x15, 0x110, 0xfa00, {r1, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x1}, @ib={0x1b, 0x5, 0x8, {"9136dcaed18332cada2d082f928c6b27"}, 0x5, 0x8e, 0x40}}}, 0x118) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001a40)) pkey_alloc(0x0, 0x1) syz_open_pts(r0, 0x40000) r3 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000001b00)={{0x3, 0x7, 0x10001, 0x100000000, "2443d41827eff6d40415dda2f759ce7b21521e2f8adb1bfca10b1d09609314851a122071a7772c9d00ed9bac", 0x1}, 0x0, 0x0, 0x101, r3, 0x9, 0x41a, "bbc085cc495e6ade0335bb440ec1a930fcf32e36c0da46a8d72c4822ce6ce0a4a69da3d191c913ce77c6762edcc88d60af9ceba7214105ebed4f9e7d03aae201", &(0x7f0000001a80)="2a70707030766d6e6574302e776c616e30776c616e3076626f786e65743162646576026c6f70726f63706f7369785f61636c5f61636365737376626f786e6574305e2973656c696e75785e626465765b5e25230173656375726974796367726f757000", 0x63, [], [0x9, 0x5, 0x9, 0x8f6d]}) r4 = semget$private(0x0, 0x0, 0xd6) semop(r4, &(0x7f0000001c40)=[{0x3, 0x8, 0x800}], 0x1) stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000001d40)={{0xa2, 0x4}, 0x75}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001d80)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x5}}, 0x369351ae, 0x8, 0x9, 0x68f, 0x8}, &(0x7f0000001e40)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001e80)=@assoc_id=r7, &(0x7f0000001ec0)=0x4) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001f00)) ioctl$TCSBRKP(r0, 0x5425, 0x7ff) chown(&(0x7f0000001f40)='./file0/file0\x00', r5, r6) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000001f80)={&(0x7f0000ffa000/0x1000)=nil, 0x7fffffff, 0x0, 0x80, &(0x7f0000ffc000/0x3000)=nil, 0xffffffffffffff01}) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x200) semop(r4, &(0x7f0000001fc0)=[{0x2, 0x6, 0x800}, {0x0, 0x0, 0x800}, {0x2, 0x81}, {0x0, 0x81, 0x800}, {0x0, 0x5, 0x800}, {0x0, 0x400, 0x1000}, {0x3, 0x80000001, 0x1000}, {0x3, 0xf0, 0x1800}], 0x8) sendmsg$nl_generic(r0, &(0x7f0000003100)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x40080}, 0xc, &(0x7f00000030c0)={&(0x7f0000002040)={0x1074, 0x40, 0x308, 0x70bd26, 0x25dfdbff, {0x9}, [@typed={0x1004, 0x5a, @binary="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"}, @typed={0x14, 0x55, @ipv6}, @generic="24ba9e29fd3c0ae646f92edf33db3901ba0073de8756000eed4ed0675dabfcf847049bec067dd8e95f6b336e813485cfc76e015cff5b93dd3a1da251b3a1f7", @typed={0x8, 0x1e, @uid=r5}]}, 0x1074}, 0x1, 0x0, 0x0, 0x20000810}, 0x4010) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$KDENABIO(r0, 0x4b36) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000003140)) 2018/04/25 21:00:07 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000540)={{0x1f, 0x3fa3503, 0x497, 0x3, 0x8000, 0x100000001}, 0x2a2, 0x9, 0x800, 0x0, 0x10001, "3074e78e0088cdff65194ac26c4dc08ad40e65910730722407f86fa87e3bfd7a0f94cf09fde4e77fb28b0a8050c4c5c4254c4d29a9b03606cfccae84aa723f79ebb037909e8a4384e569e1556532a5235aea5a823ae2ce235bf5edbe3114c8884051d058ff1dcf73da0c754be2060a9f304d726ebaaa3682a123adce1ae93382"}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x840, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x40000) fdatasync(r0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=0x1000) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000016c0)=""/22) getsockopt$inet_int(r2, 0x0, 0x13, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xfd54) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000001780)={0x5, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x1, 0x8, [{{0x2, 0x4e24}}, {{0x2, 0x4e24, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @loopback=0x7f000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}, {{0x2, 0x4e23}}, {{0x2, 0x4e24}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}, {{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}]}, 0x490) getrlimit(0xd, &(0x7f0000001c40)) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000001c80)={0x10001, 0x3, 0xff, 0x4, 0xfffffffffffffffc}) io_setup(0x6, &(0x7f0000001cc0)=0x0) io_destroy(r3) clock_nanosleep(0x0, 0x0, &(0x7f0000001d00), &(0x7f0000001d40)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001d80)='/dev/ppp\x00', 0x200000, 0x0) accept$packet(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001e00)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000001e40)={r5, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000001e80)={0x16, @multicast1=0xe0000001, 0x4e22, 0x4, 'sh\x00', 0x10, 0x1, 0x42}, 0x2c) getdents(r4, &(0x7f0000001ec0)=""/61, 0x3d) sendmsg$rds(r0, &(0x7f0000003480)={&(0x7f0000001f00)={0x2, 0x4e20}, 0x10, &(0x7f0000003340)=[{&(0x7f0000001f40)=""/235, 0xeb}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/224, 0xe0}, {&(0x7f0000003140)=""/25, 0x19}, {&(0x7f0000003180)=""/191, 0xbf}, {&(0x7f0000003240)=""/115, 0x73}, {&(0x7f00000032c0)=""/116, 0x74}], 0x7, &(0x7f0000003440)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000033c0)=""/31, 0x1f}, &(0x7f0000003400), 0x10}}], 0x30, 0x85}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000034c0)='/dev/ppp\x00', 0x301000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000003500)={0xffffffff, 0x1, 0x5, 0x5}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000003540)={0x0, 0x3}, &(0x7f0000003580)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000035c0)={r6, @in6={{0xa, 0x4e21, 0x6, @empty, 0x9b8}}, 0x45, 0x7, 0x2, 0x8, 0x8001}, &(0x7f0000003680)=0x98) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000036c0)={0x400, {{0x2, 0x4e23, @multicast2=0xe0000002}}}, 0x88) sendto$inet(r2, &(0x7f0000003780)="f7381edbd60dcc033293ddff99e6ef8f0bf7954aa37e289ba885c8baa3603da6c8bc539c9093b34cc8a0759f2bc6ef664aa82915f26ef7dca243ff0f515a", 0x3e, 0x20000000, &(0x7f00000037c0)={0x2, 0x4e20}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000003800)={r7, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, [0x7ff, 0xffffffff, 0x10001, 0x1, 0x4, 0x6, 0x3b0, 0x9, 0x8, 0xc92, 0xfffffffffffffffc, 0x9, 0x9e, 0x8120, 0xff]}, &(0x7f0000003900)=0x100) syz_mount_image$minix(&(0x7f0000003940)='minix\x00', &(0x7f0000003980)='./file0\x00', 0x5, 0x5, &(0x7f0000003d00)=[{&(0x7f00000039c0)="1106f0e6c6bd9e8140b2e426dc9f0d37d2ac735d8c9bac5e7654d90bf118", 0x1e, 0x6}, {&(0x7f0000003a00)="977b9b39e81fbd2a1d49e944eb5fe5281eae4d2d02544b2b55f737b30b08eb908e684f5f15fb56c1a0de6bcfd2ce953e4e03d2ef070312c12384bf8cf241ffc38df199523f1df898281fd92246028afe32e8b5d50c77fb8a715cd1e1c75b4a3a5ab60e90109fcd7ce11ef1872b0781e26dc62bd5462e3d477359a48a97a2e8277b3a7ff9a507fc78f5181f16cad4bb96082f4cc63f57c4f695b272fbb77310d24cea1596f9a6b796072a068f2cab330f1be77cb8017d75161a8968952d8adeb6af855f53c57c7aeb43238050c5472bf160f47f0b35f8586d4244c9b2ab6a8a046819f550f3f0fd2c56903c", 0xeb, 0x2}, {&(0x7f0000003b00)="8ec758a91024a25e557e5669d65e153125e53fba78f9484bab1c1ad04672352f2b5855a717a9f7025726df4a9918ecb682cb361ae282965efc9941031dc52be23173699b88896bdf7ba4aa736708ea50958742fae9a3530aea480eac25354bd3005df3b8db3fccd64beead69874570152d38257d132eff1e4290b4ac175832671c2601f84e97059abcf5fe532f3a14c06d6011c4d53a34dcbdfd22b3334b6df036dde0374bcfb9cc91a8b2ca179d5c0ba85a13b6a6a26c20aaa5e0f2941554d15c3b70b7612d4f3d87", 0xc9, 0x40}, {&(0x7f0000003c00)="a46eca612bd6afbbff4da9c4dd1460af0984fccb2b68a94bc5e6564132695a06f1e81cf03648860fa8dbd04fff22ddad1eef7d56c31d3db5", 0x38, 0x100000000}, {&(0x7f0000003c40)="b23891d457530f1370ef9461a470f4109bc3b8699c6bbabf4dab820bbddb9cbdd215a451f5b47bcfe67a7eae0c424085b455852b0ddac6c61aab48f3038be981b3b41b7fae660bedb27657e6c49485fdf3fe97d3f5946cc353ce836310ccc76e3a451375055d15bf8fd90d4faf631e625a3a79c83e84f755f59cbc97a8e69bb77c3bfc4e1038e3068cc7cce96d8917925c6715d6975db89b4aef64b3f6d85e8a881dfd2fe4f8", 0xa6, 0x400}], 0x800000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000003d80)={r8, 0xf, "84dd0e6d2e0e43084b60afd1300deb"}, &(0x7f0000003dc0)=0x17) 2018/04/25 21:00:07 executing program 4: r0 = mq_open(&(0x7f0000000000)='Atrustedem0selinuxvmnet1bdev\x00', 0x80, 0x180, &(0x7f0000000040)={0x9, 0x8, 0x401, 0x8, 0x2, 0x80, 0x6, 0x6}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000080)={@rand_addr, @multicast1}, &(0x7f00000000c0)=0xc) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x400000) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x9) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x3f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e20, 0xdcc, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x1, 0x4815}, &(0x7f00000002c0)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000300)={0x9, 0x6, 0x204, 0x80, 0x6, 0x80000000, 0x69fd, 0x0, r4}, &(0x7f0000000340)=0x20) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000380)={0xa42c, 0x0, {0x2, 0x3, 0x2, 0x1, 0x9c0}}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000400)={0x4, 0x4, [0x8]}) getsockname$ax25(r2, &(0x7f0000000440), &(0x7f0000000480)=0x10) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f00000004c0)=0x4, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000500)={0x1, 0x400, 0xa, 0x3, 0x3, 0x0, 0x4, 0x5, r5}, 0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000540)={r3, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000580)={r3, 0x8, 0x400, 0x4}, 0x10) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000005c0)={0x20000000, 0x8000, 0x25}) syncfs(r2) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000640)={'team0\x00', r6}) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000680), &(0x7f00000006c0)=0xb) r7 = request_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000780)='GPL*userguserproc\x00', 0xfffffffffffffffa) r8 = request_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000840)='md5sumppp0ppp0ppp1selinux,vmnet0\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r7, 0x77, r8) r9 = syz_open_dev$mouse(&(0x7f0000000880)='/dev/input/mouse#\x00', 0x2, 0x8000) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000008c0)={@dev, @remote}, &(0x7f0000000900)=0x8) ftruncate(r1, 0xc5b4) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000940)=0x9) semget$private(0x0, 0x2, 0x400) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000980)={0x8, 0x0, 0x2, 0xa9}) ioctl$DRM_IOCTL_AGP_BIND(r9, 0x40106436, &(0x7f00000009c0)={r10, 0x1000}) 2018/04/25 21:00:07 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x2, &(0x7f00000000c0)={0x500}, 0x8) write$tun(r0, &(0x7f0000000100)={@void, @hdr={0x2, 0x7, 0x7ff, 0x9, 0x1, 0x2}, @ipx={0xffff, 0xd6, 0x8000, 0x14, {@random=0x7, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2}, {@broadcast=0xffffffff, @current, 0xb92}, "1319b504aad895f7a8194fb5a2edc0cdf2d7e73ef5be077b46f13dfb9143d79fc2b0614699b2db44bf9c16cf1eded1deded4576979b5abedfdbae4f4c819466351497a6bf9e6381474e35068e60a731a0d494f84a6644751f585deead9192c071df0aa71a550b5fec2671787acefe6426bfb91edaf9ab6fc2573ae9a010fa4d1e708c772c63fc78c2bb50fca6f322f2007d3626bd12eebc7054afc1e9e9f1193e7b7848b9a4b9cf1ddebc5a875182fc6eb6195c69adc7662"}}, 0xe0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000280)=""/79) bind$rds(r0, &(0x7f0000000300)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x50, &(0x7f0000000380)}, 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x1, 0x2, 0x4}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000004c0)={0x6, 0x5, 0xffffffffffff7fff, 0x681a, r3}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0xd56, 0xd, 0x9, 0x5c2, r3}, &(0x7f0000000580)=0x10) ioctl$TCSBRKP(r0, 0x5425, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) get_robust_list(r5, &(0x7f0000000740)=&(0x7f0000000700)={&(0x7f0000000680)={&(0x7f0000000640)}, 0x0, &(0x7f00000006c0)}, &(0x7f0000000780)=0x18) getsockopt(r0, 0x1, 0xa1, &(0x7f00000007c0)=""/21, &(0x7f0000000800)=0x15) ioctl$KDSKBLED(r0, 0x4b65, 0x6) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x82201080}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r2, 0x10, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x4000) r7 = accept4(r0, &(0x7f0000000940)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000009c0)=0x80, 0x80000) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000000a00)=r4, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000a40)) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001100)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000b00)={0x58c, r9, 0x2, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x1a4, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x8000, 0x9, 0xffffffff, 0x8}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xfeb}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x4, 0x2}}, {{0x8, 0x1, r8}, {0x264, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x4, 0x2}}, {{0x8, 0x1, r8}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}]}}]}, 0x58c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000001140)=""/148) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001200)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001, 0x4e20, 0x3ff, 0x4e23, 0x101, 0xa, 0x0, 0x80, 0x2b, r8, r6}, {0x0, 0x5, 0x8001, 0x100000000, 0x7, 0x90000, 0x7f}, {0x22c, 0x0, 0x8000, 0x8}, 0x2, 0x0, 0x3, 0x0, 0x2, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d6, 0x7f}, 0xa, @in6=@dev={0xfe, 0x80, [], 0xb}, 0x3505, 0x7, 0x3, 0x81, 0x10001, 0x0, 0x9}}, 0xe8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r0, 0x50, &(0x7f0000001300)}, 0x10) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) 2018/04/25 21:00:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rpc\x00') ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @broadcast=0xffffffff}, {0x6}, 0x8, {0x2, 0x4e24, @broadcast=0xffffffff}, 'veth1_to_team\x00'}) ioctl$TCGETA(r0, 0x5405, &(0x7f00000000c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x7, 0x1, 0x6, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) r1 = accept4$netrom(r0, &(0x7f0000000180)=@full, &(0x7f0000000200)=0x48, 0x80800) r2 = accept$netrom(r0, &(0x7f0000000240)=@full, &(0x7f00000002c0)=0x48) getrusage(0x0, &(0x7f0000000300)) munlockall() r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) ioctl$sock_netrom_TIOCOUTQ(r2, 0x5411, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)) r4 = dup2(r2, r0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000440)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0x80045500, &(0x7f0000000480)=""/29) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000004c0)) fchmod(r1, 0x2) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x4a0, 0x140, 0x0, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000500), {[{{@arp={@multicast1=0xe0000001, @loopback=0x7f000001, 0xffffffff, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}, {[0x0, 0xff, 0x0, 0xff, 0xff]}, 0x2, 0x3, 0x8, 0x7, 0x400, 0x640, 'bond_slave_1\x00', 'bpq0\x00', {0xff}, {0xff}, 0x0, 0x2}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @multicast1=0xe0000001, @loopback=0x7f000001, 0x8, 0x1}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x5, 0xffffffffffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x20, @broadcast=0xffffffff, 0x6, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) syz_open_dev$sndctrl(&(0x7f0000000a40)='/dev/snd/controlC#\x00', 0x2, 0x400000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000a80)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x5, 0x0, 0x1, 0x40, 0x963}, &(0x7f0000000b40)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000b80)=@assoc_value={r5, 0xc0000}, 0x8) recvfrom$llc(r0, &(0x7f0000000bc0)=""/78, 0x4e, 0x2000, &(0x7f0000000c40)={0x1a, 0x30b, 0x2, 0x88, 0x7, 0xffffffffffff7f98, @random="ad9c1632ded9"}, 0x10) splice(r2, &(0x7f0000000c80), r0, &(0x7f0000000cc0), 0x1, 0x0) recvmsg(r2, &(0x7f00000015c0)={&(0x7f0000000d00)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000d80)=""/225, 0xe1}, {&(0x7f0000000e80)=""/235, 0xeb}, {&(0x7f0000000f80)=""/12, 0xc}, {&(0x7f0000000fc0)=""/131, 0x83}, {&(0x7f0000001080)=""/152, 0x98}, {&(0x7f0000001140)}, {&(0x7f0000001180)=""/150, 0x96}, {&(0x7f0000001240)=""/215, 0xd7}, {&(0x7f0000001340)=""/131, 0x83}], 0x9, &(0x7f00000014c0)=""/199, 0xc7, 0x52}, 0x10041) name_to_handle_at(r0, &(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x65, 0x3ff8000, "bd704863bcf15479f2ca9f037eace92d334f6b569d6a9b7b9d62729e4b6eea9e5cf7e1105cef58fb9104a088619d7932914ddaedf6ce03b96fd88381ab279d312f16bf9f39c49198aba1133784385638237d3d9d9ffc725be407fd67e8"}, &(0x7f00000016c0), 0x400) getitimer(0x0, &(0x7f0000001700)) r6 = getuid() getgroups(0x1, &(0x7f00000017c0)=[0x0]) syz_fuseblk_mount(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)='./file1\x00', 0x6000, r6, r7, 0x0, 0x7838, 0x80) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000001800)={0xb638, 0x400, 0x2, 0x5, 0x62db, 0x3ab4}) 2018/04/25 21:00:07 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@reserved=0x1}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)={@my=0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={r2, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) prctl$seccomp(0x16, 0x3, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x100000001, 0x41ed, 0x2, 0x6}, {0x0, 0x5, 0x5, 0x80000001}]}) symlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0\x00') ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000480)) sendmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="378a4aebb8e25feb4ef3127d18518d572844e5f2934cbfa88e4850bed139008ba79cffd997681b25866b1ee25531729a8669d343bf106abf077ecbc45201ad760e811744f97b76a2d715cdaa8481032b3350320289730390e29356405157ba7e03710b139cfc078c9140ccba8a84fed799c4f48da32c1f76569af6e956591b21f3441dd66aa0fdaa0649f62b8ca8b33809c2d18b6ec021e22fc6250442101d7d96e4924e35b789c280", 0xa9}], 0x1, 0x0, 0x0, 0x801}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000600), &(0x7f0000000640)=0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000680)=0x2) bind$inet(r0, &(0x7f00000006c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) fchdir(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000700)=[@in={0x2, 0x4e21}, @in={0x2, 0x4e20}], 0x20) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x70, 0x4, 0x4, 0x3, 0x1, 0x0, 0x96, 0x5e524, 0xa, 0x400, 0x3, 0x4, 0x9, 0x4, 0x7, 0x8000, 0x2, 0x4, 0x2, 0xbd, 0x85b, 0x8, 0x400, 0x9, 0x5, 0x2, 0x7cc, 0x0, 0x9, 0x8, 0xd5, 0x5, 0x0, 0x1, 0x8, 0x0, 0x80000001, 0x0, 0x100000001, 0x4, @perf_config_ext={0x6, 0x8}, 0x2, 0x20000000000000, 0x9fc1, 0x0, 0x3, 0x800, 0x3}, r3, 0xc, r0, 0xb) recvfrom$unix(r0, &(0x7f0000000800)=""/239, 0xef, 0x10002, &(0x7f0000000900)=@file={0x1, './file0\x00'}, 0x6e) move_pages(r3, 0x7, &(0x7f0000000980)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f00000009c0)=[0x2, 0x200, 0x40, 0x0, 0x1, 0x8001, 0x2400000, 0x7], &(0x7f0000000a00)=[0x0], 0x6) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000a40)=@generic={0x8}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000a80)={0x77359400}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/mixer\x00', 0x408000, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000b00)="58482fd1191386bec34b06e5d656c89bf16a99cf199c212a702a265b6b3c8da3000c21376d285587cfbb5af63095369f87e1007448b0febefaf805915e83d6047246339a2ad6376e0592082737") clock_gettime(0x0, &(0x7f0000000b80)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000bc0)={{0xda79, 0x0, 0x8, 0x1, "dab89bc92c20e5e0e3afcbb80cbb6a2a362563ac32e38c30f30f1b814f2660f4f30f060337f83b2badb45b53", 0x80000000}, 0x3, [0x1f, 0x80000000, 0xfffffffffffff801, 0x2, 0x3, 0xeeb, 0x6, 0x3, 0x2, 0x8, 0x400, 0x1000, 0x1, 0x60, 0x7, 0x3cca, 0x9, 0x6, 0x5, 0x5, 0x7fffffff, 0xcf2c, 0x2, 0x0, 0x8, 0x2, 0x100000000, 0x0, 0x0, 0xbc, 0xffffffff, 0xe70, 0x8, 0x3fca, 0x5dd2, 0x401, 0x1, 0x0, 0x9, 0x9, 0x7fff, 0x6, 0xfffffffeffffffff, 0x3, 0x2, 0x4, 0x24d, 0x6, 0x4, 0x5, 0xc72d, 0x8, 0x9, 0x3f, 0xc946, 0x7, 0xffffffff, 0x8, 0xfff, 0x4b95a9a2, 0x401, 0x1, 0x7, 0x6, 0x10001, 0x3, 0x139, 0xfe4, 0x3, 0x8, 0x6, 0x7fffffff, 0x5, 0x7, 0x64000000, 0x404000000000, 0x92f, 0x88, 0x7f, 0x7fff, 0x6, 0x3, 0x800, 0x7, 0x96, 0x3, 0x101, 0x6, 0x81, 0x1, 0x1, 0x9, 0x0, 0x5, 0x0, 0x10d, 0x4, 0x9, 0x0, 0x9, 0x7, 0x100, 0x9, 0x8, 0x20, 0x4, 0x3, 0x1133, 0x4, 0x650160f2, 0x6, 0x100000000, 0xff, 0x7fffffff, 0x3, 0xffffffff, 0x87c, 0xffffffff, 0x4, 0x3, 0x81, 0xdce, 0x2, 0x401, 0x10000, 0x9ee, 0x3, 0xfffffffffffffffa], {r5, r6+10000000}}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000010c0)=0x6, 0x4) r7 = request_key(&(0x7f0000001100)='id_legacy\x00', &(0x7f0000001140)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001180)='/dev/vhost-vsock\x00', 0xfffffffffffffff9) keyctl$setperm(0x5, r7, 0x200) 2018/04/25 21:00:07 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x3, 0x1, 0x2, 0x7, 0x9, 0x2}) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x2000) write$sndseq(r2, &(0x7f0000000140)=[{0x400, 0x6, 0x5, 0x6, @time={0x0, 0x1c9c380}, {0x800, 0x9}, {0x6000000000000, 0x7fff}, @raw32={[0xffffffff80000001, 0x5, 0x8a67]}}, {0x7fff, 0x401, 0xfbe, 0x8, @tick=0x48, {0xffff, 0x8001}, {0x4, 0x1ff}, @quote={{0x8, 0x40}, 0x8, &(0x7f0000000100)={0x1ff, 0x2e, 0xffffffff, 0x800, @time, {0x1, 0x40f96149}, {0x5, 0x4}, @queue={0x1, {0xffffffff, 0x1ff}}}}}, {0xfffffffffffff801, 0x81, 0xffff, 0x1, @tick=0x1, {0x401}, {0xfffffffffffeffff, 0x8}, @queue={0xffffffffffff5f49, {0x9, 0xffffffff}}}, {0x3f, 0x100, 0x9, 0x8, @tick=0x7, {0x8, 0x1}, {0x6a, 0x80000000}, @connect={{0xffffffff, 0x1f}, {0x7, 0x1}}}], 0xc0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000200)=0x80000000, &(0x7f0000000240)=0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000280)={{0xa, 0x4e24, 0x69, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, {0xa, 0x4e23, 0x80, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x3}, 0x6, [0x2, 0x8, 0x6266, 0x7, 0xe51, 0x1, 0x0, 0x40b]}, 0x5c) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000300)=""/195, &(0x7f0000000400)=0xc3) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000440)={'ifb0\x00', 0x2}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000480)={0x0, 0xdf, "54306e425e2975cfe1c7e6e25d6c9b958e89a55ec7c4e75be225f09533920478c89004ab646528ec0244713b81572aabf1bd7281cb8f5ddf1733b728a2bb2fe02e963ec714198ee338ef44b06a959d2bc6c0d302bfe69a9891f6e2c41d9855a2d17f8d96ac87c41467aeac92ba95a85975c18be2ccd99d6164869b915b4731d72707f64ed95016b4f55f3a039824ba84e5d6bec98b9147f91bec14af74c487d982c188f2630ceb45fa1df94f9eecc59986172801246b72d7d143b7d7ee73542c5471822a92bfea514d230cffb12ce8585d143b8637d43bfb35aa1b588869ab"}, &(0x7f0000000580)=0xe7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x7, 0x8, 0xc00, 0xa5, 0x3ff, 0x2, 0x8, 0x9, 0x3, 0x29db, 0x6, 0x4, 0x3, 0xfffffffffffffffa]}, &(0x7f00000006c0)=0x100) lremovexattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@random={'btrfs.', 'ifb0\x00'}) r4 = add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000800)="90a8f674e2513418bfe6e79b5bffb1d6bb535d8e616155d80c458ec6fb147ee618b5fd99a5dba939de85c860c260b2d00bff3b6d7e6b903db62a68bf28eb67a41dfb9bf959f225fb6a4e6a5bc12746836a0972094884c172726bc2fd8a1af698d424a743eeb17437ee9915d6791c076f0f9e340282ea6cb7f0e1f6d08c272eec8d57b3115d3064ecc2cfa70eed2cd25c6d45dde053fd84768610853220c49d3804bb0904d601a9297a77826e5eb9a6491c4014360990f34635aa3e6ff21f72f0ec19a045f2e86263c65eda14337b", 0xce, 0xffffffffffffffff) keyctl$assume_authority(0x10, r4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000900)={0x7}, 0x1) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000940), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000980)={r1, r1}) write$sndseq(r0, &(0x7f00000009c0)=[{0x20, 0x314c, 0x7, 0x8, @tick=0x5, {0x401, 0x6}, {0x4, 0x6}, @connect={{0x39f5, 0x100000001}, {0x1, 0x100}}}], 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) fstat(r1, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r6) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000a80)=""/188) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000b40)={r3, 0x9945}, &(0x7f0000000b80)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000bc0)={{0x100000001, 0x0, 0x0, 0x8, "7fe17978b8085c5ccf4ebdb20c9754f1d0b9799a8882ac3c0075d26aa4eb443a3963d4f6558dcd4dd240945d", 0x9}, 0xa000, [0x1, 0x1, 0x8, 0x800, 0x3, 0xfffffffffffff918, 0xfffffffffffffffe, 0x0, 0x1, 0x55d8dd96, 0x2, 0x8000, 0x9, 0x7fff, 0x80, 0x3, 0xc7, 0x8, 0x7, 0x10000, 0xae9f, 0x10001, 0x6, 0x200, 0x800, 0x4, 0x5, 0x0, 0x8000, 0x7fff, 0x9, 0x6, 0x7fffffff, 0x2b, 0x1ff, 0x1, 0x5, 0x0, 0x10001, 0xfffffffffffffff9, 0xda3e, 0x8, 0xffffffffffff2a9a, 0xa47, 0x7, 0x1, 0x8000, 0x3f, 0x5, 0x800, 0x7fffffff, 0x6, 0xffffffff, 0x1f, 0x6, 0x1, 0x3, 0x0, 0x8, 0x0, 0x81, 0x4, 0xcd93, 0x7, 0x2, 0x200, 0xff, 0x4, 0x4, 0x0, 0x10000, 0x3, 0x7f, 0x8d, 0x0, 0x9, 0x80, 0x0, 0x0, 0x5, 0x0, 0x3, 0x2, 0x400, 0x3, 0x6b8e000000000000, 0x7, 0x9, 0x100, 0x9, 0x48, 0x3, 0xff, 0x9, 0x0, 0x7da, 0x7, 0x7, 0x7, 0x6, 0xffff, 0x0, 0x3, 0x2, 0x9, 0x9, 0xfffffffffffff800, 0x0, 0x3, 0x0, 0xffffffffffffff81, 0x1, 0xfffffffffffffff9, 0x3ff, 0x5, 0x0, 0x1f6, 0x10001, 0x7d7, 0x3, 0xfffffffffffffffb, 0x5, 0x7, 0xa37, 0x0, 0x3ff, 0x9, 0x3], {0x77359400}}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000010c0)) ioctl$TCGETS(r1, 0x5401, &(0x7f0000001100)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000001140)={0x401, 0x8000, 0x44de, 0x0, 0x0, [], [], [], 0x4, 0x7}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) setresuid(r5, r5, r5) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001280)={r3, 0x115f48e5}, &(0x7f00000012c0)=0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000001300), 0x8) 2018/04/25 21:00:07 executing program 6: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xbb}, r1}, 0x14) r2 = dup3(r0, r0, 0x80000) sendmsg$can_raw(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r1}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{0x0, 0x9, 0x1000, 0x3}, 0x40, 0x3, 0x0, 0x0, "52171a64deee7037630d1f92dce4725fc9e6d1d6ce7dd30ccd93a2eff55650962da5b6f0716de04cfc9704a5b47a3b44898df52cd8c685bdaaae0505a9c6f71e"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x40810) close(r2) getsockopt$packet_int(r2, 0x107, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000340)={0x2, 0x1ff, 0xfffffffffffffff7, 0x0, 0x0, [], [], [], 0x9}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000480)={0xffffffff7fffffff, 0x9, 0x100, 'queue0\x00', 0x8}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000540)) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000600)={0x0, 0x1129943b, 0x1ff, 0x5}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000680)={0x80000000, 0x8001, 0xbee, 0x8, r3}, &(0x7f00000006c0)=0x10) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000700)=0xff) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000780)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f00000007c0)={r5}) getsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000800), &(0x7f0000000840)=0x4) r6 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000980)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f00000008c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000900)="d33a72cfe50374967b56751a0769d2", 0xf, r6) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000009c0)={0x0, r4}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000a00)=[@in6={0xa, 0x4e24, 0x1000, @mcast1={0xff, 0x1, [], 0x1}, 0x35}, @in6={0xa, 0x4e23, 0xf91d}], 0x38) socket$vsock_stream(0x28, 0x1, 0x0) fsync(r4) write$binfmt_misc(r0, &(0x7f0000000a40)={'syz1', "6abe6130d8ae87d6580ba7bc0d2c51"}, 0x13) r7 = syz_open_dev$sndseq(&(0x7f0000000a80)='/dev/snd/seq\x00', 0x0, 0x40) getsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x404c534a, &(0x7f0000000b40)={0x8, 0xf45, 0x80000001}) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000bc0)={0x3, r4}) [ 57.977928] IPVS: ftp: loaded support on port[0] = 21 [ 58.126002] IPVS: ftp: loaded support on port[0] = 21 [ 58.179316] IPVS: ftp: loaded support on port[0] = 21 [ 58.255191] IPVS: ftp: loaded support on port[0] = 21 [ 58.334737] IPVS: ftp: loaded support on port[0] = 21 [ 58.425397] IPVS: ftp: loaded support on port[0] = 21 [ 58.584805] IPVS: ftp: loaded support on port[0] = 21 [ 58.732314] IPVS: ftp: loaded support on port[0] = 21 [ 59.509762] ip (4667) used greatest stack depth: 54312 bytes left [ 60.149363] ip (4715) used greatest stack depth: 54248 bytes left [ 60.474678] ip (4749) used greatest stack depth: 54208 bytes left [ 61.189787] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.196353] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.235886] device bridge_slave_0 entered promiscuous mode [ 61.318515] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.325074] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.350210] device bridge_slave_0 entered promiscuous mode [ 61.394327] ip (4812) used greatest stack depth: 54200 bytes left [ 61.452570] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.459132] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.494430] device bridge_slave_1 entered promiscuous mode [ 61.574392] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.580916] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.620714] device bridge_slave_0 entered promiscuous mode [ 61.637909] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.644400] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.657945] device bridge_slave_1 entered promiscuous mode [ 61.723156] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.729811] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.756164] device bridge_slave_0 entered promiscuous mode [ 61.780767] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.787250] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.818156] device bridge_slave_0 entered promiscuous mode [ 61.831946] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.865258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.873445] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.879903] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.914310] device bridge_slave_1 entered promiscuous mode [ 61.931290] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.937764] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.957814] device bridge_slave_0 entered promiscuous mode [ 61.981790] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.988318] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.015010] device bridge_slave_1 entered promiscuous mode [ 62.037003] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.043531] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.071637] device bridge_slave_1 entered promiscuous mode [ 62.112771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.121133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.128676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.140522] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.147091] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.197190] device bridge_slave_1 entered promiscuous mode [ 62.244837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.256370] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.262896] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.308182] device bridge_slave_0 entered promiscuous mode [ 62.327906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.337357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.409374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.448374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.514133] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.520667] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.565125] device bridge_slave_1 entered promiscuous mode [ 62.622145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.650369] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.656924] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.703321] device bridge_slave_0 entered promiscuous mode [ 62.723736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.749206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.828302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.913150] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.919636] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.961206] device bridge_slave_1 entered promiscuous mode [ 62.972777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.019027] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.031106] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.054116] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.125294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.165644] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.289134] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.313905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.326357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.338721] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.355501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.387226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.396195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.473461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.526989] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.538168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.545258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.600449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.608123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.625755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.655892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.696659] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.742931] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.752102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.759186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.786729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.820295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.847288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.854826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.874145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.887363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.933216] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.951848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.959642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.044234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.051246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.078539] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.151894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.159886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.210097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.217766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.260446] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.288185] team0: Port device team_slave_0 added [ 64.376118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.385445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.392898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.454138] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.470641] team0: Port device team_slave_0 added [ 64.515703] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.535334] team0: Port device team_slave_1 added [ 64.558721] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.578905] team0: Port device team_slave_0 added [ 64.597131] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.614141] team0: Port device team_slave_0 added [ 64.631425] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.675494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.698886] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.728995] team0: Port device team_slave_1 added [ 64.765124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.774965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.799184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.828937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.851151] team0: Port device team_slave_1 added [ 64.883725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.892778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.901437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.913095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.936999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.959074] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.974062] team0: Port device team_slave_1 added [ 64.979947] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.997319] team0: Port device team_slave_0 added [ 65.029862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.038776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.063475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.086108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.093179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.102894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.133941] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.145617] team0: Port device team_slave_0 added [ 65.158976] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.166646] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.179017] team0: Port device team_slave_0 added [ 65.227227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.246222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.268529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.277749] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.304798] team0: Port device team_slave_1 added [ 65.316396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.325143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.341281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.355654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.368014] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.392892] team0: Port device team_slave_1 added [ 65.414377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.421516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.438258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.460377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.479532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.495787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.505964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.516661] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.526155] team0: Port device team_slave_1 added [ 65.563607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.575600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.594251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.621820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.629927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.644536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.653405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.661907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.672978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.694568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.724251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.753591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.780170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.791556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.799826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.808976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.816859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.824956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.835956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.843929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.852000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.870613] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.878513] team0: Port device team_slave_0 added [ 65.889480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.896582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.911269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.935447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.949854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.966415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.977980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.000215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.025691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.049513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.057860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.064781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.077207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.102520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.112163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.141212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.148509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.161583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.185578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.197664] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 66.211875] team0: Port device team_slave_1 added [ 66.249690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.268230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.310990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.319391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.337225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.417540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.425111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.439487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.474743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.484620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.514176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.546090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.553485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.564953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.597601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.606386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.629246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.695846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.703477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.731109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.772189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.779276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.799470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.997240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 67.005158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.020412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.219265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 67.227203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.240255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.247759] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.254272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.261162] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.267619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.303239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.336900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.554337] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.560814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.567689] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.574135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.592422] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.604791] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.611322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.618197] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.624626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.663439] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.673280] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.679777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.686635] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.693137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.702597] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.757702] ip (5286) used greatest stack depth: 53992 bytes left [ 69.099503] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.106008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.112925] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.119397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.135754] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.182186] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.188698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.195590] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.202120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.284718] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.341303] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.347809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.354635] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.361115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.379622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.393309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.411665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.420698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.429187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.440319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.448115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.886971] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.893496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.900392] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.906840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.922636] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.431201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.524258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.557439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.609280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.672702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.206809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.243453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.357175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.374528] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.445441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.524602] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.575653] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.855668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.012123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.086617] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.206281] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.212615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.221900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.251638] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.258340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.269949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.305623] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.311951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.325316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.373711] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.418687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.425129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.438916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.745865] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.922394] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.928733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.944763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.009174] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.015499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.029927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.071573] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.127891] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.170941] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.200329] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.206781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.220962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.269266] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.619193] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.625538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.640887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.860906] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.891124] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.935735] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.596170] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/25 21:00:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001d00)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="393a340d233dd0"], 0x7) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "4fdfa8af8bf8432081c96290bb12d73a99a7cd313fe0e6cbfaf80a5f4ee0214c0df344189534ecca484345372dfe3220d9115eb3b607ea72dd78a99e7a731753f65464613f3355df8e3a0f12f3adfd1ed01cc8080dfcbf38"}, 0x5c) 2018/04/25 21:00:35 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x1000, 0x280800) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/217, 0xd9}, {&(0x7f0000000480)=""/235, 0xeb}, {&(0x7f00000000c0)=""/46, 0x2e}], 0x3, &(0x7f0000000140)=""/24, 0x18, 0x7f}, 0x20) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0xa) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x14) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000005c0)) recvfrom$packet(r1, &(0x7f0000000280)=""/225, 0xe1, 0x100, &(0x7f0000000240)={0x11, 0xf7, r2, 0x1, 0x400, 0x6, @random="8fc3568617b0"}, 0x14) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r3, 0x10d, 0x0, &(0x7f0000000000), &(0x7f00000001c0)=0x4) getsockopt$inet_int(r3, 0x0, 0x0, &(0x7f00000007c0), &(0x7f0000000780)=0x1ba) 2018/04/25 21:00:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rpc\x00') ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @broadcast=0xffffffff}, {0x6}, 0x8, {0x2, 0x4e24, @broadcast=0xffffffff}, 'veth1_to_team\x00'}) ioctl$TCGETA(r0, 0x5405, &(0x7f00000000c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x7, 0x1, 0x6, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) r1 = accept4$netrom(r0, &(0x7f0000000180)=@full, &(0x7f0000000200)=0x48, 0x80800) r2 = accept$netrom(r0, &(0x7f0000000240)=@full, &(0x7f00000002c0)=0x48) getrusage(0x0, &(0x7f0000000300)) munlockall() r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) ioctl$sock_netrom_TIOCOUTQ(r2, 0x5411, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)) r4 = dup2(r2, r0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000440)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0x80045500, &(0x7f0000000480)=""/29) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000004c0)) fchmod(r1, 0x2) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x4a0, 0x140, 0x0, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000500), {[{{@arp={@multicast1=0xe0000001, @loopback=0x7f000001, 0xffffffff, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}, {[0x0, 0xff, 0x0, 0xff, 0xff]}, 0x2, 0x3, 0x8, 0x7, 0x400, 0x640, 'bond_slave_1\x00', 'bpq0\x00', {0xff}, {0xff}, 0x0, 0x2}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @multicast1=0xe0000001, @loopback=0x7f000001, 0x8, 0x1}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x5, 0xffffffffffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x20, @broadcast=0xffffffff, 0x6, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) syz_open_dev$sndctrl(&(0x7f0000000a40)='/dev/snd/controlC#\x00', 0x2, 0x400000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000a80)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x5, 0x0, 0x1, 0x40, 0x963}, &(0x7f0000000b40)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000b80)=@assoc_value={r5, 0xc0000}, 0x8) recvfrom$llc(r0, &(0x7f0000000bc0)=""/78, 0x4e, 0x2000, &(0x7f0000000c40)={0x1a, 0x30b, 0x2, 0x88, 0x7, 0xffffffffffff7f98, @random="ad9c1632ded9"}, 0x10) splice(r2, &(0x7f0000000c80), r0, &(0x7f0000000cc0), 0x1, 0x0) recvmsg(r2, &(0x7f00000015c0)={&(0x7f0000000d00)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000d80)=""/225, 0xe1}, {&(0x7f0000000e80)=""/235, 0xeb}, {&(0x7f0000000f80)=""/12, 0xc}, {&(0x7f0000000fc0)=""/131, 0x83}, {&(0x7f0000001080)=""/152, 0x98}, {&(0x7f0000001140)}, {&(0x7f0000001180)=""/150, 0x96}, {&(0x7f0000001240)=""/215, 0xd7}, {&(0x7f0000001340)=""/131, 0x83}], 0x9, &(0x7f00000014c0)=""/199, 0xc7, 0x52}, 0x10041) name_to_handle_at(r0, &(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x65, 0x3ff8000, "bd704863bcf15479f2ca9f037eace92d334f6b569d6a9b7b9d62729e4b6eea9e5cf7e1105cef58fb9104a088619d7932914ddaedf6ce03b96fd88381ab279d312f16bf9f39c49198aba1133784385638237d3d9d9ffc725be407fd67e8"}, &(0x7f00000016c0), 0x400) getitimer(0x0, &(0x7f0000001700)) r6 = getuid() getgroups(0x1, &(0x7f00000017c0)=[0x0]) syz_fuseblk_mount(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)='./file1\x00', 0x6000, r6, r7, 0x0, 0x7838, 0x80) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000001800)={0xb638, 0x400, 0x2, 0x5, 0x62db, 0x3ab4}) 2018/04/25 21:00:36 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2fca2eb4a7626671, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000100)=0x4) syz_emit_ethernet(0x46, &(0x7f0000000000)={@random="387709dd86ee", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "2eb078", 0x10, 0x2f, 0x0, @empty, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x2, 0x7, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}}, &(0x7f0000000240)) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) fcntl$notify(r1, 0x402, 0x8) memfd_create(&(0x7f0000000180)='bdev\x00', 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000380)) 2018/04/25 21:00:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) accept4$inet6(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c, 0x800) unshare(0x8000000) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) pread64(r1, &(0x7f0000000000)=""/194, 0xc2, 0x0) 2018/04/25 21:00:36 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0xfffffffffffffffc) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x801}, 0x90) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10) 2018/04/25 21:00:36 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00\b\x00') setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x6, 0x4) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000002700)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)}, 0x40010) sendfile(r2, r1, &(0x7f0000dbf000), 0xffff7ffc) 2018/04/25 21:00:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000001fc0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000002100)=ANY=[]) r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup2(r0, r0) getsockopt$nfc_llcp(r1, 0x118, 0x4, &(0x7f0000000200)=""/109, 0x6d) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x7, 0x3f, 0x5a6, 0x200, 0xf89}, &(0x7f0000000380)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r2, 0x3}, 0x8) mmap(&(0x7f0000000000/0x59000)=nil, 0x59000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xee1e, 0x111000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f00000002c0)=ANY=[@ANYBLOB="5d0000019f736926848000ff0300000000000000000000000000000000000f6dcfd147875e3f3e059cbb53288acf169839689874548b6eb201cabd536a56367d65da3ad6a75677658b95b5cf7be0a65a68"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_tables_matches\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000180)={0x4, 0x8, 0x4}) 2018/04/25 21:00:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x6, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x40000) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x6}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00002e4fe0)={0xffffffffffffffff, &(0x7f000039ef3f)="cee90b93528da1f1f78ccb416f66c7a36e2af052a2b8df7391951ae0c1add09de490c30ebff5eb07778386600b1f3e3abbb045eb04a10d0be8e58d8a80d1d44adcb7bcfc9b7bfb67174224f61e0d04cf015d81b2604170ad7915dde2c2ade05e3fe26a56b13bdb9e1865b286a8a5925ce91e6bd5cc4bde443040182b8be95fca3f27f736b79b2579388809b93a17d2c98b0a50eb1b361aa40be7860dd5d5f45747ec46d7720a"}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/25 21:00:36 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000000)='k\x00', 0x0) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback={0x0, 0x1}, 0x80000000, 0x2, 0x2, 0x5, 0x4, 0x80000001, 0x3270}, 0x20) r1 = dup(0xffffffffffffff9c) r2 = getpgid(0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x3) ioctl$TCFLSH(r1, 0x540b, 0x2000000050ad) 2018/04/25 21:00:36 executing program 7: r0 = socket$inet(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0x1, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e22, 0x0, 'fo\x00', 0x20, 0x1, 0x55}, 0x2c) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000100007031dff02000000000000000a0009000300001d85685e0000000400ff7e28000000140a43ba16a0aa1c810bb356da5d8060000000060000000029ec2400020cd37ed81cc073", 0x4c}], 0x1}, 0x0) [ 86.244415] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop1 [ 86.286399] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/25 21:00:36 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r0 = geteuid() syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, r0, 0x0, 0x0, 0x10001000020) 2018/04/25 21:00:36 executing program 3: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r1}, 0x8) 2018/04/25 21:00:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ipv6_route\x00') read$eventfd(r0, &(0x7f0000000180), 0x8) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) sendfile(r0, r0, &(0x7f0000000040)=0x400000, 0x7) 2018/04/25 21:00:36 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0, 0x4}, 0x8) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000575ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300020a00000000b8e2165465ee9c36b53d30f7f2917a000000007f000001000000000000000000000300050000000000020000000000000000000000000000000000000000000000000000000000fa574291064547c2607ae607cb32c4e3d6ac71d609e563b7a3d7ef8d32f167ddd9eae29b04a8a1c030987b3cb05d7f9f1309f1e5565e4f9ae6732237ebc34dd200d9ad11b1f007f46df5c64ae52d813afcee18"], 0x50}, 0x1}, 0x0) [ 86.356977] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/25 21:00:36 executing program 0: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x3fffffffffffe, 0x12, r0, 0x0) mlock(&(0x7f0000002000/0x1000)=nil, 0x1000) clone(0x0, &(0x7f000000bfff), &(0x7f000000bffc), &(0x7f0000004000), &(0x7f0000007000)) mremap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) [ 86.526636] sctp: [Deprecated]: syz-executor3 (pid 6688) Use of struct sctp_assoc_value in delayed_ack socket option. [ 86.526636] Use struct sctp_sack_info instead [ 86.621311] sctp: [Deprecated]: syz-executor3 (pid 6701) Use of struct sctp_assoc_value in delayed_ack socket option. [ 86.621311] Use struct sctp_sack_info instead 2018/04/25 21:00:36 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x2000000, &(0x7f00000001c0)=ANY=[]) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000006c0)=0xffff, 0x4) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0xfffffffffffffffe) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="e733622d3cb68a3eb9615c9823a6a05046540bc48aa27390c11a19c0000dd61fa7e9f4aa", 0x24}], 0x0, &(0x7f0000000300)={[{@dir_umask={'dir_umask', 0x3d, [0x30, 0x30, 0x32, 0x36, 0x35, 0x33, 0x32, 0x34, 0x30]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp864'}, 0x2c}, {@file_umask={'file_umask', 0x3d, [0x30, 0x32, 0x30, 0x37]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp864'}, 0x2c}, {@creator={'creator', 0x3d, "4685df57"}, 0x2c}]}) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x4, &(0x7f0000000580)=[{&(0x7f0000000180)="b21ad0ef", 0x4, 0x6}, {&(0x7f0000000280)="db13b3dc4a60cdb867d7b9564000f3ffd55dd404acf3065f4ec9a76449760afd9d0e374efd93e33ff75131983ca8ac15a6886ec40d8750d1d2707067b5921b8c5f2b8fe2ba46b6d58dff1a9c23b3b24d66dd09ebbb96be9503839fb216fd22d3b77ff32bfd20b78e07852464bc4b", 0x6e, 0x690e15d8}, {&(0x7f0000000380)="48ad7f6328377d3eac1160230824743b62c13c7cafd23562451ee1bf5155cd9de4190097b30999ccef3f7128ec378c2a2572e4cf800f4bb23e722725f407c7f55f15874df838e07b34f6a7e85e8e035d272cbd9767b79fde0e29edeca8e397702b628618fee209fb67113a153701f8fa2979f0fa849b14b05271fb423907f89e42c4914b5a1f9adb4ff7a3c46d289bf6fa8fa7c774145c53dab2b90c1c1be7ecf74484469f5de296382d1df48e4c248b5cd7698c5a61657313c91ae39ff31025549d66fa2c203f9492446e5ab96aac3cfdcf60922e2185f3c4dd2fbbf52211afaee589f726dd631373f26284eaa6e8", 0xef, 0x5}, {&(0x7f0000000480)="2116ee501a626ac860f2c2739db3f9d65f2244ee4d06ea5a9d8ba7f6dd4a36c1e1f69213b2c6e9ff9735ceebd3f3269fad7b0ac53fbcb922bdcb5a5df05289a4facda229cad657da3b5c5fb45c15e5c3c7942b0a6303f300e2639db483cdaf7d6ec5c7af9624e39fe8ccbdbe84c5e03d0808e53219ee788f1b74588a44238725d502b1e45cbc7ba7a3bb9adf48417d77097f47e2888fab000651bceb4b740f79c54426c4d6255819437a6ea9eb3b513a0023693e2d40e8af5887e9487a173e815d8c41a791b8292169c16f44129eb613fb10be0c426487763ffca8aa3d831ee6ee3483e78a141c5f6b847d2c1556", 0xee, 0x9}], 0x108000, &(0x7f0000000640)={[{@iocharset={'iocharset', 0x3d, 'cp865'}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x35]}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x32, 0x34]}, 0x2c}]}) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)='t', 0x1}], 0x1, 0x0) fadvise64(r1, 0x0, 0x0, 0x6) unlink(&(0x7f0000000700)='./file0\x00') 2018/04/25 21:00:36 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xffffffff00000000, 0x100}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={r1, 0x17c000, 0x0, 0x17d5, 0x8, 0x40, 0xbc7, 0x7, {r2, @in6={{0xa, 0x4e23, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}, 0x0, 0x2, 0x0, 0x81, 0x9}}, &(0x7f00000002c0)=0xb0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x8000000000003) 2018/04/25 21:00:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000001100)=@known='system.posix_acl_access\x00') bind$inet6(r0, &(0x7f0000007000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect$inet6(r0, &(0x7f0000012000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000000)=@generic, 0xff3c, &(0x7f00000010c0)=[{&(0x7f00000000c0)=""/4096, 0xffe4}], 0x3b5, &(0x7f0000000000)=""/115, 0x73}, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001140)=0x800, 0x4) sendmsg(r0, &(0x7f0000001980)={0x0, 0xfffffffffffffdf5, &(0x7f0000000080), 0x111}, 0x0) 2018/04/25 21:00:36 executing program 7: r0 = socket$inet(0x2, 0xa, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) open(&(0x7f0000000080)='./file0\x00', 0x4c0502, 0x40) sendto$inet(r0, &(0x7f00000000c0)="d7593a414def343c2f72de953f0d521a9c9030a7f9ba0000b8b9d46c40a82f987f23cce1576ab98eecf9ea612aafd78d50647493ea43f1f6b2e4ff0dedd31a17cefc28748d048ce70c080d313fc0d75987a6b3f2330e5d47", 0x58, 0x40800, &(0x7f0000000140)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/25 21:00:36 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$sndseq(r1, &(0x7f00000012c0), 0xfffffc8a) open_by_handle_at(r1, &(0x7f0000000000)={0x8, 0xfff}, 0x0) read(r0, &(0x7f0000000200)=""/74, 0x52) write$cgroup_int(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB='c'], 0x1) 2018/04/25 21:00:36 executing program 5: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/dev_snmp6\x00') getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x411) sendto$inet6(r0, &(0x7f00000000c0), 0xffbc, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 21:00:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000080)={0x8000000, 0xb57, 0x1f}) unshare(0x28060400) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/25 21:00:36 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="da73253b66e6ea99751cfc5e9d809197f9b982c38a180e2017c386b9f0b388b0ff2ed5d3be1e9fd45651b82aa14801aaf71499fec9d8bb7d40f83cfcba43c7531c77fac52bfd7de6fb7ab9b14f5659a638849370368c30e1e49aa78a78ca632d61734260201c3142d2c1d73c855d2d76faca3bffdc8f2cbfe0fb5bb110b1297b2da8586ee2e3f3ba83d7e14c0675a0d9fdf46435f2a84863fb79c2842a52", 0x9e}, {&(0x7f0000000100)="0fb56f0837587e7f2914e1dd9a2ddcc652625787770300d8602c6b9cff2b5421655425175724c105e4f844454547a12152e1e52a9022792553fd09a095197685b3d44749", 0x44}, {&(0x7f0000000180)="cbe96a311c9431202c78d87df126f007552ef51813fbd6008d34602ed2d235fdcb3568335271e9d79ab71d887f687beb9a3f1ea02ad625639b3cdfecbd0dac0bcbc23c9672edc4de66fe07e5f36958bc129e6b2a474d97649bd02e5a2466c638120190b6fe99127ad3a1606b275de48e58b75f", 0x73}], 0x3, 0x0, 0x0, 0x24004000}, 0x10) r1 = socket(0x1e, 0x5, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000099cff6)='/dev/ptmx\x00', 0x0, 0x0) listen$netrom(r1, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000300)="daadc0135d671749bc0fe0538ab564193082bd27b2a3615a453508f616", 0x1d, r3) [ 86.838899] syz-executor7 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/25 21:00:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='auxv\x00') close(r0) 2018/04/25 21:00:37 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x8, 0x5, 0x100, 0xfffffffffffffffc, "81163e1515c0c8f66543e34ab505e988d72a1c81ffe3b61f76b0839d8e26b4dc0a26650c3a7a982760441a14", 0x4}) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f0000a10df3)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000040)=@fragment, 0x8) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000023000)=[{&(0x7f0000000080)="33b7b2b7", 0x4}], 0x1, &(0x7f00003a8000)}, 0x0) 2018/04/25 21:00:37 executing program 5: r0 = epoll_create1(0x0) fcntl$dupfd(r0, 0x0, r0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) timerfd_settime(r3, 0x1, &(0x7f0000005000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000ca0000)={0x2001}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000019000)) 2018/04/25 21:00:37 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000e5bff8)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f0000000000)=0x1, r1, &(0x7f0000000180), 0xb0, 0x20000003) 2018/04/25 21:00:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001a80), 0x0) sendto$inet(r0, &(0x7f0000482000), 0x0, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xffff}, 0x14) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x4, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ipddp0\x00'}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) writev(r0, &(0x7f0000cb1ff0)=[{&(0x7f00000001c0)="0f", 0x1}], 0x1) 2018/04/25 21:00:37 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80000) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x2, 0x2, 0x1b, &(0x7f0000ffc000/0x1000)=nil, 0xfff}) unshare(0x40600) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/133, 0xffffff39}, &(0x7f0000000140)}, 0x20) readv(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/241, 0xf1}], 0x1) 2018/04/25 21:00:37 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x2000000, &(0x7f00000001c0)=ANY=[]) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000006c0)=0xffff, 0x4) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0xfffffffffffffffe) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="e733622d3cb68a3eb9615c9823a6a05046540bc48aa27390c11a19c0000dd61fa7e9f4aa", 0x24}], 0x0, &(0x7f0000000300)={[{@dir_umask={'dir_umask', 0x3d, [0x30, 0x30, 0x32, 0x36, 0x35, 0x33, 0x32, 0x34, 0x30]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp864'}, 0x2c}, {@file_umask={'file_umask', 0x3d, [0x30, 0x32, 0x30, 0x37]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp864'}, 0x2c}, {@creator={'creator', 0x3d, "4685df57"}, 0x2c}]}) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x4, &(0x7f0000000580)=[{&(0x7f0000000180)="b21ad0ef", 0x4, 0x6}, {&(0x7f0000000280)="db13b3dc4a60cdb867d7b9564000f3ffd55dd404acf3065f4ec9a76449760afd9d0e374efd93e33ff75131983ca8ac15a6886ec40d8750d1d2707067b5921b8c5f2b8fe2ba46b6d58dff1a9c23b3b24d66dd09ebbb96be9503839fb216fd22d3b77ff32bfd20b78e07852464bc4b", 0x6e, 0x690e15d8}, {&(0x7f0000000380)="48ad7f6328377d3eac1160230824743b62c13c7cafd23562451ee1bf5155cd9de4190097b30999ccef3f7128ec378c2a2572e4cf800f4bb23e722725f407c7f55f15874df838e07b34f6a7e85e8e035d272cbd9767b79fde0e29edeca8e397702b628618fee209fb67113a153701f8fa2979f0fa849b14b05271fb423907f89e42c4914b5a1f9adb4ff7a3c46d289bf6fa8fa7c774145c53dab2b90c1c1be7ecf74484469f5de296382d1df48e4c248b5cd7698c5a61657313c91ae39ff31025549d66fa2c203f9492446e5ab96aac3cfdcf60922e2185f3c4dd2fbbf52211afaee589f726dd631373f26284eaa6e8", 0xef, 0x5}, {&(0x7f0000000480)="2116ee501a626ac860f2c2739db3f9d65f2244ee4d06ea5a9d8ba7f6dd4a36c1e1f69213b2c6e9ff9735ceebd3f3269fad7b0ac53fbcb922bdcb5a5df05289a4facda229cad657da3b5c5fb45c15e5c3c7942b0a6303f300e2639db483cdaf7d6ec5c7af9624e39fe8ccbdbe84c5e03d0808e53219ee788f1b74588a44238725d502b1e45cbc7ba7a3bb9adf48417d77097f47e2888fab000651bceb4b740f79c54426c4d6255819437a6ea9eb3b513a0023693e2d40e8af5887e9487a173e815d8c41a791b8292169c16f44129eb613fb10be0c426487763ffca8aa3d831ee6ee3483e78a141c5f6b847d2c1556", 0xee, 0x9}], 0x108000, &(0x7f0000000640)={[{@iocharset={'iocharset', 0x3d, 'cp865'}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x35]}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x32, 0x34]}, 0x2c}]}) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)='t', 0x1}], 0x1, 0x0) fadvise64(r1, 0x0, 0x0, 0x6) unlink(&(0x7f0000000700)='./file0\x00') 2018/04/25 21:00:37 executing program 4: r0 = epoll_create(0x7fe7ffff) r1 = epoll_create(0x4) r2 = socket$rds(0x15, 0x5, 0x0) r3 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000dff4)) r4 = epoll_create(0x46c) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x6, 0x9, &(0x7f00000000c0)={0x3}, 0x8) r5 = epoll_create(0x400000000000804) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)) 2018/04/25 21:00:37 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaff86dd60d8652b00140600fe8000000000000000000000000000aafe8000000000000000000000000000aa000000000000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5010000090780000"], &(0x7f00000002c0)) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) connect$netrom(r0, &(0x7f0000000040)=@full={{0x3, {"c4f9c014fb4687"}, 0x3}, [{"5fe6fcf45e4d23"}, {"18ae1486a68d44"}, {"d45c2356be3b3c"}, {"93b793190e1f2f"}, {"93f62e5559cf1e"}, {"86d0ea10d3fa7d"}, {"3174ac8aeb19e4"}, {"0b9a9751098190"}]}, 0x48) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x6, 0x8) 2018/04/25 21:00:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0x247, &(0x7f0000000100)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@ipv4={[0xfffffff0], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1}, 0x0) socket$inet6(0xa, 0x802, 0xfff) 2018/04/25 21:00:37 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xffffffff00000000, 0x100}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={r1, 0x17c000, 0x0, 0x17d5, 0x8, 0x40, 0xbc7, 0x7, {r2, @in6={{0xa, 0x4e23, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}, 0x0, 0x2, 0x0, 0x81, 0x9}}, &(0x7f00000002c0)=0xb0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x8000000000003) 2018/04/25 21:00:37 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x3, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000400)='security.capability\x00'], &(0x7f0000000400)) syslog(0xe, &(0x7f00000001c0)=""/164, 0xa4) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x84002, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0xc5}, 0x8) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000100)=0xfffffffffffff800) 2018/04/25 21:00:37 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x2000000, &(0x7f00000001c0)=ANY=[]) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000006c0)=0xffff, 0x4) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0xfffffffffffffffe) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="e733622d3cb68a3eb9615c9823a6a05046540bc48aa27390c11a19c0000dd61fa7e9f4aa", 0x24}], 0x0, &(0x7f0000000300)={[{@dir_umask={'dir_umask', 0x3d, [0x30, 0x30, 0x32, 0x36, 0x35, 0x33, 0x32, 0x34, 0x30]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp864'}, 0x2c}, {@file_umask={'file_umask', 0x3d, [0x30, 0x32, 0x30, 0x37]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp864'}, 0x2c}, {@creator={'creator', 0x3d, "4685df57"}, 0x2c}]}) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x4, &(0x7f0000000580)=[{&(0x7f0000000180)="b21ad0ef", 0x4, 0x6}, {&(0x7f0000000280)="db13b3dc4a60cdb867d7b9564000f3ffd55dd404acf3065f4ec9a76449760afd9d0e374efd93e33ff75131983ca8ac15a6886ec40d8750d1d2707067b5921b8c5f2b8fe2ba46b6d58dff1a9c23b3b24d66dd09ebbb96be9503839fb216fd22d3b77ff32bfd20b78e07852464bc4b", 0x6e, 0x690e15d8}, {&(0x7f0000000380)="48ad7f6328377d3eac1160230824743b62c13c7cafd23562451ee1bf5155cd9de4190097b30999ccef3f7128ec378c2a2572e4cf800f4bb23e722725f407c7f55f15874df838e07b34f6a7e85e8e035d272cbd9767b79fde0e29edeca8e397702b628618fee209fb67113a153701f8fa2979f0fa849b14b05271fb423907f89e42c4914b5a1f9adb4ff7a3c46d289bf6fa8fa7c774145c53dab2b90c1c1be7ecf74484469f5de296382d1df48e4c248b5cd7698c5a61657313c91ae39ff31025549d66fa2c203f9492446e5ab96aac3cfdcf60922e2185f3c4dd2fbbf52211afaee589f726dd631373f26284eaa6e8", 0xef, 0x5}, {&(0x7f0000000480)="2116ee501a626ac860f2c2739db3f9d65f2244ee4d06ea5a9d8ba7f6dd4a36c1e1f69213b2c6e9ff9735ceebd3f3269fad7b0ac53fbcb922bdcb5a5df05289a4facda229cad657da3b5c5fb45c15e5c3c7942b0a6303f300e2639db483cdaf7d6ec5c7af9624e39fe8ccbdbe84c5e03d0808e53219ee788f1b74588a44238725d502b1e45cbc7ba7a3bb9adf48417d77097f47e2888fab000651bceb4b740f79c54426c4d6255819437a6ea9eb3b513a0023693e2d40e8af5887e9487a173e815d8c41a791b8292169c16f44129eb613fb10be0c426487763ffca8aa3d831ee6ee3483e78a141c5f6b847d2c1556", 0xee, 0x9}], 0x108000, &(0x7f0000000640)={[{@iocharset={'iocharset', 0x3d, 'cp865'}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x35]}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x32, 0x34]}, 0x2c}]}) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)='t', 0x1}], 0x1, 0x0) fadvise64(r1, 0x0, 0x0, 0x6) unlink(&(0x7f0000000700)='./file0\x00') 2018/04/25 21:00:37 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0xc000, 0x3, &(0x7f0000ff1000/0xc000)=nil) mprotect(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x400000000008) munlock(&(0x7f0000fef000/0x4000)=nil, 0x4000) 2018/04/25 21:00:37 executing program 6: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000040), 0x4) r2 = socket$inet6(0xa, 0x80003, 0xef) read(r2, &(0x7f0000004f45)=""/187, 0xbb) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000280)=0x68) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000013ffc)=0x2, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0)=@fragment, 0x8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) ptrace$pokeuser(0x6, r3, 0x100000000, 0x3) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000010ff8)=@fragment, 0x8) sendto$inet6(r2, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x200, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0xfd65}}, 0x80000001, 0x40000000000, 0x1, 0x3, 0x80}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x81, 0x8f7, 0x8002, 0xa5, 0x80, 0x7f, 0x1000, 0x5, r4}, 0x20) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000300)=""/60, 0x3c}, {&(0x7f0000000340)=""/91, 0x5b}, {&(0x7f00000003c0)=""/124, 0x7c}, {&(0x7f0000000440)=""/15, 0xf}, {&(0x7f0000000480)=""/226, 0xe2}, {&(0x7f0000000580)=""/124, 0x7c}, {&(0x7f0000000600)=""/108, 0x6c}, {&(0x7f0000000680)=""/126, 0x7e}], 0x8) 2018/04/25 21:00:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x7, 0x30, 0xef, 0x4}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), 0x0) 2018/04/25 21:00:38 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000240)="6e657496a1662f75adee8973b266bc6ed39a8a04d93ca67972dbe9442b925741d61ea4991c1e53d38c3875371427951287c1da1fe476f7029fe6de7ee763344e38060dc30a7dc0faf1f1c851494fe7f867367113ae4392c7c82c8cdd295c71d565b827fc2545abe7f606f21c78bf30862da4") lseek(r1, 0x7, 0x0) 2018/04/25 21:00:38 executing program 3: r0 = socket$inet(0x10, 0x3, 0x2) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f000000f000)="240000001a00030207fffd946fa283bc04eee6d87986c49727008568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) r1 = msgget$private(0x0, 0xe) msgrcv(r1, &(0x7f0000000040)={0x0, ""/11}, 0x13, 0x0, 0x800) recvmmsg(r0, &(0x7f00000079c0)=[{{&(0x7f0000001f00)=@l2, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002f80)=""/4096, 0x1000}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x2, &(0x7f0000005040)=""/194, 0xc2}}, {{&(0x7f0000005140)=@generic, 0x80, &(0x7f0000005400), 0x0, &(0x7f0000005480)=""/124, 0x7c}}, {{&(0x7f0000005500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000007900), 0x0, &(0x7f0000007980)=""/47, 0x2f}}], 0x3, 0x0, &(0x7f0000007b40)={0x77359400}) 2018/04/25 21:00:38 executing program 7: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x200800) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x4000000d, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r1, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r2, 0x0) 2018/04/25 21:00:38 executing program 1: r0 = socket$inet(0x2, 0x80000000003, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000febffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x2}, 0x10) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x8) sendto$inet(r0, &(0x7f0000000100)="debf59037cffd19560", 0x9, 0x0, 0x0, 0x0) 2018/04/25 21:00:38 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f000000f000)=@file={0x1, './file0/file0\x00'}, 0x6e) r1 = memfd_create(&(0x7f0000000040)='*\x00', 0x2) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x442000, 0x80) sendmsg$nfc_llcp(r2, &(0x7f0000000580)={&(0x7f00000000c0)={0x27, 0x1, 0x0, 0x7, 0x36, 0x6, "7a361fe28e7d92776f145cf6b06cc9477f38dcdf65dc3419b87e9ca3c00d40d930544cb5864c88bf80d3d1bcc77513760a4df5227f88974e2e341c3e3a8078", 0x3c}, 0x60, &(0x7f0000000480)=[{&(0x7f0000000140)="8524ab89fb18da22c8ef7c2eb85cb388bc2cefb6f95b56fdf2c639f2023db79990c5", 0x22}, {&(0x7f0000000180)="f16a39d322641989c880ac2ebc4bee80a638f245875351d01b2dcd8c4a7629ff201321e297aef22968624cd99006d1bffa81131378bd5eec07219c2eb35508303686ed16d87defb51215272779cf448e9aced9346f7564c1021ae38190776101e2dad5deace35aa4aed47201554a6de0d28dd8dc06445cd8d88af4b614d48f482e22b172d47eecd3c2ed8808f1b47e862d55296b6dcd16584eed9d55e5a6ee7bc9082525982d3056", 0xa8}, {&(0x7f0000000240)="6ca2930f3130", 0x6}, {&(0x7f0000000280)="ba4824d9532119b9bbcc84be945c9f27414a1477aed3b641d8a3f9244ace226f7dbcd34772e219fbed0e8c1d58b2225919f57f5c9e118f299c33d59e465c83f84adbbbceba77fa", 0x47}, {&(0x7f0000000300)="2230e763d3a605f6b21123fdf48af7f25fbf4b266e632d3dcb08621bda71a2d2", 0x20}, {&(0x7f0000000340)="022d19b739978868af0db1d17feaa15c6d04df51c50fdb648c32a1e3383c6275e1118fdf4236a955702d226ce30b1b1431c17c3324458d22201f6073b2a6f22c6dc482299dc3253ff8cd3114a95d8e78cab39e76539c7aeb72941a1898d746e1ac95140a03", 0x65}, {&(0x7f00000003c0)="92518b4ddc8b019961c56b022c5315d9033bf6ab9bddb079d3cec865eb3f8db20ce1fd3062216b63c6df945a5ae16a2353bba108da4cb48f88c1a04833c6961985a040f79d0ca02b50cfe6f8ef8d70d499a292d805af8cc8454ea3242315b6ac7e525dcb26ad12eed5c499b0579d9039d80dd93189fe3ef92a850b0fa3023027bb20abef91b33bbdc5f1f4a3acd75a4268987085", 0x94}], 0x7, &(0x7f0000000500)=ANY=[@ANYBLOB="80000000000000000f010000080000007a33ed87ebb229a0d7ef6c9f82a616e2e9d87fec11dac3baa170c507f6fff72ce7d7cbe0bbeafe97c0f88f64970bea354028708e623060237c9be14ed9b3e76cf868f23caae8e001000000000000001ce24a7990c8e95fe135a804a1c9d3b297363329de9bfd7d6572684db36b000000"], 0x80, 0x4000000}, 0x40000) r3 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0x80, 0x0) sendfile(r0, r3, &(0x7f0000000000), 0xff) 2018/04/25 21:00:38 executing program 5: r0 = socket$inet6(0xa, 0x800, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x200000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x8000001f}) utimes(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={{0x0, 0x7530}}) bind$inet6(r0, &(0x7f0000004fe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x5, [], 0x1}}, 0x1c) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000100)="52d48bf858c3f02b54f1e9b6c2415640e73719d84f9de50721a2015911be48a0b871b9af55722a9bc06773146826e016c310dfbdf21b9b3f2274c6fd215cbe9de628ee015e6d36f1b1e27f020098e8071c28cff17a06d7ebe5ecc4ffb12fa7a07f7c19308e5ca6e0ac8c68f8319f50d3584fa0", 0x73}, {&(0x7f0000000180)="4fa0d75f1caec41b8d54557fd47ae9158c3240a67245c3d11a3fecf7e1c5a80152c63520f587678fc175624dd8a7dabe0c08e8182709b1fdf91d40b2eea38aeef0f495470f9b844f3065f0b2274e0ac9cc7557e8ab31692df2089811ec28a221398fd07c777ed293f538398b79afaf7a2d10de85763bc2f21c05c2b792ea925de4b34468e249b2714f654ef424503ce7cb1f7a", 0x93}, {&(0x7f0000000240)="1166de", 0x3}, {&(0x7f0000000280)="a38e1fdd7578ea4935874a86a9cc08d5b76caf60fde7ca168f936c0c9f6156833cf810a4b1fc180f8d7be75b1c23ef088eed220facc952a79fee9ad17b34571936d327c31add85b762180cb44d502be87a0418d5d6dc3d3ad0a6228f79de3a1818372ce16070d875b4335e8dac5351fb8115984253e7836dbfc54d983174accb997421fa3eff54ba43ca7bd4f41754f6adbfaae3aa744655678a86eff36d0d80e27c498e9dab", 0xa6}, {&(0x7f0000000340)="38dcfb4474a516b51d1a88165f03ed965d5beb3ac7b4d0d69ba45a43d3448fe9940230dc91c4e8275a23bb184178", 0x2e}, {&(0x7f0000000380)="3eab9009317168c62a17e763eb3bcf151b54e5d2d2de7ac01fabe07ecf7960664e1eceaffd06c014a99f0bd98ecf9fe941bbd732a7566b283ec5e81c83acc30d3409eaefe770bff55959f3be1d44804df33c4e0e9ef4fcf7a57c939377b3", 0x5e}, {&(0x7f0000000400)="74e4fac839f16be044716bd2d08fcd9bdd3ce38900ef5ecb6c0b5e201cdecdb10b5401c2768fa76ccfb11ef02473c2455b73a87ca13726", 0x37}, {&(0x7f0000000440)="89f0db37d39a73351ba673f5d23368be91f556346f83c390338b4aba8d334ab2c1622259ab36456c25497ed58d005b12d58f9b5eb14b323a544f86a12214ad005e967a1cf95243dac444f47613f6e90e6dbb28a9afa4c4f57a0aaf55540826556f1f44585f77d0900647f4aeab04d41e3be9631a933efa7e3333f898f3e7ca1303bfc121f743b82d435e97d0cbfcbb720e4e6a6cbf6ef6ae5db953fe2e6cb0c7d0ed16a25a44f7d1ecec405f9a5f03392aee8a3ebd3c9489ab87bc82dca8f881d209a3394a555fd269771100bafabeae", 0xd0}], 0x8) getsockname$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) 2018/04/25 21:00:38 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={"6c6f0000000000000000000100", &(0x7f00000003c0)=ANY=[@ANYBLOB="32000000000000008598fe000000000000000000000000ff010000000000000000000000000001ff020000000000000000000000000001000000000000000100200000000000000000000099320000000000000000000000000000000000000000000001fe8000000000000000000000000000000000000000000000000026eb00000000000000000000000000000000000000000000000000000000000000000000000000df000000deffffffff00ffff000000000000ec53df9c36e391c400000000000000000000000000"]}) set_mempolicy(0xc003, &(0x7f0000000080)=0x9, 0xfffffffffffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@mcast1={0xff, 0x1, [], 0x1}, 0x4c, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x525c, 0x0, 0x81, 0x5}, {0x4, 0x100000001, 0x8, 0x400}, {0x7, 0x1f, 0xff, 0x6}, {0x7, 0x3, 0xfffffffffffffffe, 0x4}]}, 0x10) 2018/04/25 21:00:39 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) fstatfs(r0, &(0x7f00000000c0)=""/118) tee(r0, r0, 0x3, 0x3) 2018/04/25 21:00:39 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f000062fff8)={0x0, 0x2000000001}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000b94ff8)={0x0, 0x0, 0x9}, 0x379) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00005c0fe0)={0x3}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0xfaa5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r2, 0x6}, 0x8) write(r0, &(0x7f0000ce6ffe)="da", 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x0, 0x9}, 0x8) 2018/04/25 21:00:39 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x112) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {0xa}, [@IFA_LOCAL={0x14, 0x2, @loopback={0x0, 0x1}}]}, 0x2c}, 0x1}, 0x0) 2018/04/25 21:00:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280), &(0x7f0000000280)=0x319) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080)={{0x0, 0x0, 0x8, 0x9, 0x80000001, 0x8}, 0x2}) 2018/04/25 21:00:39 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000200)=0x7, 0x4) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4400, 0x0) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f00000000c0)=0x7, 0x4) 2018/04/25 21:00:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fcntl$getown(r0, 0x9) fchdir(r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00004b8ff8)='./file0\x00', 0x28043, 0x1) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 2018/04/25 21:00:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000a7c000)=0x2d, 0x4) socketpair(0x11, 0x2, 0x400000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000040)="75ca2611e585e0184ff5d468f5da80e8620b7d0d1526491d6d6223ba3ebfa27afb94814fb6bc4e701d2c4ad30c481d1dcbe2d9c56d1ede3175f44c2583156457abcb87a939d20c4fac0e8150cc173dd6153f8e428da8b8adfe22c67f2afdf3474f59a410eba0d5c7fa003de3d2f178f2efd927f61d881a54a3edb7f729632a1b6428b0bf0cdee806363693ee2279de0e466eff3348b95a781c316df23fc25fdc4ab6a152b27af9f4363b4d39775cfcb6f2fa315d6b5f19c7f9f9") connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) write(r0, &(0x7f0000000100), 0x0) 2018/04/25 21:00:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x7, 0x0, "2f0c9ffd63324c625d2bf64f55129acb4b9010e4bed094d67862880f19b408f39730acf52f488368378a2d8b19f3ce2a597b034f2c4f025a7d9dfa699d4c976bb95509625fc30c282a481a3047c0aba5"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000001c0)={r1, r2/1000+10000}, 0x10) 2018/04/25 21:00:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x404102, 0x0) accept$inet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x10) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000340)=0x4) recvfrom$llc(r0, &(0x7f0000000280)=""/191, 0xbf, 0x12000, &(0x7f0000000100)={0x1a, 0x317, 0x8001, 0x62, 0x2, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) r1 = pkey_alloc(0x0, 0x3) pkey_free(r1) msgget$private(0x0, 0x43) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x1, @loopback=0x7f000001}}, 0x1e) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11148a665f4373d9153b975ce0a573be70febf24c462b6f105d455054bfd1d57629951941d78d0f8e1996b340221ffd119cea3602f5112ecdfbab1b3ad8d76a19ce90291f1976a754b8f8fb9a62283fa908af6f1c2db3457be660eb7fac79eda520b66c161f2f24a0102481177a9f8d503a0"], 0x2379, 0x0) getpeername$ipx(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 2018/04/25 21:00:39 executing program 5: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$setpipe(r0, 0x407, 0x0) fcntl$setpipe(r1, 0x407, 0x0) r3 = dup2(r0, r2) ioctl$int_out(r3, 0x0, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000140)={0x400, 0x0, 0x4681, {0x77359400}, 0xb5, 0x40}) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000000)="2ea2d84fe227ef1d77c297e4dbc256e1a0a21f871722b22a04067f11a7691dda857d00df63985d78da97cf00767b602bab66789ceb1cd85de4c964db3a2de52c40f7ebf46f06763952f048c70f77ffa7af0f0f2d1c638a42133b240220a29a776a5e43ac1aba9a0bdb3c0c02a2b294c91e93d860e9a68505232665a674c9475d915c6c84257b952987d33de68119d5fa25ae6e5a55cc5199988007cf0407552113c15a3144d8fa02c87e0547c1b927f5432f02031b7a4019b5b92eeaa3d3106835f4de096070b4b83c4aef7b7a196a8eb637a051c2b5d86f052cb4fa9d0059e042", 0xe1}], 0x1, 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x8}) 2018/04/25 21:00:39 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009371, &(0x7f0000006f80)="010000000000000018") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)="5a6d77d7fe4da0076de5e10413e2d5a04e66d18e91f9fcb340e2f63c119a", 0x1e, 0xfffffffffffffffc) keyctl$setperm(0x5, r1, 0x200) 2018/04/25 21:00:39 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) epoll_create1(0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) listen(r0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/25 21:00:39 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x9b8, @remote={0xfe, 0x80, [], 0xbb}, 0x100000001}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x66, &(0x7f0000101000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @empty, @dev={0xfe, 0x80}}}}}}}}, 0x0) 2018/04/25 21:00:39 executing program 3: r0 = socket$inet(0x2, 0x806, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) shutdown(r0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/25 21:00:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="020203001000000000000000000000000200130000000000000000000000000005000600000000000a0000000000ff000000000000000000000000000000000000000000000000008cbd6ef600000000000000000000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x80}, 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0x8, 0x1f, 0x0, 0x1, 0x6, 0x8}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x7) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000600)=""/4096) 2018/04/25 21:00:39 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r1 = signalfd(r0, &(0x7f0000000000)={0x80000001}, 0x8) r2 = socket(0x1e, 0x805, 0x8) r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000100)=""/7, &(0x7f0000000140)=0x7) listen(r2, 0x0) poll(&(0x7f0000000200)=[{r3, 0x10}, {r3, 0x188}, {r1, 0x4000}], 0x15c, 0x5) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x7, {{0x2, 0x4e20, @rand_addr=0x3}}}, 0x88) 2018/04/25 21:00:39 executing program 7: r0 = memfd_create(&(0x7f0000000100)="73656375726974792a2d6c6f766d6e657431776c616e30282c2a2d2c2f277d73656c696e7578e200", 0x1) write$tun(r0, &(0x7f0000000240)={@pi={0x0, 0x8afb}, @void, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0xa, @empty, @mcast1={0xff, 0x1, [], 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @mcast1={0xff, 0x1, [], 0x1}}}, 0x38) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)) syz_emit_ethernet(0x5a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [{[], {0x8100, 0x3f, 0x65, 0x2}}], {@canfd={0xd, {{0x3, 0x4, 0x1000000000000, 0x3}, 0x3d, 0x3, 0x0, 0x0, "d489591b0b757c3c238a89dd1b00bad43b716d13d790a032cfb3ccce157a342987ec814869e7259e667559b28d2916931058efe83d4226d26f936b63be66e12a"}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x3e5, 0xe1e, 0xe73, 0xa95]}) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000140)={0x301, 0xe4601f7600, 0x101, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xc}, 'veth0_to_bridge\x00'}) modify_ldt$read_default(0x2, &(0x7f0000000180)=""/154, 0x9a) 2018/04/25 21:00:39 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f00000000c0)=""/242) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x27, "48761ca27bf02ec29f1a0dc1b7908e85958dc99efa49a4274850f24a9b6dc0ef14192f38dc27c2"}, &(0x7f0000000200)=0x2f) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={r2, 0xc168}, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 2018/04/25 21:00:40 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='^procwlan1\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x3, 0x2}) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x289, &(0x7f0000000180)={0x0, 0x0}}, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r3, &(0x7f0000000100)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x79c4, 0x8}, 0xc) 2018/04/25 21:00:40 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getpeername$ax25(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r1, 0xba8) shutdown(r1, 0x0) 2018/04/25 21:00:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000080)=[0x5, 0xe6]) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f00000000c0)=0x1, 0x4) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="38c157a11ac96c3664138759654e33b379", 0x11}, {&(0x7f0000000240)}, {&(0x7f0000000540)="d83129d2b34cfb3bfb83eb6caf0920c9", 0x10}], 0x3, &(0x7f0000002600)=ANY=[@ANYBLOB="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"], 0x1110, 0x20000800}, 0x0) 2018/04/25 21:00:40 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x503800, 0x0) sendmsg$netrom(r1, &(0x7f0000000300)={&(0x7f0000000140)=@ax25={0x3, {"a71fb9f0e0f238"}, 0x40}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="2752833be607bc3ce0253800cb0d171b8bb34d46656c34a5a453a44afa864299684982921608801b99c1739ac05b807f35b9c8e7495f434bd1ccc76c538014ab757a94cfe5afe628c7cea78c0f765264bb68b531970d9a8600f7eab3f5f5a2b7a9a8d41bc58ec657cad1aaab899ac978e7b5922fb66f0aac7641a036eee82f55a4832b237a6ce24468317903804932113175078a4c4629c01006008e0578c50ecc2426c9d72a1e9b4424a016e407113e8aec862993a9a3e95aed76d0f64106dfd14a79d08f63523d213cc1bc114def72d65355f3128c8a78f95f0fa9a1d82b90b2c0058428a675aa429068b0", 0xec}], 0x1, &(0x7f00000002c0)}, 0x80) 2018/04/25 21:00:40 executing program 7: seccomp(0x800000000001, 0x0, &(0x7f0000000ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=@dstopts={0x0, 0x8, [], [@ra={0x5, 0x2, 0x400}, @pad1={0x0, 0x1}, @calipso={0x7, 0x20, {0x8, 0x6, 0x5, 0x200, [0xffffffffffffffc1, 0x30, 0xce]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x1d}}]}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) 2018/04/25 21:00:40 executing program 6: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ptrace$peek(0x2, r1, &(0x7f0000000000)) mmap(&(0x7f0000f33000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setrlimit(0x2, &(0x7f0000e63ff0)={0x2000001, 0x20080000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) shutdown(r0, 0x1) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1, 0x400000) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000140)=""/23) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f0000000040)='q"') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x89, 0x4) getitimer(0x3, &(0x7f0000000180)) mmap(&(0x7f0000a6c000/0x2000)=nil, 0x2000, 0x2, 0x30, r0, 0x0) r3 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x90df2a78c9d2d437) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f0000000200), 0x4) 2018/04/25 21:00:40 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) socket$nl_generic(0x10, 0x3, 0x10) [ 90.327662] mmap: syz-executor6 (6955): VmData 35201024 exceed data ulimit 33554433. Update limits or use boot option ignore_rlimit_data. [ 90.379636] audit: type=1326 audit(1524690040.378:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6956 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 [ 91.219302] audit: type=1326 audit(1524690041.218:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6956 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 2018/04/25 21:00:41 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x800, 0x0) syz_open_pts(r1, 0x40040) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000180)={{0x3, 0x0, 0x0, 0x3, 0x4}, 0x200000000000, 0xfffffffffffffffe}) 2018/04/25 21:00:41 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000340)=0x6) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000200)={{0x0, 0x1000}, 0x2000001, 0x0, 0x400, {0x2000, 0x800000000000}, 0xfffffffffffffc01}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000100)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xfff}, 'port1\x00', 0x10, 0x100010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x10100) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000180)=""/122) 2018/04/25 21:00:41 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x5) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r0, 0x8, r1) 2018/04/25 21:00:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x5e22}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}, 0x7fff, 0x3ff, 0x401, 0x1, 0xb}, &(0x7f0000000100)=0x98) fdatasync(r0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x1c, 0x5, [0x3, 0x2, 0x2, 0x5, 0x8]}, &(0x7f0000000180)=0x12) 2018/04/25 21:00:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) unshare(0x40600) r1 = getegid() setfsgid(r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000a80)) 2018/04/25 21:00:41 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004111, &(0x7f0000000000)="cc796e42ea107106e0") clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {r1, r2/1000+30000}}, 0x100) 2018/04/25 21:00:41 executing program 7: accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) write(0xffffffffffffffff, &(0x7f00000000c0)="794378319661cacb54b62f77508304932a435791342ddc907a3be7213a4e63979ef86dbfa75d874a7b9d8274597e0c7c7d14fa220fa17ccd8d985c01faf9ba0debe09b6e37b7a880ce1809de011a86960f337ecb57c0fcabc48f6370a5ebfd2b98ef1f1a0c789602", 0x1dd) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x80000000000022, &(0x7f0000c3b000), 0x94) getsockname(r0, &(0x7f0000000140)=@sco, &(0x7f00000001c0)=0x80) writev(r0, &(0x7f00003bc000)=[{&(0x7f0000549000)="29000000200019fff63d0014000000060200001615de0005000000040d000a000000000000f9000008", 0x29}], 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000ce0fc8)={&(0x7f0000570000)=@ax25, 0x10, &(0x7f0000196000), 0x0, &(0x7f0000536ff7)=""/9, 0x9}, 0x0) 2018/04/25 21:00:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x105000) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x3, r1}) r2 = openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'cpu', 0x20}]}, 0x6) 2018/04/25 21:00:41 executing program 5: r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x7, &(0x7f0000000740)={{{@in6, @in6=@dev={0xfe, 0x80}}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) creat(&(0x7f0000000000)='./file0\x00', 0x4) 2018/04/25 21:00:41 executing program 2: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={{0x0, 0x7530}, {0x0, 0x2710}}) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f00003bb000/0x3000)=nil, 0x3000, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000040)={'bond0\x00', @ifru_settings={0x8, 0x1, @fr_pvc=&(0x7f0000000000)={0x5}}}) madvise(&(0x7f000089e000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) 2018/04/25 21:00:41 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c2000000080045343047ca74f46c019078ac1414bbac1414aa00009078ffffffff"], &(0x7f0000000040)) r0 = accept4$ipx(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x800) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@broadcast, @local, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bcsh0\x00', r1}) [ 91.474024] netlink: 'syz-executor7': attribute type 10 has an invalid length. 2018/04/25 21:00:41 executing program 0: unshare(0x8000000) sched_setaffinity(0x0, 0xfffffffffffffe6c, &(0x7f0000000040)=0xd) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x9}) mq_timedsend(r0, &(0x7f0000e71fff), 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) fcntl$getown(r0, 0x9) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000000c0)={r1}) mq_timedsend(r0, &(0x7f000066c000), 0x0, 0x0, &(0x7f000058eff0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) 2018/04/25 21:00:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000feb000)=0xa90d, 0x4) recvfrom$inet6(r0, &(0x7f00000000c0)=""/185, 0xfffffd7d, 0x0, 0x0, 0xff78) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x5) ioctl$TCSBRKP(r2, 0x5425, 0xd118) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) 2018/04/25 21:00:41 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x40000, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f00003aa000)='/dev/snd/timer\x00', 0x0, 0x0) accept$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000748f08)={{0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) [ 91.558215] netlink: 'syz-executor7': attribute type 10 has an invalid length. 2018/04/25 21:00:41 executing program 1: r0 = gettid() prctl$intptr(0x1d, 0xfffffffffffff2fd) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f0000000200)=0x18) ppoll(&(0x7f0000000140), 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7, 0x2) get_thread_area(&(0x7f0000000440)={0x0, 0x20000800, 0x4000, 0xfffffffffffffffb, 0x20, 0x0, 0x6, 0x0, 0xfd7, 0x80000000}) statx(r1, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfff, &(0x7f0000000500)) modify_ldt$write2(0x11, &(0x7f0000000480)={0xffff, 0xffffffff, 0x1400, 0x87, 0x9a96, 0x0, 0x0, 0x2, 0x3, 0x5}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000002c0)={{0x7, 0x0, 0x1b, 0x1, "ff13a0ec4fa245d1a81c1e62f72c03ba0bfa50d2174be8d63606bd3bb8b8b24e6c0d68dbed08dc8a9ca2c0c3", 0x80000001}, 0x0, 0x0, 0x8e9a, r0, 0x9, 0x100000001, "62a7c803f835b6e690526798e2a54617c8c544c5402c9d8e33fd926c6012d8b63c9fe5362037671eff14cdd1e8be929c095565334d2637f7f64033342807ad92", &(0x7f0000000280)='(systemproc^keyring\x00', 0x14, [], [0x7, 0x2, 0x8, 0x6]}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000400)) syz_mount_image$ext4(&(0x7f0000000600)='ext2\x00', &(0x7f0000000640)='./file0\x00', 0x401, 0x1, &(0x7f0000000700)=[{&(0x7f0000000680)="7158a3e2574da92db2fdf48d8392634f97ebfdbc6724850366e1eb60ed8252c641321396c73cc0337fe4ac74b3f3ebd49d6b937c4a7fc4cd652f87857341ba54d60b4afa3bfc238d92f002f1ded6e9de68f1a41424cc0e99a8bb70a94acd", 0x5e, 0x800}], 0x1000, &(0x7f0000000740)={[{@bsdgroups='bsdgroups', 0x2c}, {@grpjquota='grpjquota=', 0x2c}, {@block_validity='block_validity', 0x2c}, {@norecovery='norecovery', 0x2c}, {@barrier_val={'barrier', 0x3d, [0x2d, 0x3f, 0x7d, 0x3d, 0x35]}, 0x2c}, {@barrier_val={'barrier', 0x3d, [0x39, 0x34, 0x78, 0x33, 0x33, 0x0, 0x31, 0x34]}, 0x2c}]}) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000d64000)) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) tkill(r0, 0x1000000000016) 2018/04/25 21:00:43 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) getpeername$inet(r0, &(0x7f0000000040)={0x0, 0x0, @multicast2}, &(0x7f0000000080)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f000026efff)="0f", 0x1, 0x0, &(0x7f0000021ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r1, 0x1) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100), 0x8) 2018/04/25 21:00:43 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp}}}}, &(0x7f00003b5000)) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x7fffffff, 0x8000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080)="10f55a7774656c21d102d4df41f677290a1ce0f410595dc341fe9aad74124eac15b5b7d6cf2957ec21c28eb413500c15ec36ed28b8f823f70e47701291c2045a20ab64d147f6e4abbb5257dbf00b728fffd74900b5cce729bcf09e0793dfc7a0c346f690c170777ab5b710e60638d7d836989d98488d6401bd0828ad3b961f390bbd9b89f6696e0cdf3614d5ace01ced8cde36a05d4f92a983d2cac4c808cacf8cd546c4409af3bf638cb90f0fc8b77dbcee89ece578dfc7adad58c299e0442c9e3d85afa9971d6b95b5a3d79c1c0cdf70c16aace9", &(0x7f0000000180)="a36d124f00ba7b58b14088bee0328add1930406b82de9ef0a084a739a069d4c3a2c5c53f3a92c966c5f6abcf3636a032fc7a76a98d59976df1f5b28fd1e1d2a9193c8c9de0bb7e0279ccbcb1a913a431beade784a0d19b77f420dffd14682b96db129d57b73ce68df296050ce74d67677d4cda990aab12cad35f280086e5085116f0944c59a46e11ba51b9ff3f43e5cfeb443631b7bc4c0eb24397", 0x1}, 0x20) 2018/04/25 21:00:43 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x2, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f00000029c0)={&(0x7f0000000400)={0x10, 0x9effffff00000000}, 0xc, &(0x7f0000002980)={&(0x7f0000000440)=ANY=[@ANYBLOB="36feffff01080103dfffffff00faff0000000000"], 0x14}, 0x1}, 0xfffffffffffffffe) 2018/04/25 21:00:43 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000340)=0x6) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000200)={{0x0, 0x1000}, 0x2000001, 0x0, 0x400, {0x2000, 0x800000000000}, 0xfffffffffffffc01}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000100)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xfff}, 'port1\x00', 0x10, 0x100010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x10100) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000180)=""/122) 2018/04/25 21:00:43 executing program 0: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x40, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r1 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000480)='./file1\x00', 0x40) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000052c0)={&(0x7f0000004f40)=@ll={0x11, 0x5da1e49052ee8435, 0x0, 0x1, 0x5, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}}, 0x80, &(0x7f0000005200)=[{&(0x7f0000004fc0)}], 0x1, &(0x7f0000005240)=ANY=[]}, 0x10) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000640)="f3deb193862fe69411d6afdf04c8fff83fe8d24137661132ad6936b687b4e51bed4232580e9a97538fba7509315bc24a3814590ef1e4067dbab368db021135479e37eee031cd3bd62a95466684a96e6daf3b5658591ae77c4d3ea040497ab3d6781bbb98f93218fcbc7b", 0x3, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file1/file0\x00', 0x0, 0x8}, 0x10) socketpair(0x10, 0x2, 0x9, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f00000006c0)={&(0x7f0000000300)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000380)="3df7035790bd4760f20fb15d76e20b5e6d54661a8ae79aaeb7fb572c22357bb7014a5bf268e235f06129417a56dac22f42004e41f2e37b81fdeb4233c8da700471859ba683a78d1aabe6ba3efe7ca574a86f919201cd3be7cbd786c1bdecaa0e96477cc0e454c8e7a812f30447c5e3d13741b8110e7534c70605e7bc9337025278285a4b384c37b66788812e6cee4a554bc40a2ac67a136ac1ebcb4f75390d5aa40c0e64fe6b0854181328796b17d74426c36799c97cb9ef8fa2e78c41380e23494c5db5ff177a67d3b797905a7eb6a6dfced22da96f900e5198de1c64c7ceee0a8675ec8cfe746f5e59eba3c3e9", 0xee}], 0x1, &(0x7f0000000840)=ANY=[], 0x0, 0x800}, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x40000004) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1/file0\x00', 0x0, 0x10}, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) recvmsg$kcm(r1, &(0x7f0000004b80)={&(0x7f0000004640)=@can={0x0, 0x0}, 0x80, &(0x7f0000004a40)=[{&(0x7f00000046c0)=""/181, 0xb5}, {&(0x7f0000004780)=""/198, 0xc6}, {&(0x7f0000004880)=""/178, 0xb2}, {&(0x7f0000004940)=""/73, 0x49}, {&(0x7f00000049c0)=""/69, 0x45}], 0x5, &(0x7f0000004ac0)=""/156, 0x9c, 0x2}, 0x40002160) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000600), 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195, 0x0, 0x0, [], r3}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r2, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000700)) 2018/04/25 21:00:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0x7, &(0x7f000000d379)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000001c0), 0x4) 2018/04/25 21:00:43 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000180)=""/162, 0xa2) r1 = socket$inet6(0xa, 0x3, 0x1e2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)=0xff, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000240)=""/213, &(0x7f0000000040)=0xd5) connect$inet6(r1, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0xffffffffffffffe0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/25 21:00:43 executing program 1: r0 = gettid() prctl$intptr(0x1d, 0xfffffffffffff2fd) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f0000000200)=0x18) ppoll(&(0x7f0000000140), 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7, 0x2) get_thread_area(&(0x7f0000000440)={0x0, 0x20000800, 0x4000, 0xfffffffffffffffb, 0x20, 0x0, 0x6, 0x0, 0xfd7, 0x80000000}) statx(r1, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfff, &(0x7f0000000500)) modify_ldt$write2(0x11, &(0x7f0000000480)={0xffff, 0xffffffff, 0x1400, 0x87, 0x9a96, 0x0, 0x0, 0x2, 0x3, 0x5}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000002c0)={{0x7, 0x0, 0x1b, 0x1, "ff13a0ec4fa245d1a81c1e62f72c03ba0bfa50d2174be8d63606bd3bb8b8b24e6c0d68dbed08dc8a9ca2c0c3", 0x80000001}, 0x0, 0x0, 0x8e9a, r0, 0x9, 0x100000001, "62a7c803f835b6e690526798e2a54617c8c544c5402c9d8e33fd926c6012d8b63c9fe5362037671eff14cdd1e8be929c095565334d2637f7f64033342807ad92", &(0x7f0000000280)='(systemproc^keyring\x00', 0x14, [], [0x7, 0x2, 0x8, 0x6]}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000400)) syz_mount_image$ext4(&(0x7f0000000600)='ext2\x00', &(0x7f0000000640)='./file0\x00', 0x401, 0x1, &(0x7f0000000700)=[{&(0x7f0000000680)="7158a3e2574da92db2fdf48d8392634f97ebfdbc6724850366e1eb60ed8252c641321396c73cc0337fe4ac74b3f3ebd49d6b937c4a7fc4cd652f87857341ba54d60b4afa3bfc238d92f002f1ded6e9de68f1a41424cc0e99a8bb70a94acd", 0x5e, 0x800}], 0x1000, &(0x7f0000000740)={[{@bsdgroups='bsdgroups', 0x2c}, {@grpjquota='grpjquota=', 0x2c}, {@block_validity='block_validity', 0x2c}, {@norecovery='norecovery', 0x2c}, {@barrier_val={'barrier', 0x3d, [0x2d, 0x3f, 0x7d, 0x3d, 0x35]}, 0x2c}, {@barrier_val={'barrier', 0x3d, [0x39, 0x34, 0x78, 0x33, 0x33, 0x0, 0x31, 0x34]}, 0x2c}]}) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000d64000)) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) tkill(r0, 0x1000000000016) 2018/04/25 21:00:43 executing program 3: r0 = socket(0x11, 0x4000000000080003, 0x0) unshare(0x8000400) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x2) io_setup(0x400, &(0x7f0000000080)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[{0x3, 0x3d}, {0x8, 0x1}, {0xb, 0x90}, {0x8, 0xfc23}, {0xfffffffffffffffe, 0x42ab}, {0x3, 0xffdfffffffffff83}], 0x2) [ 93.157673] ================================================================== [ 93.165111] BUG: KMSAN: uninit-value in netlink_sendmsg+0xb26/0x1310 [ 93.171607] CPU: 0 PID: 7067 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 93.178442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.187794] Call Trace: [ 93.190391] dump_stack+0x185/0x1d0 [ 93.194026] ? netlink_sendmsg+0xb26/0x1310 [ 93.198355] kmsan_report+0x142/0x240 [ 93.202165] __msan_warning_32+0x6c/0xb0 [ 93.206241] netlink_sendmsg+0xb26/0x1310 [ 93.210403] ? netlink_getsockopt+0xc80/0xc80 [ 93.214909] ___sys_sendmsg+0xec0/0x1310 [ 93.219011] ? __fdget+0x4e/0x60 [ 93.222381] ? __fget_light+0x56/0x710 [ 93.226267] ? __fdget+0x4e/0x60 [ 93.229636] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 93.235000] ? __fget_light+0x6b9/0x710 [ 93.238987] SYSC_sendmsg+0x2a3/0x3d0 [ 93.242802] SyS_sendmsg+0x54/0x80 [ 93.246344] do_syscall_64+0x309/0x430 [ 93.250236] ? ___sys_sendmsg+0x1310/0x1310 2018/04/25 21:00:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000006500000000000000000000000a000000707efe1ea841c86a17546d0e2e9f60dcd9c8e4f9dd9687aa5162871c57d2c0ed56f64e9bd17b5d78a98b1652699275e3f764", @ANYRES32=r1, @ANYBLOB="14000200fe8000000000000000000000000000aa"], 0x2c}, 0x1}, 0x0) [ 93.254564] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 93.259748] RIP: 0033:0x455389 [ 93.262933] RSP: 002b:00007f7e64c26c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 93.270642] RAX: ffffffffffffffda RBX: 00007f7e64c276d4 RCX: 0000000000455389 [ 93.277918] RDX: 0000000000000000 RSI: 0000000020005000 RDI: 0000000000000013 [ 93.285197] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 93.292470] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 93.299738] R13: 00000000000004f8 R14: 00000000006fa7e0 R15: 0000000000000000 [ 93.307011] [ 93.308636] Local variable description: ----address@___sys_sendmsg [ 93.314945] Variable was created at: [ 93.318665] ___sys_sendmsg+0xd3/0x1310 [ 93.322638] SYSC_sendmsg+0x2a3/0x3d0 [ 93.326430] ================================================================== [ 93.333777] Disabling lock debugging due to kernel taint [ 93.339222] Kernel panic - not syncing: panic_on_warn set ... [ 93.339222] [ 93.346589] CPU: 0 PID: 7067 Comm: syz-executor2 Tainted: G B 4.16.0+ #87 2018/04/25 21:00:43 executing program 0: r0 = socket$inet(0x2, 0x803, 0x1) sendmsg(r0, &(0x7f00000c1fc8)={&(0x7f0000c3d000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000001480), 0x0, &(0x7f0000000000)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) r1 = getpgid(0x0) modify_ldt$read(0x0, &(0x7f0000000040)=""/4096, 0x1000) ptrace(0x10, r1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000001040)={0x1, @multicast2=0xe0000002, 0x4e21, 0x1, 'lblcr\x00', 0xd, 0x94c, 0x34}, 0x2c) [ 93.354721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.364067] Call Trace: [ 93.366658] dump_stack+0x185/0x1d0 [ 93.370291] panic+0x39d/0x940 [ 93.373509] ? netlink_sendmsg+0xb26/0x1310 [ 93.377836] kmsan_report+0x238/0x240 [ 93.381652] __msan_warning_32+0x6c/0xb0 [ 93.385727] netlink_sendmsg+0xb26/0x1310 [ 93.389894] ? netlink_getsockopt+0xc80/0xc80 [ 93.394394] ___sys_sendmsg+0xec0/0x1310 [ 93.398463] ? __fdget+0x4e/0x60 [ 93.401834] ? __fget_light+0x56/0x710 [ 93.405717] ? __fdget+0x4e/0x60 [ 93.408128] IPVS: set_ctl: invalid protocol: 1 224.0.0.2:20001 lblcr [ 93.409090] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 93.409105] ? __fget_light+0x6b9/0x710 [ 93.409128] SYSC_sendmsg+0x2a3/0x3d0 [ 93.409149] SyS_sendmsg+0x54/0x80 [ 93.409163] do_syscall_64+0x309/0x430 [ 93.409184] ? ___sys_sendmsg+0x1310/0x1310 [ 93.409202] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 93.409211] RIP: 0033:0x455389 [ 93.409217] RSP: 002b:00007f7e64c26c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 2018/04/25 21:00:43 executing program 0: r0 = socket$inet(0x2, 0x803, 0x1) sendmsg(r0, &(0x7f00000c1fc8)={&(0x7f0000c3d000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000001480), 0x0, &(0x7f0000000000)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) r1 = getpgid(0x0) modify_ldt$read(0x0, &(0x7f0000000040)=""/4096, 0x1000) ptrace(0x10, r1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000001040)={0x1, @multicast2=0xe0000002, 0x4e21, 0x1, 'lblcr\x00', 0xd, 0x94c, 0x34}, 0x2c) [ 93.456573] RAX: ffffffffffffffda RBX: 00007f7e64c276d4 RCX: 0000000000455389 [ 93.463844] RDX: 0000000000000000 RSI: 0000000020005000 RDI: 0000000000000013 [ 93.471121] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 93.478396] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 93.485676] R13: 00000000000004f8 R14: 00000000006fa7e0 R15: 0000000000000000 [ 93.493481] Dumping ftrace buffer: [ 93.497009] (ftrace buffer empty) [ 93.500697] Kernel Offset: disabled [ 93.504302] Rebooting in 86400 seconds..